openSUSE Updates
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
September 2024
- 3 participants
- 344 discussions
# Security update for go1.23
Announcement ID: SUSE-SU-2024:3214-1
Rating: moderate
References:
* bsc#1229122
* bsc#1230252
* bsc#1230253
* bsc#1230254
Cross-References:
* CVE-2024-34155
* CVE-2024-34156
* CVE-2024-34158
CVSS scores:
* CVE-2024-34155 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-34156 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-34156 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-34158 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-34158 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for go1.23 fixes the following issues:
* Update go v1.23.1
* CVE-2024-34155: Fixed stack exhaustion in all Parse* functions.
(bsc#1230252)
* CVE-2024-34156: Fixed stack exhaustion in Decoder.Decode. (bsc#1230253)
* CVE-2024-34158: Fixed stack exhaustion in Parse. (bsc#1230254)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3214=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3214=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3214=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3214=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.1-150000.1.6.1
* go1.23-1.23.1-150000.1.6.1
* go1.23-doc-1.23.1-150000.1.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.1-150000.1.6.1
* go1.23-1.23.1-150000.1.6.1
* go1.23-doc-1.23.1-150000.1.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.1-150000.1.6.1
* go1.23-1.23.1-150000.1.6.1
* go1.23-doc-1.23.1-150000.1.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.1-150000.1.6.1
* go1.23-1.23.1-150000.1.6.1
* go1.23-doc-1.23.1-150000.1.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-34155.html
* https://www.suse.com/security/cve/CVE-2024-34156.html
* https://www.suse.com/security/cve/CVE-2024-34158.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229122
* https://bugzilla.suse.com/show_bug.cgi?id=1230252
* https://bugzilla.suse.com/show_bug.cgi?id=1230253
* https://bugzilla.suse.com/show_bug.cgi?id=1230254
1
0
12 Sep '24
# Recommended update for nvptx-tools
Announcement ID: SUSE-RU-2024:3215-1
Rating: moderate
References:
* jsc#PED-10474
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature can now be installed.
## Description:
This update for nvptx-tools fixes the following issues:
Update to version 1.0+git.20240530.96f8fc5:
* ld: Global constructor/destructor support
* Build in C++11 mode
* Import 'config/ax_cxx_compile_stdcxx.m4' from GCC
* Replace 'nvptx-none-run-single' with a locking mechanism in 'nvptx-none-
run.exp'
* Change github.com/MentorEmbedded to github.com/SourceryTools
Update to version 1.0+git.20240419.9962793:
* as: Document current handling of '//:IND_FUNC_MAP' [#45]
* Handle ":IND_FUNC_MAP" in nvptx-as to ensure map-directive order is kept
* Handle --hash-style argument in nvptx-ld
Update to version 1.0+git.20230913.c321f1a:
* as: Allow for arbitrary number of tokens in a 'stmt'
* Ensure :VAR_MAP and :FUNC_MAP are output in order, part II [#29]
* Ensure :VAR_MAP and :FUNC_MAP are output in order: add more test cases [#29]
* as: Pass 'Vis' into 'parse_line_nosemi'
* as: Inline 'alloc_comment'
* as: When tokenizing a block comment, don't lose a preceding end of line
marker
* as: Add 'test/as/block_comment-1.test'
* Bump architecture baseline from sm_35 to sm_50 [#30]
* as: Remove unused 'FUNC_MAP', 'VAR_MAP' scanning
* as: Clean up 'symbol's via C++ destructor
* Enable 'test/as/ptxas/missing-1.test' also if 'ptxas' is available
* Adjust for 'pex_run' error message change in "Update imported files: GCC,
2018-10-29 [#1, #42]"
* Note "Imported Files" in 'README-development' [#1]
* Add 'move-if-change' [#1]
* Remove 'acinclude.m4'
* Don't use 'gcc_AC_PROG_INSTALL'; use standard 'AC_PROG_INSTALL'
* Don't use 'gcc_AC_PROG_LN_S'; assume that 'ln -s' does work
* Have 'aclocal.m4' be "generated automatically by aclocal"
* Move 'ACX_PKGVERSION', 'ACX_BUGURL' into 'config/acx.m4'
* Ensure :VAR_MAP and :FUNC_MAP are output in order
Update to version 1.0+git.20230718.bbb6fe6:
* Document "Program Instrumentation: Sanitizers" in 'README-development'
* run: Move 'cuModuleGetFunction' for '__main' out of 'compile_file'
* run: Plug 'compile_file' memory leaks
* run: Localize 'cuda_lib'
* as: Localize 'collect_wait'
* as: Don't 'unlink (NULL)'
* as: Don't use an obstack for 'ptxas' invocation [#1]
* ld: Remove unused '#include "obstack.h"' [#1]
* ld, nm: Stop 'using namespace std;'
* run: For auto '\--stack-size', consider free instead of total device memory
[#8]
* ld: Support archives appearing as input files
* ld: Don't reject empty archives
* ld: Make resolving of '-l'ibraries a separate step
* ld: Verify no NUL-separated parts for 'process_refs_defs'
* ld: Fix undefined behavior reading objects from archives
* ld: Document padding of objects in archives
* as: Plug 'alloc_stmt' memory leak
* as: Plug 'read_file' memory leak
* as: Plug 'tokenize' memory leak
* as: Conceptually simplify capture of preamble '.target' directive's argument
* 'test/GLOBAL_FUNCTION_DECL_f.s': 'f' is '.extern', not '.visible' [#38]
Update to version 1.0+git.20230122.93e0090:
* nm: '#define __STDC_FORMAT_MACROS' for '#include <inttypes.h>' [#40]
* 'nm'
* ld: Clean up the 'symbol_table' when we're done
* as: Clean up the 'symbol_table' when we're done
* ld: Clean up 'file_hash_entry' instances when we're done with the
'symbol_table'
* as: Always 'free' the 'tok_preamble_target_arg'-deduced 'target_arg' string
after 'ptxas' verification
* as: 'obstack_free' after 'ptxas' verification
* run: Close files after use
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3215=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3215=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3215=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3215=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* nvptx-tools-debugsource-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-debuginfo-1.0+git.20240530.96f8fc5-150000.4.9.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* nvptx-tools-debugsource-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-debuginfo-1.0+git.20240530.96f8fc5-150000.4.9.1
* Development Tools Module 15-SP5 (aarch64 x86_64)
* nvptx-tools-debugsource-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-debuginfo-1.0+git.20240530.96f8fc5-150000.4.9.1
* Development Tools Module 15-SP6 (aarch64 x86_64)
* nvptx-tools-debugsource-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-1.0+git.20240530.96f8fc5-150000.4.9.1
* nvptx-tools-debuginfo-1.0+git.20240530.96f8fc5-150000.4.9.1
## References:
* https://jira.suse.com/browse/PED-10474
1
0
# Security update for expat
Announcement ID: SUSE-SU-2024:3216-1
Rating: moderate
References:
* bsc#1229930
* bsc#1229931
* bsc#1229932
Cross-References:
* CVE-2024-45490
* CVE-2024-45491
* CVE-2024-45492
CVSS scores:
* CVE-2024-45490 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45491 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45492 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for expat fixes the following issues:
* CVE-2024-45492: integer overflow in function nextScaffoldPart. (bsc#1229932)
* CVE-2024-45491: integer overflow in dtdCopy. (bsc#1229931)
* CVE-2024-45490: negative length for XML_ParseBuffer not rejected.
(bsc#1229930)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3216=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3216=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3216=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3216=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3216=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3216=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3216=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3216=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3216=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3216=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3216=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* expat-debugsource-2.4.4-150400.3.22.1
* expat-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap 15.4 (x86_64)
* libexpat1-32bit-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-32bit-2.4.4-150400.3.22.1
* libexpat1-32bit-2.4.4-150400.3.22.1
* expat-32bit-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libexpat-devel-64bit-2.4.4-150400.3.22.1
* libexpat1-64bit-2.4.4-150400.3.22.1
* expat-64bit-debuginfo-2.4.4-150400.3.22.1
* libexpat1-64bit-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* expat-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap 15.5 (x86_64)
* libexpat1-32bit-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-32bit-2.4.4-150400.3.22.1
* libexpat1-32bit-2.4.4-150400.3.22.1
* expat-32bit-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* expat-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* openSUSE Leap 15.6 (x86_64)
* libexpat1-32bit-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-32bit-2.4.4-150400.3.22.1
* libexpat1-32bit-2.4.4-150400.3.22.1
* expat-32bit-debuginfo-2.4.4-150400.3.22.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* expat-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* Basesystem Module 15-SP5 (x86_64)
* libexpat1-32bit-debuginfo-2.4.4-150400.3.22.1
* libexpat1-32bit-2.4.4-150400.3.22.1
* expat-32bit-debuginfo-2.4.4-150400.3.22.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* expat-debugsource-2.4.4-150400.3.22.1
* expat-2.4.4-150400.3.22.1
* libexpat1-debuginfo-2.4.4-150400.3.22.1
* libexpat-devel-2.4.4-150400.3.22.1
* libexpat1-2.4.4-150400.3.22.1
* expat-debuginfo-2.4.4-150400.3.22.1
* Basesystem Module 15-SP6 (x86_64)
* libexpat1-32bit-debuginfo-2.4.4-150400.3.22.1
* libexpat1-32bit-2.4.4-150400.3.22.1
* expat-32bit-debuginfo-2.4.4-150400.3.22.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45490.html
* https://www.suse.com/security/cve/CVE-2024-45491.html
* https://www.suse.com/security/cve/CVE-2024-45492.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229930
* https://bugzilla.suse.com/show_bug.cgi?id=1229931
* https://bugzilla.suse.com/show_bug.cgi?id=1229932
1
0
12 Sep '24
# Security update for libpcap
Announcement ID: SUSE-SU-2024:3217-1
Rating: moderate
References:
* bsc#1230020
* bsc#1230034
Cross-References:
* CVE-2023-7256
* CVE-2024-8006
CVSS scores:
* CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for libpcap fixes the following issues:
* CVE-2024-8006: NULL pointer dereference in function pcap_findalldevs_ex().
(bsc#1230034)
* CVE-2023-7256: double free via struct addrinfo in function
sock_initaddress(). (bsc#1230020)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3217=1 openSUSE-SLE-15.6-2024-3217=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3217=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3217=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpcap1-debuginfo-1.10.4-150600.3.3.2
* libpcap1-1.10.4-150600.3.3.2
* libpcap-devel-static-1.10.4-150600.3.3.2
* libpcap-debugsource-1.10.4-150600.3.3.2
* libpcap-devel-1.10.4-150600.3.3.2
* openSUSE Leap 15.6 (x86_64)
* libpcap1-32bit-debuginfo-1.10.4-150600.3.3.2
* libpcap-devel-32bit-1.10.4-150600.3.3.2
* libpcap1-32bit-1.10.4-150600.3.3.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpcap-devel-64bit-1.10.4-150600.3.3.2
* libpcap1-64bit-debuginfo-1.10.4-150600.3.3.2
* libpcap1-64bit-1.10.4-150600.3.3.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpcap-debugsource-1.10.4-150600.3.3.2
* libpcap-devel-1.10.4-150600.3.3.2
* libpcap1-1.10.4-150600.3.3.2
* libpcap1-debuginfo-1.10.4-150600.3.3.2
* SUSE Package Hub 15 15-SP6 (x86_64)
* libpcap-debugsource-1.10.4-150600.3.3.2
* libpcap1-32bit-debuginfo-1.10.4-150600.3.3.2
* libpcap1-32bit-1.10.4-150600.3.3.2
## References:
* https://www.suse.com/security/cve/CVE-2023-7256.html
* https://www.suse.com/security/cve/CVE-2024-8006.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230020
* https://bugzilla.suse.com/show_bug.cgi?id=1230034
1
0
12 Sep '24
# Security update for 389-ds
Announcement ID: SUSE-SU-2024:3218-1
Rating: important
References:
* bsc#1219836
* bsc#1225507
* bsc#1225512
* bsc#1226277
Cross-References:
* CVE-2024-1062
* CVE-2024-2199
* CVE-2024-3657
* CVE-2024-5953
CVSS scores:
* CVE-2024-1062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2199 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3657 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3657 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5953 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5953 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves four vulnerabilities can now be installed.
## Description:
This update for 389-ds fixes the following issues:
* Update to version 2.0.20
* CVE-2024-3657: DOS via via specially crafted kerberos AS-REQ request.
(bsc#1225512)
* CVE-2024-5953: Malformed userPassword hashes may cause a denial of service.
(bsc#1226277)
* CVE-2024-2199: Malformed userPassword may cause crash at do_modify in
slapd/modify.c. (bsc#1225507)
* CVE-2024-1062: Fixed a heap overflow leading to denail-of-servce while
writing a value larger than 256 chars in log_entry_attr. (bsc#1219836)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3218=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3218=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3218=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3218=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3218=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3218=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3218=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3218=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* SUSE Manager Proxy 4.3 (x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* 389-ds-snmp-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-snmp-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* 389-ds-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-devel-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-2.0.20~git9.5e2d637c-150400.3.42.3
* 389-ds-debugsource-2.0.20~git9.5e2d637c-150400.3.42.3
* lib389-2.0.20~git9.5e2d637c-150400.3.42.3
* libsvrcore0-debuginfo-2.0.20~git9.5e2d637c-150400.3.42.3
## References:
* https://www.suse.com/security/cve/CVE-2024-1062.html
* https://www.suse.com/security/cve/CVE-2024-2199.html
* https://www.suse.com/security/cve/CVE-2024-3657.html
* https://www.suse.com/security/cve/CVE-2024-5953.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219836
* https://bugzilla.suse.com/show_bug.cgi?id=1225507
* https://bugzilla.suse.com/show_bug.cgi?id=1225512
* https://bugzilla.suse.com/show_bug.cgi?id=1226277
1
0
# Security update for colord
Announcement ID: SUSE-SU-2024:3219-1
Rating: moderate
References:
* bsc#1208056
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
An update that has one security fix can now be installed.
## Description:
This update for colord fixes the following issues:
* Fixed a potential local privilege escalation by removing the script in the
specfile which changes the ownership of /var/lib/colord. (bsc#1208056)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3219=1 openSUSE-SLE-15.6-2024-3219=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3219=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3219=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3219=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libcolord2-debuginfo-1.4.6-150600.3.3.1
* colord-color-profiles-1.4.6-150600.3.3.1
* libcolorhug2-debuginfo-1.4.6-150600.3.3.1
* colord-1.4.6-150600.3.3.1
* typelib-1_0-Colord-1_0-1.4.6-150600.3.3.1
* typelib-1_0-Colorhug-1_0-1.4.6-150600.3.3.1
* libcolord2-1.4.6-150600.3.3.1
* colord-debuginfo-1.4.6-150600.3.3.1
* libcolord-devel-1.4.6-150600.3.3.1
* libcolorhug2-1.4.6-150600.3.3.1
* colord-debugsource-1.4.6-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* colord-lang-1.4.6-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libcolord2-32bit-debuginfo-1.4.6-150600.3.3.1
* libcolord2-32bit-1.4.6-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcolord2-64bit-1.4.6-150600.3.3.1
* libcolord2-64bit-debuginfo-1.4.6-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcolord2-debuginfo-1.4.6-150600.3.3.1
* colord-debuginfo-1.4.6-150600.3.3.1
* colord-debugsource-1.4.6-150600.3.3.1
* libcolord2-1.4.6-150600.3.3.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* colord-color-profiles-1.4.6-150600.3.3.1
* libcolorhug2-debuginfo-1.4.6-150600.3.3.1
* typelib-1_0-Colord-1_0-1.4.6-150600.3.3.1
* typelib-1_0-Colorhug-1_0-1.4.6-150600.3.3.1
* colord-debuginfo-1.4.6-150600.3.3.1
* libcolord-devel-1.4.6-150600.3.3.1
* libcolorhug2-1.4.6-150600.3.3.1
* colord-debugsource-1.4.6-150600.3.3.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* colord-1.4.6-150600.3.3.1
* colord-debuginfo-1.4.6-150600.3.3.1
* colord-debugsource-1.4.6-150600.3.3.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch)
* colord-lang-1.4.6-150600.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1208056
1
0
12 Sep '24
# Security update for containerd
Announcement ID: SUSE-SU-2024:3221-1
Rating: important
References:
* bsc#1200528
* bsc#1217070
* bsc#1228553
Cross-References:
* CVE-2022-1996
* CVE-2023-45142
* CVE-2023-47108
CVSS scores:
* CVE-2022-1996 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2022-1996 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2022-1996 ( NVD ): 9.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2023-45142 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45142 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47108 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-47108 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for containerd fixes the following issues:
* Update to containerd v1.7.21
* CVE-2023-47108: Fixed DoS vulnerability in otelgrpc (uncontrolled resource
consumption) due to unbound cardinality metrics. (bsc#1217070)
* CVE-2023-45142: Fixed DoS vulnerability in otelhttp. (bsc#1228553)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3221=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3221=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3221=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3221=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3221=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3221=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3221=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3221=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3221=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3221=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3221=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3221=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3221=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3221=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3221=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3221=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3221=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3221=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3221=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3221=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3221=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3221=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3221=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3221=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* containerd-1.7.21-150000.117.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* containerd-1.7.21-150000.117.1
* containerd-devel-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* containerd-1.7.21-150000.117.1
* containerd-ctr-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* containerd-1.7.21-150000.117.1
## References:
* https://www.suse.com/security/cve/CVE-2022-1996.html
* https://www.suse.com/security/cve/CVE-2023-45142.html
* https://www.suse.com/security/cve/CVE-2023-47108.html
* https://bugzilla.suse.com/show_bug.cgi?id=1200528
* https://bugzilla.suse.com/show_bug.cgi?id=1217070
* https://bugzilla.suse.com/show_bug.cgi?id=1228553
1
0
# Security update for runc
Announcement ID: SUSE-SU-2024:3222-1
Rating: low
References:
* bsc#1230092
Cross-References:
* CVE-2024-45310
CVSS scores:
* CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for runc fixes the following issues:
* Update to runc v1.1.14
* CVE-2024-45310: Fixed an issue where runc can be tricked into creating empty
files/directories on host. (bsc#1230092)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3222=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3222=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3222=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3222=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3222=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3222=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3222=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3222=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3222=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3222=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3222=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3222=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3222=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3222=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3222=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3222=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3222=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3222=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3222=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3222=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3222=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3222=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3222=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3222=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* runc-debuginfo-1.1.14-150000.70.1
* runc-1.1.14-150000.70.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45310.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230092
1
0
SUSE-RU-2024:3223-1: moderate: Recommended update for suse-migration-services
by OPENSUSE-UPDATES 12 Sep '24
by OPENSUSE-UPDATES 12 Sep '24
12 Sep '24
# Recommended update for suse-migration-services
Announcement ID: SUSE-RU-2024:3223-1
Rating: moderate
References:
* bsc#1222258
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
An update that has one fix can now be installed.
## Description:
This update for suse-migration-services fixes the following issues:
* Version upgrade.
* Add metadata and revhistory and article ID.
* SLES12 SP4 no longer a supported migration starting point.
* Switch default target and ISO backing distro SLE 15 SP3 Update documentation
to reflect new default target. Update image build config.kiwi to build the
ISO image based upon SLE 15 SP3. Update unit tests to reflect new default
target.
* Remove custom legacy ruby based zypper-migration script The install of the
legacy zypper-migration-plugin script was previously removed from the kiwi
file.
* Rename overlay zypper-migration plugin with -ruby suffix.
* Fix update-bootloader to run after grub-setup (bsc#1222258).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3223=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3223=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* suse-migration-services-2.0.40-150000.1.71.2
* suse-migration-pre-checks-2.0.40-150000.1.71.2
* openSUSE Leap 15.6 (noarch)
* suse-migration-services-2.0.40-150000.1.71.2
* suse-migration-pre-checks-2.0.40-150000.1.71.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1222258
1
0
SUSE-RU-2024:3212-1: moderate: Recommended update for transactional-update
by OPENSUSE-UPDATES 12 Sep '24
by OPENSUSE-UPDATES 12 Sep '24
12 Sep '24
# Recommended update for transactional-update
Announcement ID: SUSE-RU-2024:3212-1
Rating: moderate
References:
* jsc#PED-10374
* jsc#PED-10375
Affected Products:
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Micro 5.5
An update that contains two features can now be installed.
## Description:
This update for transactional-update fixes the following issues:
* transactional-update was updated to version 4.1.9 (jsc#PED-10374,
jsc#PED-10375):
* Added support for specifying migration arguments
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3212=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3212=1
## Package List:
* openSUSE Leap Micro 5.5 (noarch)
* dracut-transactional-update-4.1.9-150500.3.12.2
* transactional-update-zypp-config-4.1.9-150500.3.12.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* transactional-update-debuginfo-4.1.9-150500.3.12.2
* tukitd-debuginfo-4.1.9-150500.3.12.2
* libtukit4-debuginfo-4.1.9-150500.3.12.2
* tukit-debuginfo-4.1.9-150500.3.12.2
* libtukit4-4.1.9-150500.3.12.2
* tukitd-4.1.9-150500.3.12.2
* tukit-4.1.9-150500.3.12.2
* transactional-update-debugsource-4.1.9-150500.3.12.2
* transactional-update-4.1.9-150500.3.12.2
* SUSE Linux Enterprise Micro 5.5 (noarch)
* dracut-transactional-update-4.1.9-150500.3.12.2
* transactional-update-zypp-config-4.1.9-150500.3.12.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* transactional-update-debuginfo-4.1.9-150500.3.12.2
* tukitd-debuginfo-4.1.9-150500.3.12.2
* libtukit4-debuginfo-4.1.9-150500.3.12.2
* tukit-debuginfo-4.1.9-150500.3.12.2
* libtukit4-4.1.9-150500.3.12.2
* tukitd-4.1.9-150500.3.12.2
* tukit-4.1.9-150500.3.12.2
* transactional-update-debugsource-4.1.9-150500.3.12.2
* transactional-update-4.1.9-150500.3.12.2
## References:
* https://jira.suse.com/browse/PED-10374
* https://jira.suse.com/browse/PED-10375
1
0
11 Sep '24
# Security update for libpcap
Announcement ID: SUSE-SU-2024:3210-1
Rating: moderate
References:
* bsc#1230020
* bsc#1230034
Cross-References:
* CVE-2023-7256
* CVE-2024-8006
CVSS scores:
* CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for libpcap fixes the following issues:
* CVE-2024-8006: NULL pointer dereference in function pcap_findalldevs_ex().
(bsc#1230034)
* CVE-2023-7256: double free via struct addrinfo in function
sock_initaddress(). (bsc#1230020)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3210=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3210=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3210=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3210=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3210=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3210=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3210=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3210=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3210=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3210=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libpcap-debugsource-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-devel-static-1.10.1-150400.3.3.2
* libpcap1-1.10.1-150400.3.3.2
* libpcap-devel-1.10.1-150400.3.3.2
* openSUSE Leap 15.4 (x86_64)
* libpcap1-32bit-1.10.1-150400.3.3.2
* libpcap-devel-32bit-1.10.1-150400.3.3.2
* libpcap1-32bit-debuginfo-1.10.1-150400.3.3.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpcap1-64bit-1.10.1-150400.3.3.2
* libpcap1-64bit-debuginfo-1.10.1-150400.3.3.2
* libpcap-devel-64bit-1.10.1-150400.3.3.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-devel-static-1.10.1-150400.3.3.2
* libpcap1-1.10.1-150400.3.3.2
* libpcap-devel-1.10.1-150400.3.3.2
* openSUSE Leap 15.5 (x86_64)
* libpcap1-32bit-1.10.1-150400.3.3.2
* libpcap-devel-32bit-1.10.1-150400.3.3.2
* libpcap1-32bit-debuginfo-1.10.1-150400.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpcap1-1.10.1-150400.3.3.2
* libpcap-devel-1.10.1-150400.3.3.2
* libpcap1-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
* SUSE Package Hub 15 15-SP5 (x86_64)
* libpcap1-32bit-1.10.1-150400.3.3.2
* libpcap1-32bit-debuginfo-1.10.1-150400.3.3.2
* libpcap-debugsource-1.10.1-150400.3.3.2
## References:
* https://www.suse.com/security/cve/CVE-2023-7256.html
* https://www.suse.com/security/cve/CVE-2024-8006.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230020
* https://bugzilla.suse.com/show_bug.cgi?id=1230034
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:3211-1
Rating: moderate
References:
* bsc#1230093
Cross-References:
* CVE-2024-8096
CVSS scores:
* CVE-2024-8096 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-8096 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-8096 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-8096: OCSP stapling bypass with GnuTLS. (bsc#1230093)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3211=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3211=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3211=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3211=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3211=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3211=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3211=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3211=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3211=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3211=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3211=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3211=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3211=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl-devel-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* openSUSE Leap 15.4 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.50.1
* libcurl4-32bit-8.0.1-150400.5.50.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.50.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl-devel-64bit-8.0.1-150400.5.50.1
* libcurl4-64bit-8.0.1-150400.5.50.1
* libcurl4-64bit-debuginfo-8.0.1-150400.5.50.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl-devel-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* openSUSE Leap 15.5 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.50.1
* libcurl4-32bit-8.0.1-150400.5.50.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.50.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libcurl4-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.50.1
* curl-debugsource-8.0.1-150400.5.50.1
* curl-8.0.1-150400.5.50.1
* curl-debuginfo-8.0.1-150400.5.50.1
* libcurl-devel-8.0.1-150400.5.50.1
* libcurl4-debuginfo-8.0.1-150400.5.50.1
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.50.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.50.1
## References:
* https://www.suse.com/security/cve/CVE-2024-8096.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230093
1
0
11 Sep '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3209-1
Rating: important
References:
* bsc#1193629
* bsc#1194111
* bsc#1194765
* bsc#1194869
* bsc#1196261
* bsc#1196516
* bsc#1196894
* bsc#1198017
* bsc#1203329
* bsc#1203330
* bsc#1203360
* bsc#1205462
* bsc#1206006
* bsc#1206258
* bsc#1206843
* bsc#1207158
* bsc#1208783
* bsc#1210644
* bsc#1213580
* bsc#1213632
* bsc#1214285
* bsc#1216834
* bsc#1220428
* bsc#1220877
* bsc#1220962
* bsc#1221269
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1222335
* bsc#1222350
* bsc#1222372
* bsc#1222387
* bsc#1222634
* bsc#1222808
* bsc#1222967
* bsc#1223074
* bsc#1223191
* bsc#1223508
* bsc#1223720
* bsc#1223742
* bsc#1223777
* bsc#1223803
* bsc#1223807
* bsc#1224105
* bsc#1224415
* bsc#1224496
* bsc#1224510
* bsc#1224542
* bsc#1224578
* bsc#1224639
* bsc#1225162
* bsc#1225352
* bsc#1225428
* bsc#1225524
* bsc#1225578
* bsc#1225582
* bsc#1225773
* bsc#1225814
* bsc#1225827
* bsc#1225832
* bsc#1225903
* bsc#1226168
* bsc#1226530
* bsc#1226613
* bsc#1226742
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226874
* bsc#1226885
* bsc#1227079
* bsc#1227623
* bsc#1227761
* bsc#1227830
* bsc#1227863
* bsc#1227867
* bsc#1227929
* bsc#1227937
* bsc#1227958
* bsc#1228020
* bsc#1228065
* bsc#1228114
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228469
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228501
* bsc#1228503
* bsc#1228509
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228526
* bsc#1228531
* bsc#1228563
* bsc#1228564
* bsc#1228567
* bsc#1228576
* bsc#1228579
* bsc#1228584
* bsc#1228588
* bsc#1228590
* bsc#1228615
* bsc#1228616
* bsc#1228635
* bsc#1228636
* bsc#1228654
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228667
* bsc#1228673
* bsc#1228677
* bsc#1228687
* bsc#1228706
* bsc#1228708
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228748
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228979
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229042
* bsc#1229054
* bsc#1229086
* bsc#1229136
* bsc#1229154
* bsc#1229187
* bsc#1229188
* bsc#1229190
* bsc#1229287
* bsc#1229290
* bsc#1229292
* bsc#1229296
* bsc#1229297
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229314
* bsc#1229315
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229327
* bsc#1229341
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229354
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229366
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229418
* bsc#1229444
* bsc#1229453
* bsc#1229454
* bsc#1229481
* bsc#1229482
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229506
* bsc#1229507
* bsc#1229508
* bsc#1229509
* bsc#1229510
* bsc#1229512
* bsc#1229516
* bsc#1229521
* bsc#1229522
* bsc#1229523
* bsc#1229524
* bsc#1229525
* bsc#1229526
* bsc#1229527
* bsc#1229528
* bsc#1229529
* bsc#1229531
* bsc#1229533
* bsc#1229535
* bsc#1229536
* bsc#1229537
* bsc#1229540
* bsc#1229544
* bsc#1229545
* bsc#1229546
* bsc#1229547
* bsc#1229548
* bsc#1229554
* bsc#1229557
* bsc#1229558
* bsc#1229559
* bsc#1229560
* bsc#1229562
* bsc#1229564
* bsc#1229565
* bsc#1229566
* bsc#1229568
* bsc#1229569
* bsc#1229572
* bsc#1229573
* bsc#1229576
* bsc#1229581
* bsc#1229588
* bsc#1229598
* bsc#1229603
* bsc#1229604
* bsc#1229605
* bsc#1229608
* bsc#1229611
* bsc#1229612
* bsc#1229613
* bsc#1229614
* bsc#1229615
* bsc#1229616
* bsc#1229617
* bsc#1229620
* bsc#1229622
* bsc#1229623
* bsc#1229624
* bsc#1229625
* bsc#1229626
* bsc#1229628
* bsc#1229629
* bsc#1229630
* bsc#1229631
* bsc#1229632
* bsc#1229635
* bsc#1229636
* bsc#1229637
* bsc#1229638
* bsc#1229639
* bsc#1229641
* bsc#1229642
* bsc#1229643
* bsc#1229645
* bsc#1229657
* bsc#1229658
* bsc#1229662
* bsc#1229664
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229768
* bsc#1229781
* bsc#1229784
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* jsc#PED-8491
* jsc#PED-8779
Cross-References:
* CVE-2021-4441
* CVE-2021-47106
* CVE-2021-47517
* CVE-2021-47546
* CVE-2022-38457
* CVE-2022-40133
* CVE-2022-48645
* CVE-2022-48706
* CVE-2022-48808
* CVE-2022-48865
* CVE-2022-48868
* CVE-2022-48869
* CVE-2022-48870
* CVE-2022-48871
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48875
* CVE-2022-48878
* CVE-2022-48880
* CVE-2022-48881
* CVE-2022-48882
* CVE-2022-48883
* CVE-2022-48884
* CVE-2022-48885
* CVE-2022-48886
* CVE-2022-48887
* CVE-2022-48888
* CVE-2022-48889
* CVE-2022-48890
* CVE-2022-48891
* CVE-2022-48893
* CVE-2022-48896
* CVE-2022-48898
* CVE-2022-48899
* CVE-2022-48903
* CVE-2022-48904
* CVE-2022-48905
* CVE-2022-48906
* CVE-2022-48907
* CVE-2022-48909
* CVE-2022-48910
* CVE-2022-48912
* CVE-2022-48913
* CVE-2022-48914
* CVE-2022-48915
* CVE-2022-48916
* CVE-2022-48917
* CVE-2022-48918
* CVE-2022-48919
* CVE-2022-48920
* CVE-2022-48921
* CVE-2022-48923
* CVE-2022-48924
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48927
* CVE-2022-48928
* CVE-2022-48929
* CVE-2022-48930
* CVE-2022-48931
* CVE-2022-48932
* CVE-2022-48934
* CVE-2022-48937
* CVE-2022-48938
* CVE-2022-48939
* CVE-2022-48940
* CVE-2022-48941
* CVE-2022-48942
* CVE-2022-48943
* CVE-2023-3610
* CVE-2023-52458
* CVE-2023-52489
* CVE-2023-52498
* CVE-2023-52581
* CVE-2023-52859
* CVE-2023-52887
* CVE-2023-52889
* CVE-2023-52893
* CVE-2023-52894
* CVE-2023-52896
* CVE-2023-52898
* CVE-2023-52899
* CVE-2023-52900
* CVE-2023-52901
* CVE-2023-52904
* CVE-2023-52905
* CVE-2023-52906
* CVE-2023-52907
* CVE-2023-52908
* CVE-2023-52909
* CVE-2023-52910
* CVE-2023-52911
* CVE-2023-52912
* CVE-2023-52913
* CVE-2024-26631
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26735
* CVE-2024-26808
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26851
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27016
* CVE-2024-27024
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-31076
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35945
* CVE-2024-35971
* CVE-2024-36009
* CVE-2024-36013
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36489
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36936
* CVE-2024-36962
* CVE-2024-38554
* CVE-2024-38602
* CVE-2024-38662
* CVE-2024-39489
* CVE-2024-40905
* CVE-2024-40978
* CVE-2024-40980
* CVE-2024-40995
* CVE-2024-41000
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41042
* CVE-2024-41045
* CVE-2024-41056
* CVE-2024-41060
* CVE-2024-41062
* CVE-2024-41065
* CVE-2024-41068
* CVE-2024-41073
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41095
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42069
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42095
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42110
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42137
* CVE-2024-42139
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42225
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42244
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42268
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42315
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43849
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43904
* CVE-2024-43905
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-44938
* CVE-2024-44939
* CVE-2024-44947
CVSS scores:
* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47106 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-40133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-40133 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-48645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48808 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48878 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48880 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48881 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48882 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48883 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48883 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48884 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48884 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48885 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48885 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48906 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48910 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48923 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48938 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52912 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52912 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Real Time Module 15-SP5
An update that solves 292 vulnerabilities, contains two features and has 45
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
* CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
* CVE-2024-43893: Check uartclk for zero to avoid divide by zero
(bsc#1229759).
* CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
* CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
* CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
* CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).
* CVE-2024-41087: Fix double free on error (bsc#1228466).
* CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
* CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
* CVE-2024-43904: Add null checks for 'stream' and 'plane' before
dereferencing (bsc#1229768)
* CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
* CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
* CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
* CVE-2022-48920: Get rid of warning on transaction commit when using
flushoncommit (bsc#1229658).
* CVE-2023-52906: Fix warning during failed attribute validation
(bsc#1229527).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
* CVE-2024-26812: struct virqfd kABI workaround (bsc#1222808).
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
* CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is
large (bsc#1229605)
* CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
* CVE-2024-42156: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2023-52899: Add exception protection processing for vd in
axi_chan_handle_err function (bsc#1229569).
* CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
* CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
* CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
* CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy()
(bsc#1220962)
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225428).
* CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
* CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
* CVE-2024-35897: Discard table flag update with pending basechain deletion
(bsc#1224510).
* CVE-2024-27403: Restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
* CVE-2024-43819: Reject memory region operations for ucontrol VMs
(bsc#1229290).
* CVE-2024-26668: Reject configurations that cause integer overflow
(bsc#1222335).
* CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
* CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
(bsc#1222634).
* CVE-2024-27016: Validate pppoe header (bsc#1223807).
* CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
* CVE-2023-52581: Fix memleak when more than 255 elements expired
(bsc#1220877).
* CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
* CVE-2024-43837: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
* CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
* CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
(bsc#1226801)
* CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
* CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
* CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the
reference serial number") (bsc#1222387)
* CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue")
(bsc#1224542)
* CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
* CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
* CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error
(bsc#1229382)
* CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
* CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-43854: Initialize integrity buffer to zero before writing it to
media (bsc#1229345)
* CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
* CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
* CVE-2024-42318: Do not lose track of restrictions on cred_transfer
(bsc#1229351).
* CVE-2024-26669: Fix chain template offload (bsc#1222350).
* CVE-2023-52889: Fix null pointer deref when receiving skb during sock
creation (bsc#1229287).
* CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features()
(bsc#1223508).
* CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-36933: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block()
(bsc#1229370).
* CVE-2024-42319: Move devm_mbox_controller_register() after
devm_pm_runtime_enable() (bsc#1229350).
* CVE-2024-43860: Skip over memory region when node value is NULL
(bsc#1229319).
* CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
* CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
* CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
* CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures
(bsc#1229301).
* CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
* CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers()
(bsc#1228616).
* CVE-2024-42246: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
(bsc#1226885).
* CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
__netif_rx() (bsc#1228501).
* CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
* CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
* CVE-2023-52498: Fix possible deadlocks in core system-wide PM code
(bsc#1221269).
* CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
* CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown
(bsc#1227958).
* CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
* CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
* CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42139: Fix improper extts handling (bsc#1228503).
* CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
* CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
* CVE-2024-42162: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
* CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
* CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
exploited to achieve local privilege escalation (bsc#1213580).
* CVE-2024-42228: Using uninitialized value *size when calling
amdgpu_vce_cs_reloc (bsc#1228667).
* CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
(bsc#1227830).
* CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (bsc#1226613).
* CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
* CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).
The following non-security bugs were fixed:
* ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
fixes).
* ACPI: bus: Rework system-level device notification handling (git-fixes).
* ACPI: thermal: Drop nocrt parameter (git-fixes).
* ACPI: x86: s2idle: Post-increment variables when getting constraints (git-
fixes).
* afs: Do not cross .backup mountpoint from backup volume (git-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: timer: Relax start tick time check for slave timer elements (git-
fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
* ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: barrier: Restore spec_bar() macro (git-fixes)
* arm64: cpufeature: Add missing .field_width for GIC system registers (git-
fixes)
* arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)
* arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-
fixes)
* arm64: cputype: Add Cortex-A720 definitions (git-fixes)
* arm64: cputype: Add Cortex-A725 definitions (git-fixes)
* arm64: cputype: Add Cortex-X1C definitions (git-fixes)
* arm64: cputype: Add Cortex-X3 definitions (git-fixes)
* arm64: cputype: Add Cortex-X4 definitions (git-fixes)
* arm64: cputype: Add Cortex-X925 definitions (git-fixes)
* arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
* arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (git-fixes)
* arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update
default configuration.
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
* async: Introduce async_schedule_dev_nocall() (bsc#1221269).
* async: Split async_schedule_node_domain() (bsc#1221269).
* Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
* Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
* Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
* btrfs: fix leak of qgroup extent records after transaction abort (git-
fixes).
* btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).
* btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).
* btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
* cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
(bsc#1229418).
* ceph: issue a cap release immediately if no cap exists (bsc#1225162).
* ceph: periodically flush the cap releases (bsc#1225162).
* cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).
* docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
* drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).
* drm: panel-orientation-quirks: Add labels for both Valve Steam Deck
revisions (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-
fixes).
* drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
* drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values
can be stored (stable-fixes).
* drm/amd/display: Add NULL check for 'afb' before dereferencing in
amdgpu_dm_plane_handle_cursor_update (stable-fixes).
* drm/amd/display: avoid using null object of framebuffer (git-fixes).
* drm/amd/display: Fix && vs || typos (git-fixes).
* drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
fixes).
* drm/amd/display: Validate hw_points_num before using it (stable-fixes).
* drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
fixes).
* drm/amdgpu: Actually check flags for all context ops (stable-fixes).
* drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
* drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).
* drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
* drm/amdgpu: Validate TA binary size (stable-fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
(stable-fixes).
* drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
* drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).
* drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
* drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
fixes).
* drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
* drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
* drm/msm/dp: reset the link phy params before link training (git-fixes).
* drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
* drm/msm/dpu: do not play tricks with debug macros (git-fixes).
* drm/tegra: Zero-initialize iosys_map (stable-fixes).
* exfat: fix inode->i_blocks for non-512 byte sector size device (git-fixes).
* exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
* exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).
* exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
* fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229453).
* fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* genirq: Add might_sleep() to disable_irq() (git-fixes).
* genirq: Always limit the affinity to online CPUs (git-fixes).
* genirq: Do not return error on missing optional irq_request_resources()
(git-fixes).
* genirq: Take the proposed affinity at face value if force==true (git-fixes).
* genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
fixes).
* genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
fixes).
* genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-
fixes).
* genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).
* genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
fixes).
* genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-
fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
(git-fixes).
* i2c: smbus: Improve handling of stuck alerts (git-fixes).
* i2c: smbus: Send alert notifications to all devices if source not found
(git-fixes).
* iommu/amd: Convert comma to semicolon (git-fixes).
* ip6_tunnel: Fix broken GRO (bsc#1229444).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).
* irqdomain: Fix association race (git-fixes).
* irqdomain: Fix disassociation race (git-fixes).
* irqdomain: Fix domain registration race (git-fixes).
* irqdomain: Fix mapping-creation race (git-fixes).
* irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
* irqdomain: Look for existing mapping only once (git-fixes).
* irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).
* irqdomain: Report irq number for NOMAP domains (git-fixes).
* kprobes: Fix to check symbol prefixes correctly (git-fixes).
* lockd: move from strlcpy with unused retval to strscpy (git-fixes).
* memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
* mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
* net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-
fixes).
* net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).
* net: ks8851: Fix potential TX stall after interface reopen (git-fixes).
* net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
* net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).
* net: remove two BUG() from skb_checksum_help() (bsc#1229312).
* net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
* net/rds: fix possible cp null dereference (git-fixes).
* net/sched: initialize noop_qdisc owner (git-fixes).
* nfc: pn533: Add poll mod list filling check (git-fixes).
* nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* nfs: make the rpc_stat per net namespace (git-fixes).
* NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).
* NFSD: add security label to struct nfsd_attrs (git-fixes).
* NFSD: fix regression with setting ACLs (git-fixes).
* NFSD: Fix strncpy() fortify warning (git-fixes).
* NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
* NFSD: introduce struct nfsd_attrs (git-fixes).
* NFSD: move from strlcpy with unused retval to strscpy (git-fixes).
* NFSD: Optimize DRC bucket pruning (git-fixes).
* nfsd: return error if nfs4_setacl fails (git-fixes).
* NFSD: set attributes when creating symlinks (git-fixes).
* nfsd: use locks_inode_context helper (git-fixes).
* nilfs2: Remove check for PageError (git-fixes).
* nvme_core: scan namespaces asynchronously (bsc#1224105).
* ocfs2: use coarse time for new created files (git-fixes).
* padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
* platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).
* platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
* platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
* platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).
* platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
* platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
* power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
fixes).
* power: supply: axp288_charger: Round constant_charge_voltage writes down
(git-fixes).
* powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
* powerpc: Mark .opd section read-only (bsc#1194869).
* powerpc: use generic version of arch_is_kernel_initmem_freed()
(bsc#1194869).
* powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
* powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
* powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
(bsc#1194869).
* powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).
* powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
(bsc#1194869).
* powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
* RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
* RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)
* RDMA/rxe: Fix rxe_modify_srq (git-fixes)
* RDMA/rxe: Handle zero length rdma (git-fixes)
* RDMA/rxe: Move work queue code to subroutines (git-fixes)
* s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
* s390/cpacf: Make use of invalid opcode produce a link error (git-fixes
bsc#1227079).
* s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).
* s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229190).
* s390/dasd: fix error recovery leading to data corruption on ESE devices
(git-fixes bsc#1229573).
* s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).
* s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229188).
* spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
* sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
* SUNRPC: Fix a race to wake a sync task (git-fixes).
* swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
* syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* tracing: Return from tracing_buffers_read() if the file has been closed
(bsc#1229136 git-fixes).
* ubifs: add check for crypto_shash_tfm_digest (git-fixes).
* ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
* ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
* ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
fixes).
* vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
* wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
* wifi: mwifiex: duplicate static structs used in driver instances (git-
fixes).
* x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).
* x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-
fixes).
* x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
* x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
* x86/pm: Work around false positive kmemleak report in msr_build_context()
(git-fixes).
* xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
(git-fixes).
* xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3209=1
* SUSE Real Time Module 15-SP5
zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-3209=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3209=1 openSUSE-SLE-15.5-2024-3209=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3209=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3209=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP5 (x86_64)
* kernel-livepatch-5_14_21-150500_13_67-rt-debuginfo-1-150500.11.3.2
* kernel-livepatch-5_14_21-150500_13_67-rt-1-150500.11.3.2
* kernel-livepatch-SLE15-SP5-RT_Update_19-debugsource-1-150500.11.3.2
* SUSE Real Time Module 15-SP5 (x86_64)
* ocfs2-kmp-rt-5.14.21-150500.13.67.3
* kernel-rt-devel-5.14.21-150500.13.67.3
* gfs2-kmp-rt-5.14.21-150500.13.67.3
* kernel-syms-rt-5.14.21-150500.13.67.1
* kernel-rt-vdso-5.14.21-150500.13.67.3
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* kernel-rt_debug-vdso-5.14.21-150500.13.67.3
* kernel-rt-debugsource-5.14.21-150500.13.67.3
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.67.3
* cluster-md-kmp-rt-5.14.21-150500.13.67.3
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* dlm-kmp-rt-5.14.21-150500.13.67.3
* kernel-rt_debug-debugsource-5.14.21-150500.13.67.3
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.67.3
* kernel-rt_debug-debuginfo-5.14.21-150500.13.67.3
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.67.3
* kernel-rt-debuginfo-5.14.21-150500.13.67.3
* kernel-rt_debug-devel-5.14.21-150500.13.67.3
* kernel-rt-devel-debuginfo-5.14.21-150500.13.67.3
* SUSE Real Time Module 15-SP5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.67.3
* kernel-source-rt-5.14.21-150500.13.67.3
* SUSE Real Time Module 15-SP5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.67.3
* kernel-rt-5.14.21-150500.13.67.3
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.67.3
* kernel-source-rt-5.14.21-150500.13.67.3
* openSUSE Leap 15.5 (x86_64)
* ocfs2-kmp-rt-5.14.21-150500.13.67.3
* kernel-rt-devel-5.14.21-150500.13.67.3
* kernel-rt-extra-debuginfo-5.14.21-150500.13.67.3
* gfs2-kmp-rt-5.14.21-150500.13.67.3
* kernel-livepatch-5_14_21-150500_13_67-rt-debuginfo-1-150500.11.3.2
* kselftests-kmp-rt-5.14.21-150500.13.67.3
* kernel-rt-livepatch-devel-5.14.21-150500.13.67.3
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* reiserfs-kmp-rt-5.14.21-150500.13.67.3
* kernel-syms-rt-5.14.21-150500.13.67.1
* kernel-rt-livepatch-5.14.21-150500.13.67.3
* kernel-rt-vdso-5.14.21-150500.13.67.3
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* kernel-rt_debug-vdso-5.14.21-150500.13.67.3
* kernel-rt-debugsource-5.14.21-150500.13.67.3
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.67.3
* cluster-md-kmp-rt-5.14.21-150500.13.67.3
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* dlm-kmp-rt-5.14.21-150500.13.67.3
* kernel-rt_debug-debugsource-5.14.21-150500.13.67.3
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.67.3
* kernel-livepatch-5_14_21-150500_13_67-rt-1-150500.11.3.2
* kernel-rt_debug-debuginfo-5.14.21-150500.13.67.3
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.67.3
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.67.3
* kernel-rt-debuginfo-5.14.21-150500.13.67.3
* kernel-rt_debug-devel-5.14.21-150500.13.67.3
* kernel-livepatch-SLE15-SP5-RT_Update_19-debugsource-1-150500.11.3.2
* kernel-rt-extra-5.14.21-150500.13.67.3
* kernel-rt-optional-5.14.21-150500.13.67.3
* kernel-rt-optional-debuginfo-5.14.21-150500.13.67.3
* kernel-rt-devel-debuginfo-5.14.21-150500.13.67.3
* kernel-rt_debug-livepatch-devel-5.14.21-150500.13.67.3
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.67.3
* kernel-rt-5.14.21-150500.13.67.3
* openSUSE Leap Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.67.3
* openSUSE Leap Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.67.3
* kernel-rt-debuginfo-5.14.21-150500.13.67.3
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.67.3
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.67.3
* kernel-rt-debuginfo-5.14.21-150500.13.67.3
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-source-rt-5.14.21-150500.13.67.3
## References:
* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2021-47106.html
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47546.html
* https://www.suse.com/security/cve/CVE-2022-38457.html
* https://www.suse.com/security/cve/CVE-2022-40133.html
* https://www.suse.com/security/cve/CVE-2022-48645.html
* https://www.suse.com/security/cve/CVE-2022-48706.html
* https://www.suse.com/security/cve/CVE-2022-48808.html
* https://www.suse.com/security/cve/CVE-2022-48865.html
* https://www.suse.com/security/cve/CVE-2022-48868.html
* https://www.suse.com/security/cve/CVE-2022-48869.html
* https://www.suse.com/security/cve/CVE-2022-48870.html
* https://www.suse.com/security/cve/CVE-2022-48871.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48875.html
* https://www.suse.com/security/cve/CVE-2022-48878.html
* https://www.suse.com/security/cve/CVE-2022-48880.html
* https://www.suse.com/security/cve/CVE-2022-48881.html
* https://www.suse.com/security/cve/CVE-2022-48882.html
* https://www.suse.com/security/cve/CVE-2022-48883.html
* https://www.suse.com/security/cve/CVE-2022-48884.html
* https://www.suse.com/security/cve/CVE-2022-48885.html
* https://www.suse.com/security/cve/CVE-2022-48886.html
* https://www.suse.com/security/cve/CVE-2022-48887.html
* https://www.suse.com/security/cve/CVE-2022-48888.html
* https://www.suse.com/security/cve/CVE-2022-48889.html
* https://www.suse.com/security/cve/CVE-2022-48890.html
* https://www.suse.com/security/cve/CVE-2022-48891.html
* https://www.suse.com/security/cve/CVE-2022-48893.html
* https://www.suse.com/security/cve/CVE-2022-48896.html
* https://www.suse.com/security/cve/CVE-2022-48898.html
* https://www.suse.com/security/cve/CVE-2022-48899.html
* https://www.suse.com/security/cve/CVE-2022-48903.html
* https://www.suse.com/security/cve/CVE-2022-48904.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48906.html
* https://www.suse.com/security/cve/CVE-2022-48907.html
* https://www.suse.com/security/cve/CVE-2022-48909.html
* https://www.suse.com/security/cve/CVE-2022-48910.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48913.html
* https://www.suse.com/security/cve/CVE-2022-48914.html
* https://www.suse.com/security/cve/CVE-2022-48915.html
* https://www.suse.com/security/cve/CVE-2022-48916.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48918.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48920.html
* https://www.suse.com/security/cve/CVE-2022-48921.html
* https://www.suse.com/security/cve/CVE-2022-48923.html
* https://www.suse.com/security/cve/CVE-2022-48924.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48927.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48929.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48931.html
* https://www.suse.com/security/cve/CVE-2022-48932.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2022-48937.html
* https://www.suse.com/security/cve/CVE-2022-48938.html
* https://www.suse.com/security/cve/CVE-2022-48939.html
* https://www.suse.com/security/cve/CVE-2022-48940.html
* https://www.suse.com/security/cve/CVE-2022-48941.html
* https://www.suse.com/security/cve/CVE-2022-48942.html
* https://www.suse.com/security/cve/CVE-2022-48943.html
* https://www.suse.com/security/cve/CVE-2023-3610.html
* https://www.suse.com/security/cve/CVE-2023-52458.html
* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52498.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2023-52893.html
* https://www.suse.com/security/cve/CVE-2023-52894.html
* https://www.suse.com/security/cve/CVE-2023-52896.html
* https://www.suse.com/security/cve/CVE-2023-52898.html
* https://www.suse.com/security/cve/CVE-2023-52899.html
* https://www.suse.com/security/cve/CVE-2023-52900.html
* https://www.suse.com/security/cve/CVE-2023-52901.html
* https://www.suse.com/security/cve/CVE-2023-52904.html
* https://www.suse.com/security/cve/CVE-2023-52905.html
* https://www.suse.com/security/cve/CVE-2023-52906.html
* https://www.suse.com/security/cve/CVE-2023-52907.html
* https://www.suse.com/security/cve/CVE-2023-52908.html
* https://www.suse.com/security/cve/CVE-2023-52909.html
* https://www.suse.com/security/cve/CVE-2023-52910.html
* https://www.suse.com/security/cve/CVE-2023-52911.html
* https://www.suse.com/security/cve/CVE-2023-52912.html
* https://www.suse.com/security/cve/CVE-2023-52913.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27016.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35945.html
* https://www.suse.com/security/cve/CVE-2024-35971.html
* https://www.suse.com/security/cve/CVE-2024-36009.html
* https://www.suse.com/security/cve/CVE-2024-36013.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36936.html
* https://www.suse.com/security/cve/CVE-2024-36962.html
* https://www.suse.com/security/cve/CVE-2024-38554.html
* https://www.suse.com/security/cve/CVE-2024-38602.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40980.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41042.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194111
* https://bugzilla.suse.com/show_bug.cgi?id=1194765
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196261
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196894
* https://bugzilla.suse.com/show_bug.cgi?id=1198017
* https://bugzilla.suse.com/show_bug.cgi?id=1203329
* https://bugzilla.suse.com/show_bug.cgi?id=1203330
* https://bugzilla.suse.com/show_bug.cgi?id=1203360
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1206006
* https://bugzilla.suse.com/show_bug.cgi?id=1206258
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1207158
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1213580
* https://bugzilla.suse.com/show_bug.cgi?id=1213632
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220428
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220962
* https://bugzilla.suse.com/show_bug.cgi?id=1221269
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223508
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1223807
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224542
* https://bugzilla.suse.com/show_bug.cgi?id=1224578
* https://bugzilla.suse.com/show_bug.cgi?id=1224639
* https://bugzilla.suse.com/show_bug.cgi?id=1225162
* https://bugzilla.suse.com/show_bug.cgi?id=1225352
* https://bugzilla.suse.com/show_bug.cgi?id=1225428
* https://bugzilla.suse.com/show_bug.cgi?id=1225524
* https://bugzilla.suse.com/show_bug.cgi?id=1225578
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225773
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225827
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226168
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226613
* https://bugzilla.suse.com/show_bug.cgi?id=1226742
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1227079
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227937
* https://bugzilla.suse.com/show_bug.cgi?id=1227958
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228065
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228526
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229187
* https://bugzilla.suse.com/show_bug.cgi?id=1229188
* https://bugzilla.suse.com/show_bug.cgi?id=1229190
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229418
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229453
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229506
* https://bugzilla.suse.com/show_bug.cgi?id=1229507
* https://bugzilla.suse.com/show_bug.cgi?id=1229508
* https://bugzilla.suse.com/show_bug.cgi?id=1229509
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229516
* https://bugzilla.suse.com/show_bug.cgi?id=1229521
* https://bugzilla.suse.com/show_bug.cgi?id=1229522
* https://bugzilla.suse.com/show_bug.cgi?id=1229523
* https://bugzilla.suse.com/show_bug.cgi?id=1229524
* https://bugzilla.suse.com/show_bug.cgi?id=1229525
* https://bugzilla.suse.com/show_bug.cgi?id=1229526
* https://bugzilla.suse.com/show_bug.cgi?id=1229527
* https://bugzilla.suse.com/show_bug.cgi?id=1229528
* https://bugzilla.suse.com/show_bug.cgi?id=1229529
* https://bugzilla.suse.com/show_bug.cgi?id=1229531
* https://bugzilla.suse.com/show_bug.cgi?id=1229533
* https://bugzilla.suse.com/show_bug.cgi?id=1229535
* https://bugzilla.suse.com/show_bug.cgi?id=1229536
* https://bugzilla.suse.com/show_bug.cgi?id=1229537
* https://bugzilla.suse.com/show_bug.cgi?id=1229540
* https://bugzilla.suse.com/show_bug.cgi?id=1229544
* https://bugzilla.suse.com/show_bug.cgi?id=1229545
* https://bugzilla.suse.com/show_bug.cgi?id=1229546
* https://bugzilla.suse.com/show_bug.cgi?id=1229547
* https://bugzilla.suse.com/show_bug.cgi?id=1229548
* https://bugzilla.suse.com/show_bug.cgi?id=1229554
* https://bugzilla.suse.com/show_bug.cgi?id=1229557
* https://bugzilla.suse.com/show_bug.cgi?id=1229558
* https://bugzilla.suse.com/show_bug.cgi?id=1229559
* https://bugzilla.suse.com/show_bug.cgi?id=1229560
* https://bugzilla.suse.com/show_bug.cgi?id=1229562
* https://bugzilla.suse.com/show_bug.cgi?id=1229564
* https://bugzilla.suse.com/show_bug.cgi?id=1229565
* https://bugzilla.suse.com/show_bug.cgi?id=1229566
* https://bugzilla.suse.com/show_bug.cgi?id=1229568
* https://bugzilla.suse.com/show_bug.cgi?id=1229569
* https://bugzilla.suse.com/show_bug.cgi?id=1229572
* https://bugzilla.suse.com/show_bug.cgi?id=1229573
* https://bugzilla.suse.com/show_bug.cgi?id=1229576
* https://bugzilla.suse.com/show_bug.cgi?id=1229581
* https://bugzilla.suse.com/show_bug.cgi?id=1229588
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229603
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229605
* https://bugzilla.suse.com/show_bug.cgi?id=1229608
* https://bugzilla.suse.com/show_bug.cgi?id=1229611
* https://bugzilla.suse.com/show_bug.cgi?id=1229612
* https://bugzilla.suse.com/show_bug.cgi?id=1229613
* https://bugzilla.suse.com/show_bug.cgi?id=1229614
* https://bugzilla.suse.com/show_bug.cgi?id=1229615
* https://bugzilla.suse.com/show_bug.cgi?id=1229616
* https://bugzilla.suse.com/show_bug.cgi?id=1229617
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229622
* https://bugzilla.suse.com/show_bug.cgi?id=1229623
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229625
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229628
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229631
* https://bugzilla.suse.com/show_bug.cgi?id=1229632
* https://bugzilla.suse.com/show_bug.cgi?id=1229635
* https://bugzilla.suse.com/show_bug.cgi?id=1229636
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229638
* https://bugzilla.suse.com/show_bug.cgi?id=1229639
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229642
* https://bugzilla.suse.com/show_bug.cgi?id=1229643
* https://bugzilla.suse.com/show_bug.cgi?id=1229645
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229658
* https://bugzilla.suse.com/show_bug.cgi?id=1229662
* https://bugzilla.suse.com/show_bug.cgi?id=1229664
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8779
1
0
openSUSE-RU-2024:0298-1: moderate: Recommended update for virtme
by maintenance@opensuse.org 11 Sep '24
by maintenance@opensuse.org 11 Sep '24
11 Sep '24
openSUSE Recommended Update: Recommended update for virtme
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0298-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for virtme fixes the following issues:
- Update to 1.28:
* setup.py: include dependencies parsing requirements.txt
* virtme-ng: fix typo in command help
* virtme-configkernel: disable nvram support
* configkernel: config comment cosmetics
* configkernel: act more like kernel's make O=outdir
* vng-run: get kdir from O=outdir
* vng: propagate --verbose to configkernel
* vng: alias --custom to --config
* run.py: add a --qemu-opts='...' option bundling hint to help
* init: Always create /run/tmp folder
* Don't require ".git" to be a directory
* Specify "refs/heads/__virtme__" in git push
- Update to 1.27:
* Introduce VNG_PACKAGE to force a proper packaging version virtme-ng
v1.27
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-298=1
Package List:
- openSUSE Backports SLE-15-SP5 (noarch):
virtme-1.28-bp155.5.25.1
References:
1
0
openSUSE-SU-2024:0300-1: moderate: Security update for ntpd-rs
by opensuse-security@opensuse.org 11 Sep '24
by opensuse-security@opensuse.org 11 Sep '24
11 Sep '24
openSUSE Security Update: Security update for ntpd-rs
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0300-1
Rating: moderate
References:
Cross-References: CVE-2024-38528
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for ntpd-rs fixes the following issues:
- Introducing ntpd-rs version 1.2.3
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-300=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
ntpd-rs-1.2.3-bp156.2.1
- openSUSE Backports SLE-15-SP6 (noarch):
ntpd-rs-common-1.2.3-bp156.2.1
References:
https://www.suse.com/security/cve/CVE-2024-38528.html
1
0
openSUSE-RU-2024:0299-1: moderate: Recommended update for virtme
by maintenance@opensuse.org 11 Sep '24
by maintenance@opensuse.org 11 Sep '24
11 Sep '24
openSUSE Recommended Update: Recommended update for virtme
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0299-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for virtme fixes the following issues:
- Update to 1.28:
* setup.py: include dependencies parsing requirements.txt
* virtme-ng: fix typo in command help
* virtme-configkernel: disable nvram support
* configkernel: config comment cosmetics
* configkernel: act more like kernel's make O=outdir
* vng-run: get kdir from O=outdir
* vng: propagate --verbose to configkernel
* vng: alias --custom to --config
* run.py: add a --qemu-opts='...' option bundling hint to help
* init: Always create /run/tmp folder
* Don't require ".git" to be a directory
* Specify "refs/heads/__virtme__" in git push
- Update to 1.27:
* Introduce VNG_PACKAGE to force a proper packaging version virtme-ng
v1.27
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-299=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
virtme-1.28-bp156.2.9.1
References:
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:3204-1
Rating: moderate
References:
* bsc#1230093
Cross-References:
* CVE-2024-8096
CVSS scores:
* CVE-2024-8096 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-8096 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-8096: OCSP stapling bypass with GnuTLS. (bsc#1230093)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3204=1 openSUSE-SLE-15.6-2024-3204=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3204=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libcurl4-8.6.0-150600.4.6.1
* libcurl-devel-8.6.0-150600.4.6.1
* libcurl4-debuginfo-8.6.0-150600.4.6.1
* curl-debuginfo-8.6.0-150600.4.6.1
* curl-8.6.0-150600.4.6.1
* curl-debugsource-8.6.0-150600.4.6.1
* openSUSE Leap 15.6 (x86_64)
* libcurl4-32bit-debuginfo-8.6.0-150600.4.6.1
* libcurl-devel-32bit-8.6.0-150600.4.6.1
* libcurl4-32bit-8.6.0-150600.4.6.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcurl-devel-64bit-8.6.0-150600.4.6.1
* libcurl4-64bit-8.6.0-150600.4.6.1
* libcurl4-64bit-debuginfo-8.6.0-150600.4.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.6.0-150600.4.6.1
* libcurl-devel-8.6.0-150600.4.6.1
* libcurl4-debuginfo-8.6.0-150600.4.6.1
* curl-debuginfo-8.6.0-150600.4.6.1
* curl-8.6.0-150600.4.6.1
* curl-debugsource-8.6.0-150600.4.6.1
* Basesystem Module 15-SP6 (x86_64)
* libcurl4-32bit-debuginfo-8.6.0-150600.4.6.1
* libcurl4-32bit-8.6.0-150600.4.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-8096.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230093
1
0
11 Sep '24
# Recommended update for mariadb
Announcement ID: SUSE-RU-2024:3205-1
Rating: moderate
References:
Affected Products:
* Galera for Ericsson 15 SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for mariadb fixes the following issue:
* Update to 10.11.9
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3205=1 openSUSE-SLE-15.6-2024-3205=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3205=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3205=1
* Galera for Ericsson 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-ERICSSON-2024-3205=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libmariadbd19-10.11.9-150600.4.6.1
* mariadb-galera-10.11.9-150600.4.6.1
* mariadb-tools-debuginfo-10.11.9-150600.4.6.1
* mariadb-10.11.9-150600.4.6.1
* mariadb-debugsource-10.11.9-150600.4.6.1
* mariadb-client-debuginfo-10.11.9-150600.4.6.1
* mariadb-tools-10.11.9-150600.4.6.1
* mariadb-bench-debuginfo-10.11.9-150600.4.6.1
* mariadb-rpm-macros-10.11.9-150600.4.6.1
* mariadb-debuginfo-10.11.9-150600.4.6.1
* mariadb-test-debuginfo-10.11.9-150600.4.6.1
* libmariadbd19-debuginfo-10.11.9-150600.4.6.1
* mariadb-bench-10.11.9-150600.4.6.1
* libmariadbd-devel-10.11.9-150600.4.6.1
* mariadb-client-10.11.9-150600.4.6.1
* mariadb-test-10.11.9-150600.4.6.1
* openSUSE Leap 15.6 (noarch)
* mariadb-errormessages-10.11.9-150600.4.6.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* mariadb-galera-10.11.9-150600.4.6.1
* mariadb-debuginfo-10.11.9-150600.4.6.1
* mariadb-debugsource-10.11.9-150600.4.6.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libmariadbd19-10.11.9-150600.4.6.1
* mariadb-tools-debuginfo-10.11.9-150600.4.6.1
* mariadb-10.11.9-150600.4.6.1
* mariadb-debugsource-10.11.9-150600.4.6.1
* mariadb-client-debuginfo-10.11.9-150600.4.6.1
* mariadb-debuginfo-10.11.9-150600.4.6.1
* libmariadbd19-debuginfo-10.11.9-150600.4.6.1
* libmariadbd-devel-10.11.9-150600.4.6.1
* mariadb-client-10.11.9-150600.4.6.1
* mariadb-tools-10.11.9-150600.4.6.1
* Server Applications Module 15-SP6 (noarch)
* mariadb-errormessages-10.11.9-150600.4.6.1
* Galera for Ericsson 15 SP6 (x86_64)
* mariadb-galera-10.11.9-150600.4.6.1
* mariadb-debuginfo-10.11.9-150600.4.6.1
* mariadb-debugsource-10.11.9-150600.4.6.1
1
0
11 Sep '24
# Recommended update for snapper
Announcement ID: SUSE-RU-2024:3206-1
Rating: moderate
References:
* bsc#1229142
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for snapper fixes the following issues:
* handle content-length of stomp in zypper plugin (bsc#1229142)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3206=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3206=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3206=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3206=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3206=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3206=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3206=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3206=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3206=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3206=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3206=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3206=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3206=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3206=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3206=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3206=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3206=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3206=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3206=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3206=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3206=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3206=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3206=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3206=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3206=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3206=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-testsuite-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* snapper-testsuite-debuginfo-0.8.16-150300.3.9.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-testsuite-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* snapper-testsuite-debuginfo-0.8.16-150300.3.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-testsuite-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* snapper-testsuite-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* pam_snapper-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* libsnapper-devel-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* snapper-zypp-plugin-debuginfo-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* snapper-zypp-plugin-0.8.16-150300.3.9.1
* pam_snapper-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libsnapper5-0.8.16-150300.3.9.1
* snapper-debugsource-0.8.16-150300.3.9.1
* snapper-0.8.16-150300.3.9.1
* libsnapper5-debuginfo-0.8.16-150300.3.9.1
* snapper-debuginfo-0.8.16-150300.3.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229142
1
0
SUSE-RU-2024:3199-1: moderate: Recommended update for yast2-installation
by OPENSUSE-UPDATES 11 Sep '24
by OPENSUSE-UPDATES 11 Sep '24
11 Sep '24
# Recommended update for yast2-installation
Announcement ID: SUSE-RU-2024:3199-1
Rating: moderate
References:
* bsc#1181625
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for yast2-installation fixes the following issue:
* Don't block in AutoYaST upgrade (bsc#1181625).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3199=1 SUSE-2024-3199=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3199=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* yast2-installation-4.6.13-150600.3.3.3
* Basesystem Module 15-SP6 (noarch)
* yast2-installation-4.6.13-150600.3.3.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1181625
1
0
11 Sep '24
# Security update for python311
Announcement ID: SUSE-SU-2024:3200-1
Rating: important
References:
* bsc#1225660
* bsc#1227378
* bsc#1227999
* bsc#1228780
Cross-References:
* CVE-2024-6923
CVSS scores:
* CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability and has three security fixes can now be
installed.
## Description:
This update for python311 fixes the following issues:
* CVE-2024-6923: Fixed email header injection due to unquoted newlines
(bsc#1228780)
Other fixes: \- %{profileopt} variable is set according to the variable
%{do_profiling} (bsc#1227999) \- Stop using %%defattr, it seems to be breaking
proper executable attributes on /usr/bin/ scripts (bsc#1227378) \- Make pip and
modern tools install directly in /usr/local when used by the user (bsc#1225660)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3200=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3200=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3200=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3200=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3200=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3200=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-3200=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3200=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3200=1
## Package List:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-tk-3.11.9-150400.9.32.4
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-testsuite-debuginfo-3.11.9-150400.9.32.3
* python311-testsuite-3.11.9-150400.9.32.3
* python311-doc-3.11.9-150400.9.32.1
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-3.11.9-150400.9.32.4
* python311-devel-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-debugsource-3.11.9-150400.9.32.4
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-dbm-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* openSUSE Leap 15.4 (x86_64)
* python311-base-32bit-debuginfo-3.11.9-150400.9.32.3
* python311-32bit-3.11.9-150400.9.32.4
* python311-base-32bit-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-debuginfo-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-3.11.9-150400.9.32.3
* python311-32bit-debuginfo-3.11.9-150400.9.32.4
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpython3_11-1_0-64bit-3.11.9-150400.9.32.3
* python311-64bit-debuginfo-3.11.9-150400.9.32.4
* libpython3_11-1_0-64bit-debuginfo-3.11.9-150400.9.32.3
* python311-base-64bit-3.11.9-150400.9.32.3
* python311-64bit-3.11.9-150400.9.32.4
* python311-base-64bit-debuginfo-3.11.9-150400.9.32.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-testsuite-debuginfo-3.11.9-150400.9.32.3
* python311-testsuite-3.11.9-150400.9.32.3
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-devel-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-debugsource-3.11.9-150400.9.32.4
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-dbm-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* openSUSE Leap 15.5 (x86_64)
* python311-base-32bit-debuginfo-3.11.9-150400.9.32.3
* python311-32bit-3.11.9-150400.9.32.4
* python311-base-32bit-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-debuginfo-3.11.9-150400.9.32.3
* libpython3_11-1_0-32bit-3.11.9-150400.9.32.3
* python311-32bit-debuginfo-3.11.9-150400.9.32.4
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-3.11.9-150400.9.32.4
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpython3_11-1_0-debuginfo-3.11.9-150400.9.32.3
* python311-curses-3.11.9-150400.9.32.4
* python311-curses-debuginfo-3.11.9-150400.9.32.4
* python311-dbm-3.11.9-150400.9.32.4
* python311-debuginfo-3.11.9-150400.9.32.4
* python311-doc-3.11.9-150400.9.32.1
* python311-3.11.9-150400.9.32.4
* python311-dbm-debuginfo-3.11.9-150400.9.32.4
* python311-debugsource-3.11.9-150400.9.32.4
* python311-core-debugsource-3.11.9-150400.9.32.3
* python311-doc-devhelp-3.11.9-150400.9.32.1
* python311-devel-3.11.9-150400.9.32.3
* python311-tk-debuginfo-3.11.9-150400.9.32.4
* python311-tools-3.11.9-150400.9.32.3
* libpython3_11-1_0-3.11.9-150400.9.32.3
* python311-base-3.11.9-150400.9.32.3
* python311-tk-3.11.9-150400.9.32.4
* python311-base-debuginfo-3.11.9-150400.9.32.3
* python311-idle-3.11.9-150400.9.32.4
## References:
* https://www.suse.com/security/cve/CVE-2024-6923.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225660
* https://bugzilla.suse.com/show_bug.cgi?id=1227378
* https://bugzilla.suse.com/show_bug.cgi?id=1227999
* https://bugzilla.suse.com/show_bug.cgi?id=1228780
1
0
SUSE-RU-2024:3201-1: moderate: Recommended update for yast2-installation
by OPENSUSE-UPDATES 11 Sep '24
by OPENSUSE-UPDATES 11 Sep '24
11 Sep '24
# Recommended update for yast2-installation
Announcement ID: SUSE-RU-2024:3201-1
Rating: moderate
References:
* bsc#1181625
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for yast2-installation fixes the following issue:
* Don't block in AutoYaST upgrade (bsc#1181625).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3201=1 openSUSE-SLE-15.5-2024-3201=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3201=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* yast2-installation-4.5.20-150500.3.12.3
* Basesystem Module 15-SP5 (noarch)
* yast2-installation-4.5.20-150500.3.12.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1181625
1
0
openSUSE-RU-2024:0297-1: moderate: Recommended update for lsyncd
by maintenance@opensuse.org 10 Sep '24
by maintenance@opensuse.org 10 Sep '24
10 Sep '24
openSUSE Recommended Update: Recommended update for lsyncd
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0297-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for lsyncd fixes the following issues:
update to version 2.3.1 (2022-11-17):
* multiple bugfixes, style fixes
* add nix flake support
* add support for tunnel commands
* add support for batchSizeLimit
* add -onepass option
* add crontab support
* support relative executable paths
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-297=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-297=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
lsyncd-2.3.1-bp156.4.3.1
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
lsyncd-2.3.1-bp155.3.3.1
lsyncd-debuginfo-2.3.1-bp155.3.3.1
lsyncd-debugsource-2.3.1-bp155.3.3.1
References:
1
0
10 Sep '24
# Security update for python-Django
Announcement ID: SUSE-SU-2024:3187-1
Rating: important
References:
* bsc#1229823
Cross-References:
* CVE-2024-45230
CVSS scores:
* CVE-2024-45230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
An update that solves one vulnerability can now be installed.
## Description:
This update for python-Django fixes the following issues:
There is an issue with the previous fix for CVE-2024-45230. Please consider the
following vulnerability fixed only after the installation of this update. \-
CVE-2024-45230: Fixed potential denial-of-service vulnerability in
django.utils.html.urlize(). (bsc#1229823)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3187=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* python3-Django-2.0.7-150000.1.36.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45230.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229823
1
0
10 Sep '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3190-1
Rating: important
References:
* bsc#1193629
* bsc#1194111
* bsc#1194765
* bsc#1194869
* bsc#1196261
* bsc#1196516
* bsc#1196894
* bsc#1198017
* bsc#1203329
* bsc#1203330
* bsc#1203360
* bsc#1205462
* bsc#1206006
* bsc#1206258
* bsc#1206843
* bsc#1207158
* bsc#1208783
* bsc#1210644
* bsc#1213580
* bsc#1213632
* bsc#1214285
* bsc#1216834
* bsc#1220428
* bsc#1220877
* bsc#1220962
* bsc#1221269
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1222335
* bsc#1222350
* bsc#1222372
* bsc#1222387
* bsc#1222634
* bsc#1222808
* bsc#1222967
* bsc#1223074
* bsc#1223191
* bsc#1223508
* bsc#1223720
* bsc#1223742
* bsc#1223777
* bsc#1223803
* bsc#1223807
* bsc#1224105
* bsc#1224415
* bsc#1224496
* bsc#1224510
* bsc#1224542
* bsc#1224578
* bsc#1224639
* bsc#1225162
* bsc#1225352
* bsc#1225428
* bsc#1225524
* bsc#1225578
* bsc#1225582
* bsc#1225773
* bsc#1225814
* bsc#1225827
* bsc#1225832
* bsc#1225903
* bsc#1226168
* bsc#1226530
* bsc#1226613
* bsc#1226742
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226874
* bsc#1226885
* bsc#1227079
* bsc#1227623
* bsc#1227761
* bsc#1227830
* bsc#1227863
* bsc#1227867
* bsc#1227929
* bsc#1227937
* bsc#1227958
* bsc#1228020
* bsc#1228065
* bsc#1228114
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228469
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228501
* bsc#1228503
* bsc#1228509
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228526
* bsc#1228531
* bsc#1228563
* bsc#1228564
* bsc#1228567
* bsc#1228576
* bsc#1228579
* bsc#1228584
* bsc#1228588
* bsc#1228590
* bsc#1228615
* bsc#1228616
* bsc#1228635
* bsc#1228636
* bsc#1228654
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228667
* bsc#1228673
* bsc#1228677
* bsc#1228687
* bsc#1228706
* bsc#1228708
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228748
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228979
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229042
* bsc#1229054
* bsc#1229086
* bsc#1229136
* bsc#1229154
* bsc#1229187
* bsc#1229188
* bsc#1229190
* bsc#1229287
* bsc#1229290
* bsc#1229292
* bsc#1229296
* bsc#1229297
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229314
* bsc#1229315
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229327
* bsc#1229341
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229354
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229366
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229418
* bsc#1229444
* bsc#1229453
* bsc#1229454
* bsc#1229481
* bsc#1229482
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229506
* bsc#1229507
* bsc#1229508
* bsc#1229509
* bsc#1229510
* bsc#1229512
* bsc#1229516
* bsc#1229521
* bsc#1229522
* bsc#1229523
* bsc#1229524
* bsc#1229525
* bsc#1229526
* bsc#1229527
* bsc#1229528
* bsc#1229529
* bsc#1229531
* bsc#1229533
* bsc#1229535
* bsc#1229536
* bsc#1229537
* bsc#1229540
* bsc#1229544
* bsc#1229545
* bsc#1229546
* bsc#1229547
* bsc#1229548
* bsc#1229554
* bsc#1229557
* bsc#1229558
* bsc#1229559
* bsc#1229560
* bsc#1229562
* bsc#1229564
* bsc#1229565
* bsc#1229566
* bsc#1229568
* bsc#1229569
* bsc#1229572
* bsc#1229573
* bsc#1229576
* bsc#1229581
* bsc#1229588
* bsc#1229598
* bsc#1229603
* bsc#1229604
* bsc#1229605
* bsc#1229608
* bsc#1229611
* bsc#1229612
* bsc#1229613
* bsc#1229614
* bsc#1229615
* bsc#1229616
* bsc#1229617
* bsc#1229620
* bsc#1229622
* bsc#1229623
* bsc#1229624
* bsc#1229625
* bsc#1229626
* bsc#1229628
* bsc#1229629
* bsc#1229630
* bsc#1229631
* bsc#1229632
* bsc#1229635
* bsc#1229636
* bsc#1229637
* bsc#1229638
* bsc#1229639
* bsc#1229641
* bsc#1229642
* bsc#1229643
* bsc#1229645
* bsc#1229657
* bsc#1229658
* bsc#1229662
* bsc#1229664
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229768
* bsc#1229781
* bsc#1229784
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* jsc#PED-8491
* jsc#PED-8779
Cross-References:
* CVE-2021-4441
* CVE-2021-47106
* CVE-2021-47517
* CVE-2021-47546
* CVE-2022-38457
* CVE-2022-40133
* CVE-2022-48645
* CVE-2022-48706
* CVE-2022-48808
* CVE-2022-48865
* CVE-2022-48868
* CVE-2022-48869
* CVE-2022-48870
* CVE-2022-48871
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48875
* CVE-2022-48878
* CVE-2022-48880
* CVE-2022-48881
* CVE-2022-48882
* CVE-2022-48883
* CVE-2022-48884
* CVE-2022-48885
* CVE-2022-48886
* CVE-2022-48887
* CVE-2022-48888
* CVE-2022-48889
* CVE-2022-48890
* CVE-2022-48891
* CVE-2022-48893
* CVE-2022-48896
* CVE-2022-48898
* CVE-2022-48899
* CVE-2022-48903
* CVE-2022-48904
* CVE-2022-48905
* CVE-2022-48906
* CVE-2022-48907
* CVE-2022-48909
* CVE-2022-48910
* CVE-2022-48912
* CVE-2022-48913
* CVE-2022-48914
* CVE-2022-48915
* CVE-2022-48916
* CVE-2022-48917
* CVE-2022-48918
* CVE-2022-48919
* CVE-2022-48920
* CVE-2022-48921
* CVE-2022-48923
* CVE-2022-48924
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48927
* CVE-2022-48928
* CVE-2022-48929
* CVE-2022-48930
* CVE-2022-48931
* CVE-2022-48932
* CVE-2022-48934
* CVE-2022-48937
* CVE-2022-48938
* CVE-2022-48939
* CVE-2022-48940
* CVE-2022-48941
* CVE-2022-48942
* CVE-2022-48943
* CVE-2023-3610
* CVE-2023-52458
* CVE-2023-52489
* CVE-2023-52498
* CVE-2023-52581
* CVE-2023-52859
* CVE-2023-52887
* CVE-2023-52889
* CVE-2023-52893
* CVE-2023-52894
* CVE-2023-52896
* CVE-2023-52898
* CVE-2023-52899
* CVE-2023-52900
* CVE-2023-52901
* CVE-2023-52904
* CVE-2023-52905
* CVE-2023-52906
* CVE-2023-52907
* CVE-2023-52908
* CVE-2023-52909
* CVE-2023-52910
* CVE-2023-52911
* CVE-2023-52912
* CVE-2023-52913
* CVE-2024-26631
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26735
* CVE-2024-26808
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26851
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27016
* CVE-2024-27024
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-31076
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35945
* CVE-2024-35971
* CVE-2024-36009
* CVE-2024-36013
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36489
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36936
* CVE-2024-36962
* CVE-2024-38554
* CVE-2024-38602
* CVE-2024-38662
* CVE-2024-39489
* CVE-2024-40905
* CVE-2024-40978
* CVE-2024-40980
* CVE-2024-40995
* CVE-2024-41000
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41042
* CVE-2024-41045
* CVE-2024-41056
* CVE-2024-41060
* CVE-2024-41062
* CVE-2024-41065
* CVE-2024-41068
* CVE-2024-41073
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41095
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42069
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42095
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42110
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42137
* CVE-2024-42139
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42225
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42244
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42268
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42315
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43849
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43904
* CVE-2024-43905
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-44938
* CVE-2024-44939
* CVE-2024-44947
CVSS scores:
* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47106 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-40133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-40133 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-48645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48808 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48878 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48880 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48881 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48882 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48883 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48883 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48884 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48884 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48885 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48885 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48906 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48910 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48923 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48938 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52912 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52912 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* Public Cloud Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 292 vulnerabilities, contains two features and has 45
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
* CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
* CVE-2024-43893: Check uartclk for zero to avoid divide by zero
(bsc#1229759).
* CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
* CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
* CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
* CVE-2024-44939: fix null ptr deref in dtInsertEntry (bsc#1229820).
* CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
* CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
* CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
* CVE-2024-43904: Add null checks for 'stream' and 'plane' before
dereferencing (bsc#1229768)
* CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
* CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
* CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
* CVE-2022-48920: Get rid of warning on transaction commit when using
flushoncommit (bsc#1229658).
* CVE-2023-52906: Fix warning during failed attribute validation
(bsc#1229527).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
* CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
* CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is
large (bsc#1229605)
* CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
* CVE-2024-42156: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2023-52899: Add exception protection processing for vd in
axi_chan_handle_err function (bsc#1229569).
* CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
* CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
* CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
* CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy()
(bsc#1220962)
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225428).
* CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
* CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
* CVE-2024-35897: Discard table flag update with pending basechain deletion
(bsc#1224510).
* CVE-2024-27403: Restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
* CVE-2024-43819: Reject memory region operations for ucontrol VMs
(bsc#1229290 git-fixes).
* CVE-2024-26668: Reject configurations that cause integer overflow
(bsc#1222335).
* CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
* CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
(bsc#1222634).
* CVE-2024-27016: Validate pppoe header (bsc#1223807).
* CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
* CVE-2023-52581: Fix memleak when more than 255 elements expired
(bsc#1220877).
* CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
* CVE-2024-43837: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
* CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
* CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
(bsc#1226801)
* CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
* CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157
git-fixes).
* CVE-2024-26677: Blacklist e7870cf13d20 ("rxrpc: Fix delayed ACKs to not set
the reference serial number") (bsc#1222387)
* CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue")
(bsc#1224542)
* CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
* CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
* CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error
(bsc#1229382)
* CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
* CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-43854: Initialize integrity buffer to zero before writing it to
media (bsc#1229345)
* CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
* CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
* CVE-2024-42318: Do not lose track of restrictions on cred_transfer
(bsc#1229351).
* CVE-2024-26669: Fix chain template offload (bsc#1222350).
* CVE-2023-52889: Fix null pointer deref when receiving skb during sock
creation (bsc#1229287,).
* CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features()
(bsc#1223508).
* CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-36933: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block()
(bsc#1229370).
* CVE-2024-42319: Move devm_mbox_controller_register() after
devm_pm_runtime_enable() (bsc#1229350).
* CVE-2024-43860: Skip over memory region when node value is NULL
(bsc#1229319).
* CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
* CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
* CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
* CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures
(bsc#1229301).
* CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
* CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers()
(bsc#1228616).
* CVE-2024-42246: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
(bsc#1226885).
* CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
__netif_rx() (bsc#1228501).
* CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
* CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
* CVE-2023-52498: Fix possible deadlocks in core system-wide PM code
(bsc#1221269).
* CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
* CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown
(bsc#1227958).
* CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
* CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
* CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42139: Fix improper extts handling (bsc#1228503).
* CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
* CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
* CVE-2024-42162: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
* CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
* CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
exploited to achieve local privilege escalation (bsc#1213580).
* CVE-2024-42228: Using uninitialized value *size when calling
amdgpu_vce_cs_reloc (bsc#1228667).
* CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
(bsc#1227830).
* CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (git-fixes
CVE-2024-38602 bsc#1226613).
* CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
* CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).
The following non-security bugs were fixed:
* ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-
fixes).
* ACPI: bus: Rework system-level device notification handling (git-fixes).
* ACPI: thermal: Drop nocrt parameter (git-fixes).
* ACPI: x86: s2idle: Post-increment variables when getting constraints (git-
fixes).
* afs: Do not cross .backup mountpoint from backup volume (git-fixes).
* ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-
fixes).
* ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks
(stable-fixes).
* ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-
fixes).
* ALSA: line6: Fix racy access to midibuf (stable-fixes).
* ALSA: timer: Relax start tick time check for slave timer elements (git-
fixes).
* ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-
fixes).
* ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
* ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
* ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-
fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-
fixes)
* arm64: barrier: Restore spec_bar() macro (git-fixes)
* arm64: cpufeature: Add missing .field_width for GIC system registers (git-
fixes)
* arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)
* arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-
fixes)
* arm64: cputype: Add Cortex-A720 definitions (git-fixes)
* arm64: cputype: Add Cortex-A725 definitions (git-fixes)
* arm64: cputype: Add Cortex-X1C definitions (git-fixes)
* arm64: cputype: Add Cortex-X3 definitions (git-fixes)
* arm64: cputype: Add Cortex-X4 definitions (git-fixes)
* arm64: cputype: Add Cortex-X925 definitions (git-fixes)
* arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
* arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: errata: Add workaround for Arm errata 3194386 and 3312417 (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: errata: Expand speculative SSBS workaround (git-fixes)
* arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update
default configuration.
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
* ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
* ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
* async: Introduce async_schedule_dev_nocall() (bsc#1221269).
* async: Split async_schedule_node_domain() (bsc#1221269).
* Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
* Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
* Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-
fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
* btrfs: fix leak of qgroup extent records after transaction abort (git-
fixes).
* btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).
* btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).
* btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
* cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop
(bsc#1229418).
* ceph: issue a cap release immediately if no cap exists (bsc#1225162).
* ceph: periodically flush the cap releases (bsc#1225162).
* cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).
* docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
* drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).
* drm: panel-orientation-quirks: Add labels for both Valve Steam Deck
revisions (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-
fixes).
* drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
* drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values
can be stored (stable-fixes).
* drm/amd/display: Add NULL check for 'afb' before dereferencing in
amdgpu_dm_plane_handle_cursor_update (stable-fixes).
* drm/amd/display: avoid using null object of framebuffer (git-fixes).
* drm/amd/display: Fix && vs || typos (git-fixes).
* drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-
fixes).
* drm/amd/display: Validate hw_points_num before using it (stable-fixes).
* drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-
fixes).
* drm/amdgpu: Actually check flags for all context ops (stable-fixes).
* drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
* drm/amdgpu: fix dereference null return value for the function
amdgpu_vm_pt_parent (stable-fixes).
* drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
* drm/amdgpu: Validate TA binary size (stable-fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
* drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules
(stable-fixes).
* drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
* drm/bridge: analogix_dp: properly handle zero sized AUX transactions
(stable-fixes).
* drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
* drm/client: fix null pointer dereference in drm_client_modeset_probe (git-
fixes).
* drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
* drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
* drm/msm/dp: reset the link phy params before link training (git-fixes).
* drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
* drm/msm/dpu: do not play tricks with debug macros (git-fixes).
* drm/tegra: Zero-initialize iosys_map (stable-fixes).
* exfat: fix inode->i_blocks for non-512 byte sector size device (git-fixes).
* exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
* exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).
* exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
* fs/netfs/fscache_cookie: add missing "n_accesses" check (bsc#1229453).
* fuse: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* genirq: Add might_sleep() to disable_irq() (git-fixes).
* genirq: Always limit the affinity to online CPUs (git-fixes).
* genirq: Do not return error on missing optional irq_request_resources()
(git-fixes).
* genirq: Take the proposed affinity at face value if force==true (git-fixes).
* genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-
fixes).
* genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-
fixes).
* genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-
fixes).
* genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).
* genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-
fixes).
* genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-
fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()
(git-fixes).
* i2c: smbus: Improve handling of stuck alerts (git-fixes).
* i2c: smbus: Send alert notifications to all devices if source not found
(git-fixes).
* iommu/amd: Convert comma to semicolon (git-fixes).
* ip6_tunnel: Fix broken GRO (bsc#1229444).
* ipv6: sr: fix incorrect unregister order (git-fixes).
* irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).
* irqdomain: Fix association race (git-fixes).
* irqdomain: Fix disassociation race (git-fixes).
* irqdomain: Fix domain registration race (git-fixes).
* irqdomain: Fix mapping-creation race (git-fixes).
* irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
* irqdomain: Look for existing mapping only once (git-fixes).
* irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).
* irqdomain: Report irq number for NOMAP domains (git-fixes).
* kprobes: Fix to check symbol prefixes correctly (git-fixes).
* lockd: move from strlcpy with unused retval to strscpy (git-fixes).
* memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
* mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
* mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
* mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
* net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-
fixes).
* net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).
* net: ks8851: Fix potential TX stall after interface reopen (git-fixes).
* net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
* net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* net: mana: Fix doorbell out of order violation and avoid unnecessary
doorbell rings (bsc#1229154).
* net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-
fixes).
* net: mana: Fix RX buf alloc_size alignment and atomic op panic
(bsc#1229086).
* net: remove two BUG() from skb_checksum_help() (bsc#1229312).
* net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
* net/rds: fix possible cp null dereference (git-fixes).
* net/sched: initialize noop_qdisc owner (git-fixes).
* nfc: pn533: Add poll mod list filling check (git-fixes).
* nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* nfs: make the rpc_stat per net namespace (git-fixes).
* NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).
* NFSD: add security label to struct nfsd_attrs (git-fixes).
* NFSD: fix regression with setting ACLs (git-fixes).
* NFSD: Fix strncpy() fortify warning (git-fixes).
* NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
* NFSD: introduce struct nfsd_attrs (git-fixes).
* NFSD: move from strlcpy with unused retval to strscpy (git-fixes).
* NFSD: Optimize DRC bucket pruning (git-fixes).
* nfsd: return error if nfs4_setacl fails (git-fixes).
* NFSD: set attributes when creating symlinks (git-fixes).
* nfsd: use locks_inode_context helper (git-fixes).
* nilfs2: Remove check for PageError (git-fixes).
* nvme_core: scan namespaces asynchronously (bsc#1224105).
* ocfs2: use coarse time for new created files (git-fixes).
* padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
* platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc()
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check HSMP support on AMD family of processors
(jsc#PED-8779).
* platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS
(jsc#PED-8779).
* platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
* platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
* platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86/amd/hsmp: Remove extra parenthesis and add a space
(jsc#PED-8779).
* platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
* platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
* power: supply: axp288_charger: Fix constant_charge_voltage writes (git-
fixes).
* power: supply: axp288_charger: Round constant_charge_voltage writes down
(git-fixes).
* powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
* powerpc: Mark .opd section read-only (bsc#1194869).
* powerpc: use generic version of arch_is_kernel_initmem_freed()
(bsc#1194869).
* powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
* powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
* powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp
(bsc#1194869).
* powerpc/pseries: Whitelist dtl slub object for copying to userspace
(bsc#1194869).
* powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
(bsc#1194869).
* powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462
ltc#200161 ltc#200588 git-fixes).
* powerpc/xmon: Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
* RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
* RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)
* RDMA/rxe: Fix rxe_modify_srq (git-fixes)
* RDMA/rxe: Move work queue code to subroutines (git-fixes)
* s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
* s390/cpacf: Make use of invalid opcode produce a link error (git-fixes
bsc#1227079).
* s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).
* s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes
bsc#1229190).
* s390/dasd: fix error recovery leading to data corruption on ESE devices
(git-fixes bsc#1229573).
* s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).
* s390/uv: Panic for set and remove shared access UVC errors (git-fixes
bsc#1229188).
* spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
* RDMA/rxe: Handle zero length rdma (git-fixes)
* sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
* SUNRPC: Fix a race to wake a sync task (git-fixes).
* swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
* syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* tracing: Return from tracing_buffers_read() if the file has been closed
(bsc#1229136 git-fixes).
* ubifs: add check for crypto_shash_tfm_digest (git-fixes).
* ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
* ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
* ubifs: Fix unattached xattr inode if powercut happens after deleting (git-
fixes).
* vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
* wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
* wifi: mwifiex: duplicate static structs used in driver instances (git-
fixes).
* x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).
* x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-
fixes).
* x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
* x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
* x86/pm: Work around false positive kmemleak report in msr_build_context()
(git-fixes).
* xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
(git-fixes).
* xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3190=1 openSUSE-SLE-15.5-2024-3190=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3190=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64)
* dlm-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-extra-5.14.21-150500.33.66.1
* kernel-azure-optional-5.14.21-150500.33.66.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.66.1
* kernel-azure-devel-5.14.21-150500.33.66.1
* reiserfs-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-extra-debuginfo-5.14.21-150500.33.66.1
* cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* kernel-azure-debuginfo-5.14.21-150500.33.66.1
* kselftests-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-livepatch-devel-5.14.21-150500.33.66.1
* cluster-md-kmp-azure-5.14.21-150500.33.66.1
* kernel-syms-azure-5.14.21-150500.33.66.1
* gfs2-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* dlm-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* kselftests-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* ocfs2-kmp-azure-5.14.21-150500.33.66.1
* kernel-azure-debugsource-5.14.21-150500.33.66.1
* kernel-azure-optional-debuginfo-5.14.21-150500.33.66.1
* ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.66.1
* gfs2-kmp-azure-5.14.21-150500.33.66.1
* openSUSE Leap 15.5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.66.1
* openSUSE Leap 15.5 (x86_64)
* kernel-azure-vdso-5.14.21-150500.33.66.1
* kernel-azure-vdso-debuginfo-5.14.21-150500.33.66.1
* openSUSE Leap 15.5 (noarch)
* kernel-source-azure-5.14.21-150500.33.66.1
* kernel-devel-azure-5.14.21-150500.33.66.1
* Public Cloud Module 15-SP5 (aarch64 nosrc x86_64)
* kernel-azure-5.14.21-150500.33.66.1
* Public Cloud Module 15-SP5 (aarch64 x86_64)
* kernel-azure-debuginfo-5.14.21-150500.33.66.1
* kernel-syms-azure-5.14.21-150500.33.66.1
* kernel-azure-debugsource-5.14.21-150500.33.66.1
* kernel-azure-devel-debuginfo-5.14.21-150500.33.66.1
* kernel-azure-devel-5.14.21-150500.33.66.1
* Public Cloud Module 15-SP5 (noarch)
* kernel-source-azure-5.14.21-150500.33.66.1
* kernel-devel-azure-5.14.21-150500.33.66.1
## References:
* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2021-47106.html
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47546.html
* https://www.suse.com/security/cve/CVE-2022-38457.html
* https://www.suse.com/security/cve/CVE-2022-40133.html
* https://www.suse.com/security/cve/CVE-2022-48645.html
* https://www.suse.com/security/cve/CVE-2022-48706.html
* https://www.suse.com/security/cve/CVE-2022-48808.html
* https://www.suse.com/security/cve/CVE-2022-48865.html
* https://www.suse.com/security/cve/CVE-2022-48868.html
* https://www.suse.com/security/cve/CVE-2022-48869.html
* https://www.suse.com/security/cve/CVE-2022-48870.html
* https://www.suse.com/security/cve/CVE-2022-48871.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48875.html
* https://www.suse.com/security/cve/CVE-2022-48878.html
* https://www.suse.com/security/cve/CVE-2022-48880.html
* https://www.suse.com/security/cve/CVE-2022-48881.html
* https://www.suse.com/security/cve/CVE-2022-48882.html
* https://www.suse.com/security/cve/CVE-2022-48883.html
* https://www.suse.com/security/cve/CVE-2022-48884.html
* https://www.suse.com/security/cve/CVE-2022-48885.html
* https://www.suse.com/security/cve/CVE-2022-48886.html
* https://www.suse.com/security/cve/CVE-2022-48887.html
* https://www.suse.com/security/cve/CVE-2022-48888.html
* https://www.suse.com/security/cve/CVE-2022-48889.html
* https://www.suse.com/security/cve/CVE-2022-48890.html
* https://www.suse.com/security/cve/CVE-2022-48891.html
* https://www.suse.com/security/cve/CVE-2022-48893.html
* https://www.suse.com/security/cve/CVE-2022-48896.html
* https://www.suse.com/security/cve/CVE-2022-48898.html
* https://www.suse.com/security/cve/CVE-2022-48899.html
* https://www.suse.com/security/cve/CVE-2022-48903.html
* https://www.suse.com/security/cve/CVE-2022-48904.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48906.html
* https://www.suse.com/security/cve/CVE-2022-48907.html
* https://www.suse.com/security/cve/CVE-2022-48909.html
* https://www.suse.com/security/cve/CVE-2022-48910.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48913.html
* https://www.suse.com/security/cve/CVE-2022-48914.html
* https://www.suse.com/security/cve/CVE-2022-48915.html
* https://www.suse.com/security/cve/CVE-2022-48916.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48918.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48920.html
* https://www.suse.com/security/cve/CVE-2022-48921.html
* https://www.suse.com/security/cve/CVE-2022-48923.html
* https://www.suse.com/security/cve/CVE-2022-48924.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48927.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48929.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48931.html
* https://www.suse.com/security/cve/CVE-2022-48932.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2022-48937.html
* https://www.suse.com/security/cve/CVE-2022-48938.html
* https://www.suse.com/security/cve/CVE-2022-48939.html
* https://www.suse.com/security/cve/CVE-2022-48940.html
* https://www.suse.com/security/cve/CVE-2022-48941.html
* https://www.suse.com/security/cve/CVE-2022-48942.html
* https://www.suse.com/security/cve/CVE-2022-48943.html
* https://www.suse.com/security/cve/CVE-2023-3610.html
* https://www.suse.com/security/cve/CVE-2023-52458.html
* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52498.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2023-52893.html
* https://www.suse.com/security/cve/CVE-2023-52894.html
* https://www.suse.com/security/cve/CVE-2023-52896.html
* https://www.suse.com/security/cve/CVE-2023-52898.html
* https://www.suse.com/security/cve/CVE-2023-52899.html
* https://www.suse.com/security/cve/CVE-2023-52900.html
* https://www.suse.com/security/cve/CVE-2023-52901.html
* https://www.suse.com/security/cve/CVE-2023-52904.html
* https://www.suse.com/security/cve/CVE-2023-52905.html
* https://www.suse.com/security/cve/CVE-2023-52906.html
* https://www.suse.com/security/cve/CVE-2023-52907.html
* https://www.suse.com/security/cve/CVE-2023-52908.html
* https://www.suse.com/security/cve/CVE-2023-52909.html
* https://www.suse.com/security/cve/CVE-2023-52910.html
* https://www.suse.com/security/cve/CVE-2023-52911.html
* https://www.suse.com/security/cve/CVE-2023-52912.html
* https://www.suse.com/security/cve/CVE-2023-52913.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27016.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35945.html
* https://www.suse.com/security/cve/CVE-2024-35971.html
* https://www.suse.com/security/cve/CVE-2024-36009.html
* https://www.suse.com/security/cve/CVE-2024-36013.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36936.html
* https://www.suse.com/security/cve/CVE-2024-36962.html
* https://www.suse.com/security/cve/CVE-2024-38554.html
* https://www.suse.com/security/cve/CVE-2024-38602.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40980.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41042.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194111
* https://bugzilla.suse.com/show_bug.cgi?id=1194765
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196261
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196894
* https://bugzilla.suse.com/show_bug.cgi?id=1198017
* https://bugzilla.suse.com/show_bug.cgi?id=1203329
* https://bugzilla.suse.com/show_bug.cgi?id=1203330
* https://bugzilla.suse.com/show_bug.cgi?id=1203360
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1206006
* https://bugzilla.suse.com/show_bug.cgi?id=1206258
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1207158
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1213580
* https://bugzilla.suse.com/show_bug.cgi?id=1213632
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220428
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220962
* https://bugzilla.suse.com/show_bug.cgi?id=1221269
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223508
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1223807
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224542
* https://bugzilla.suse.com/show_bug.cgi?id=1224578
* https://bugzilla.suse.com/show_bug.cgi?id=1224639
* https://bugzilla.suse.com/show_bug.cgi?id=1225162
* https://bugzilla.suse.com/show_bug.cgi?id=1225352
* https://bugzilla.suse.com/show_bug.cgi?id=1225428
* https://bugzilla.suse.com/show_bug.cgi?id=1225524
* https://bugzilla.suse.com/show_bug.cgi?id=1225578
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225773
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225827
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226168
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226613
* https://bugzilla.suse.com/show_bug.cgi?id=1226742
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1227079
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227937
* https://bugzilla.suse.com/show_bug.cgi?id=1227958
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228065
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228526
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229187
* https://bugzilla.suse.com/show_bug.cgi?id=1229188
* https://bugzilla.suse.com/show_bug.cgi?id=1229190
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229418
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229453
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229506
* https://bugzilla.suse.com/show_bug.cgi?id=1229507
* https://bugzilla.suse.com/show_bug.cgi?id=1229508
* https://bugzilla.suse.com/show_bug.cgi?id=1229509
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229516
* https://bugzilla.suse.com/show_bug.cgi?id=1229521
* https://bugzilla.suse.com/show_bug.cgi?id=1229522
* https://bugzilla.suse.com/show_bug.cgi?id=1229523
* https://bugzilla.suse.com/show_bug.cgi?id=1229524
* https://bugzilla.suse.com/show_bug.cgi?id=1229525
* https://bugzilla.suse.com/show_bug.cgi?id=1229526
* https://bugzilla.suse.com/show_bug.cgi?id=1229527
* https://bugzilla.suse.com/show_bug.cgi?id=1229528
* https://bugzilla.suse.com/show_bug.cgi?id=1229529
* https://bugzilla.suse.com/show_bug.cgi?id=1229531
* https://bugzilla.suse.com/show_bug.cgi?id=1229533
* https://bugzilla.suse.com/show_bug.cgi?id=1229535
* https://bugzilla.suse.com/show_bug.cgi?id=1229536
* https://bugzilla.suse.com/show_bug.cgi?id=1229537
* https://bugzilla.suse.com/show_bug.cgi?id=1229540
* https://bugzilla.suse.com/show_bug.cgi?id=1229544
* https://bugzilla.suse.com/show_bug.cgi?id=1229545
* https://bugzilla.suse.com/show_bug.cgi?id=1229546
* https://bugzilla.suse.com/show_bug.cgi?id=1229547
* https://bugzilla.suse.com/show_bug.cgi?id=1229548
* https://bugzilla.suse.com/show_bug.cgi?id=1229554
* https://bugzilla.suse.com/show_bug.cgi?id=1229557
* https://bugzilla.suse.com/show_bug.cgi?id=1229558
* https://bugzilla.suse.com/show_bug.cgi?id=1229559
* https://bugzilla.suse.com/show_bug.cgi?id=1229560
* https://bugzilla.suse.com/show_bug.cgi?id=1229562
* https://bugzilla.suse.com/show_bug.cgi?id=1229564
* https://bugzilla.suse.com/show_bug.cgi?id=1229565
* https://bugzilla.suse.com/show_bug.cgi?id=1229566
* https://bugzilla.suse.com/show_bug.cgi?id=1229568
* https://bugzilla.suse.com/show_bug.cgi?id=1229569
* https://bugzilla.suse.com/show_bug.cgi?id=1229572
* https://bugzilla.suse.com/show_bug.cgi?id=1229573
* https://bugzilla.suse.com/show_bug.cgi?id=1229576
* https://bugzilla.suse.com/show_bug.cgi?id=1229581
* https://bugzilla.suse.com/show_bug.cgi?id=1229588
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229603
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229605
* https://bugzilla.suse.com/show_bug.cgi?id=1229608
* https://bugzilla.suse.com/show_bug.cgi?id=1229611
* https://bugzilla.suse.com/show_bug.cgi?id=1229612
* https://bugzilla.suse.com/show_bug.cgi?id=1229613
* https://bugzilla.suse.com/show_bug.cgi?id=1229614
* https://bugzilla.suse.com/show_bug.cgi?id=1229615
* https://bugzilla.suse.com/show_bug.cgi?id=1229616
* https://bugzilla.suse.com/show_bug.cgi?id=1229617
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229622
* https://bugzilla.suse.com/show_bug.cgi?id=1229623
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229625
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229628
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229631
* https://bugzilla.suse.com/show_bug.cgi?id=1229632
* https://bugzilla.suse.com/show_bug.cgi?id=1229635
* https://bugzilla.suse.com/show_bug.cgi?id=1229636
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229638
* https://bugzilla.suse.com/show_bug.cgi?id=1229639
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229642
* https://bugzilla.suse.com/show_bug.cgi?id=1229643
* https://bugzilla.suse.com/show_bug.cgi?id=1229645
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229658
* https://bugzilla.suse.com/show_bug.cgi?id=1229662
* https://bugzilla.suse.com/show_bug.cgi?id=1229664
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8779
1
0
10 Sep '24
# Recommended update for cups
Announcement ID: SUSE-RU-2024:3185-1
Rating: moderate
References:
* bsc#1226227
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for cups fixes the following issues:
* Fixed cupsd failing to authenticate users when group membership is required
(bsc#1226227)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3185=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3185=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3185=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3185=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3185=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3185=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3185=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3185=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3185=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3185=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3185=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3185=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3185=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3185=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3185=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3185=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3185=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3185=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3185=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3185=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3185=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3185=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3185=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3185=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3185=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3185=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3185=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3185=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3185=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* openSUSE Leap 15.5 (x86_64)
* libcupsimage2-32bit-2.2.7-150000.3.65.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-devel-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.65.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* openSUSE Leap 15.6 (x86_64)
* libcupsimage2-32bit-2.2.7-150000.3.65.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-devel-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-2.2.7-150000.3.65.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* Desktop Applications Module 15-SP5 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* Desktop Applications Module 15-SP6 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cups-debugsource-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cups-debugsource-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Proxy 4.3 (x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcups2-32bit-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Manager Server 4.3 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcupsmime1-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-ddk-2.2.7-150000.3.65.1
* cups-client-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* libcupsimage2-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* libcupsppdc1-2.2.7-150000.3.65.1
* libcupscgi1-debuginfo-2.2.7-150000.3.65.1
* cups-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* cups-ddk-debuginfo-2.2.7-150000.3.65.1
* cups-devel-2.2.7-150000.3.65.1
* libcupscgi1-2.2.7-150000.3.65.1
* libcupsimage2-2.2.7-150000.3.65.1
* cups-client-2.2.7-150000.3.65.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.65.1
* libcupsmime1-debuginfo-2.2.7-150000.3.65.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libcups2-32bit-2.2.7-150000.3.65.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libcups2-2.2.7-150000.3.65.1
* libcups2-debuginfo-2.2.7-150000.3.65.1
* cups-debuginfo-2.2.7-150000.3.65.1
* cups-config-2.2.7-150000.3.65.1
* cups-debugsource-2.2.7-150000.3.65.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1226227
1
0
10 Sep '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:3186-1
Rating: important
References:
* bsc#1221243
* bsc#1221677
* bsc#1224117
Cross-References:
* CVE-2024-1753
* CVE-2024-24786
* CVE-2024-28180
* CVE-2024-3727
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves four vulnerabilities can now be installed.
## Description:
This update for buildah fixes the following issues:
Update to version 1.35.4:
* CVE-2024-3727 updates (bsc#1224117)
* Bump go-jose CVE-2024-28180
* Bump ocicrypt and go-jose CVE-2024-28180
Update to version 1.35.3:
* correctly configure /etc/hosts and resolv.conf
* buildah: refactor resolv/hosts setup.
* rename the hostFile var to reflect
* CVE-2024-24786 protobuf to 1.33
Update to version 1.35.1:
* CVE-2024-1753 container escape fix (bsc#1221677)
* Buildah dropped cni support, require netavark instead (bsc#1221243)
* Remove obsolete requires libcontainers-image & libcontainers-storage
* Require passt for rootless networking (poo#156955) Buildah moved to
passt/pasta for rootless networking from slirp4netns
(https://github.com/containers/common/pull/1846)
Update to version 1.35.0:
* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* Update module go.etcd.io/bbolt to v1.3.9
* Update module github.com/opencontainers/image-spec to v1.1.0
* build --all-platforms: skip some base "image" platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* imagebuildah: fix crash with empty RUN
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* Replace map[K]bool with map[K]struct{} where it makes sense
* Bump CI VMs
* Replace strings.SplitN with strings.Cut
* Document use of containers-transports values in buildah
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* [skip-ci] Update actions/stale action to v9
* Ignore errors if label.Relabel returns ENOSUP
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3186=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3186=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3186=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3186=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3186=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* buildah-1.35.4-150400.3.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* buildah-1.35.4-150400.3.30.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150400.3.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* buildah-1.35.4-150400.3.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* buildah-1.35.4-150400.3.30.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-28180.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221243
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
* https://bugzilla.suse.com/show_bug.cgi?id=1224117
1
0
openSUSE-RU-2024:0295-1: moderate: Recommended update for python-django-webtest
by maintenance@opensuse.org 09 Sep '24
by maintenance@opensuse.org 09 Sep '24
09 Sep '24
openSUSE Recommended Update: Recommended update for python-django-webtest
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0295-1
Rating: moderate
References: #1229551
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
python-django-webtest is shipped in version 1.9.12.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-295=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
python311-django-webtest-1.9.12-bp156.2.1
References:
https://bugzilla.suse.com/1229551
1
0
SUSE-RU-2024:3178-1: important: Recommended update for libzypp, zypper, libsolv, zypp-plugin, PackageKit-branding-SLE, PackageKit, libyui, yast2-pkg-bindings
by OPENSUSE-UPDATES 09 Sep '24
by OPENSUSE-UPDATES 09 Sep '24
09 Sep '24
# Recommended update for libzypp, zypper, libsolv, zypp-plugin, PackageKit-
branding-SLE, PackageKit, libyui, yast2-pkg-bindings
Announcement ID: SUSE-RU-2024:3178-1
Rating: important
References:
* bsc#1081596
* bsc#1223094
* bsc#1224771
* bsc#1225267
* bsc#1226014
* bsc#1226030
* bsc#1226493
* bsc#1227205
* bsc#1227625
* bsc#1227793
* bsc#1228138
* bsc#1228206
* bsc#1228208
* bsc#1228420
* bsc#1228787
* bsc#222971
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP6
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that has 16 fixes can now be installed.
## Description:
This update for libzypp, zypper, libsolv, zypp-plugin, PackageKit-branding-SLE,
PackageKit, libyui, yast2-pkg-bindings fixes the following issues:
* Make sure not to statically linked installed tools (bsc#1228787)
* MediaPluginType must be resolved to a valid MediaHandler (bsc#1228208)
* Export asSolvable for YAST (bsc#1228420)
* Export CredentialManager for legacy YAST versions (bsc#1228420)
* Fix 4 typos in zypp.conf
* Fix typo in the geoip update pipeline (bsc#1228206)
* Export RepoVariablesStringReplacer for yast2 (bsc#1228138)
* Removed dependency on external find program in the repo2solv tool
* Fix return value of repodata.add_solv()
* New SOLVER_FLAG_FOCUS_NEW flag
* Fix return value of repodata.add_solv() in the bindings
* Fix SHA-224 oid in solv_pgpvrfy
* Translation: updated .pot file.
* Conflict with python zypp-plugin < 0.6.4 (bsc#1227793)
* Fix int overflow in Provider
* Fix error reporting on repoindex.xml parse error (bsc#1227625)
* Keep UrlResolverPlugin API public
* Blacklist /snap executables for 'zypper ps' (bsc#1226014)
* Fix handling of buddies when applying locks (bsc#1225267)
* Fix readline setup to handle Ctrl-C and Ctrl-D correctly (bsc#1227205)
* Show rpm install size before installing (bsc#1224771)
* Install zypp/APIConfig.h legacy include
* Update soname due to RepoManager refactoring and cleanup
* Workaround broken libsolv-tools-base requirements
* Strip ssl_clientkey from repo urls (bsc#1226030)
* Remove protobuf build dependency
* Lazily attach medium during refresh workflows (bsc#1223094)
* Refactor RepoManager and add Service workflows
* Let_readline_abort_on_Ctrl-C (bsc#1226493)
* packages: add '\--system' to show @System packages (bsc#222971)
* Provide python3-zypp-plugin down to SLE12 (bsc#1081596)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3178=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3178=1 SUSE-2024-3178=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3178=1 SUSE-2024-3178=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3178=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-SUSE-
Manager-Server-4.3-2024-3178=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-
SLES_SAP-15-SP4-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-SUSE-
Manager-Retail-Branch-Server-4.3-2024-3178=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3178=1 SUSE-SLE-Product-SUSE-
Manager-Proxy-4.3-2024-3178=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3178=1
* SUSE Linux Enterprise High Performance Computing 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Server 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3178=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3178=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3178=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3178=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3178=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3178=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3178=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3178=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3178=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3178=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3178=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3178=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3178=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3178=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3178=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3178=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3178=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3178=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3178=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3178=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* PackageKit-branding-upstream-1.2.4-150400.3.20.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* zypper-aptitude-1.14.76-150400.3.57.16
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libzypp-debugsource-17.35.8-150400.3.85.1
* libyui-bindings-debugsource-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* perl-yui-debuginfo-4.3.7-150400.3.12.1
* python3-yui-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* ruby-yui-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* perl-solv-0.7.30-150400.3.27.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* ruby-yui-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* python3-yui-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* PackageKit-backend-dnf-1.2.4-150400.3.20.2
* libzypp-devel-doc-17.35.8-150400.3.85.1
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-demo-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* perl-yui-4.3.7-150400.3.12.1
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libsolv-demo-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* python311-solv-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* python311-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-bindings-debuginfo-4.3.7-150400.3.12.1
* openSUSE Leap 15.4 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.20.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-64bit-1.2.4-150400.3.20.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses16-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* libzypp-devel-doc-17.35.8-150500.6.13.1
* libzypp-debuginfo-17.35.8-150500.6.13.1
* yast2-pkg-bindings-debugsource-4.5.3-150500.3.10.1
* libzypp-devel-17.35.8-150500.6.13.1
* libyui-debugsource-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* libyui-qt-graph16-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* zypper-1.14.76-150500.6.6.15
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* zypper-debugsource-1.14.76-150500.6.6.15
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* libzypp-debugsource-17.35.8-150500.6.13.1
* libyui-qt-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* zypper-debuginfo-1.14.76-150500.6.6.15
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui16-debuginfo-4.5.3-150500.3.10.1
* libzypp-17.35.8-150500.6.13.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* openSUSE Leap 15.5 (noarch)
* zypper-log-1.14.76-150500.6.6.15
* PackageKit-branding-SLE-12.0-150400.15.7.2
* zypper-aptitude-1.14.76-150500.6.6.15
* PackageKit-branding-upstream-1.2.4-150400.3.20.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-needs-restarting-1.14.76-150500.6.6.15
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* perl-solv-0.7.30-150400.3.27.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* libsolv-demo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-backend-dnf-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-demo-debuginfo-0.7.30-150400.3.27.2
* python3-solv-0.7.30-150400.3.27.2
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* PackageKit-devel-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.20.2
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-0.7.30-150400.3.27.2
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-0.7.30-150400.3.27.2
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* openSUSE Leap 15.5 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.20.2
* openSUSE Leap 15.6 (noarch)
* zypper-aptitude-1.14.76-150600.10.6.13
* PackageKit-lang-1.2.8-150600.4.5.2
* PackageKit-branding-upstream-1.2.8-150600.4.5.2
* PackageKit-branding-SLE-12.0-150600.22.5.2
* zypper-needs-restarting-1.14.76-150600.10.6.13
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-log-1.14.76-150600.10.6.13
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* PackageKit-backend-dnf-debuginfo-1.2.8-150600.4.5.2
* typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.5.2
* libzypp-devel-17.35.8-150600.3.19.1
* libzypp-devel-doc-17.35.8-150600.3.19.1
* PackageKit-devel-1.2.8-150600.4.5.2
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* zypper-1.14.76-150600.10.6.13
* yast2-pkg-bindings-debuginfo-4.6.5-150600.3.6.1
* PackageKit-backend-zypp-1.2.8-150600.4.5.2
* PackageKit-debugsource-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-1.2.8-150600.4.5.2
* PackageKit-devel-debuginfo-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-1.2.8-150600.4.5.2
* zypper-debugsource-1.14.76-150600.10.6.13
* PackageKit-1.2.8-150600.4.5.2
* zypper-debuginfo-1.14.76-150600.10.6.13
* PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.5.2
* PackageKit-backend-dnf-1.2.8-150600.4.5.2
* libzypp-debuginfo-17.35.8-150600.3.19.1
* libzypp-17.35.8-150600.3.19.1
* libpackagekit-glib2-devel-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.5.2
* yast2-pkg-bindings-debugsource-4.6.5-150600.3.6.1
* libzypp-debugsource-17.35.8-150600.3.19.1
* PackageKit-debuginfo-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.5.2
* openSUSE Leap 15.6 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-32bit-debuginfo-1.2.8-150600.4.5.2
* libpackagekit-glib2-devel-32bit-1.2.8-150600.4.5.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-debuginfo-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-64bit-1.2.8-150600.4.5.2
* libpackagekit-glib2-devel-64bit-1.2.8-150600.4.5.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* perl-solv-0.7.30-150400.3.27.2
* libyui-ncurses16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* libsolv-demo-0.7.30-150400.3.27.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libyui-debugsource-4.5.3-150500.3.10.1
* libsolv-demo-debuginfo-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* libyui-qt-graph16-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* libyui-qt-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* python311-solv-0.7.30-150400.3.27.2
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* libsolv-tools-base-0.7.30-150400.3.27.2
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* python311-solv-debuginfo-0.7.30-150400.3.27.2
* libyui16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* ruby-solv-0.7.30-150400.3.27.2
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150500.6.6.15
* libzypp-debugsource-17.35.8-150500.6.13.1
* zypper-1.14.76-150500.6.6.15
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150500.6.13.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150500.6.6.15
* openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* openSUSE Leap Micro 5.5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-needs-restarting-1.14.76-150500.6.6.15
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libzypp-17.35.8-150400.3.85.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64)
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* SUSE Linux Enterprise High Performance Computing 15 SP4 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libzypp-17.35.8-150400.3.85.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le)
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Server 15 SP4 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Manager Server 4.3 (noarch)
* PackageKit-branding-SLE-12.0-150400.15.7.2
* zypper-log-1.14.76-150400.3.57.16
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libzypp-17.35.8-150400.3.85.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* SUSE Linux Enterprise Desktop 15 SP4 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* zypper-log-1.14.76-150400.3.57.16
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Manager Proxy 4.3 (x86_64)
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-1.2.4-150400.3.20.2
* libsolv-tools-0.7.30-150400.3.27.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui16-4.3.7-150400.3.12.1
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Manager Proxy 4.3 (noarch)
* PackageKit-branding-SLE-12.0-150400.15.7.2
* zypper-log-1.14.76-150400.3.57.16
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Desktop 15 SP5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise High Performance Computing 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Desktop 15 SP6 (x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* SUSE Linux Enterprise Desktop 15 SP6 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-1.14.76-150400.3.57.16
* zypper-debuginfo-1.14.76-150400.3.57.16
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150400.3.85.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* python3-zypp-plugin-0.6.4-150400.13.4.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsolv-tools-base-0.7.30-150400.3.27.2
* zypper-debugsource-1.14.76-150500.6.6.15
* libzypp-debugsource-17.35.8-150500.6.13.1
* zypper-1.14.76-150500.6.6.15
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libzypp-17.35.8-150500.6.13.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libzypp-debuginfo-17.35.8-150500.6.13.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150500.6.6.15
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-needs-restarting-1.14.76-150500.6.6.15
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* libzypp-debuginfo-17.35.8-150500.6.13.1
* yast2-pkg-bindings-debugsource-4.5.3-150500.3.10.1
* libzypp-devel-17.35.8-150500.6.13.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* zypper-1.14.76-150500.6.6.15
* libyui-qt-graph16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* zypper-debugsource-1.14.76-150500.6.6.15
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* libzypp-debugsource-17.35.8-150500.6.13.1
* libyui-qt-devel-4.5.3-150500.3.10.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150500.6.6.15
* libsolv-tools-base-0.7.30-150400.3.27.2
* yast2-pkg-bindings-4.5.3-150500.3.10.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui16-debuginfo-4.5.3-150500.3.10.1
* libzypp-17.35.8-150500.6.13.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* ruby-solv-0.7.30-150400.3.27.2
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debuginfo-4.5.3-150500.3.10.1
* Basesystem Module 15-SP5 (noarch)
* zypper-log-1.14.76-150500.6.6.15
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-needs-restarting-1.14.76-150500.6.6.15
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libzypp-devel-17.35.8-150600.3.19.1
* libyui-ncurses-pkg16-debuginfo-4.5.3-150500.3.10.1
* libyui-ncurses16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg16-4.5.3-150500.3.10.1
* yast2-pkg-bindings-4.6.5-150600.3.6.1
* zypper-1.14.76-150600.10.6.13
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* libyui-ncurses-debugsource-4.5.3-150500.3.10.1
* libyui-devel-4.5.3-150500.3.10.1
* yast2-pkg-bindings-debuginfo-4.6.5-150600.3.6.1
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libyui-debugsource-4.5.3-150500.3.10.1
* libyui-qt16-4.5.3-150500.3.10.1
* libyui-ncurses16-debuginfo-4.5.3-150500.3.10.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-qt-graph-debugsource-4.5.3-150500.3.10.1
* libyui-qt-graph16-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-devel-4.5.3-150500.3.10.1
* libyui-ncurses-pkg-debugsource-4.5.3-150500.3.10.1
* libyui16-4.5.3-150500.3.10.1
* libyui-qt-graph16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt16-debuginfo-4.5.3-150500.3.10.1
* zypper-debugsource-1.14.76-150600.10.6.13
* libyui-qt-graph-devel-4.5.3-150500.3.10.1
* libyui-ncurses-devel-4.5.3-150500.3.10.1
* zypper-debuginfo-1.14.76-150600.10.6.13
* libyui-qt-devel-4.5.3-150500.3.10.1
* libzypp-debuginfo-17.35.8-150600.3.19.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libzypp-17.35.8-150600.3.19.1
* libsolv-tools-base-0.7.30-150400.3.27.2
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui16-debuginfo-4.5.3-150500.3.10.1
* yast2-pkg-bindings-debugsource-4.6.5-150600.3.6.1
* libzypp-debugsource-17.35.8-150600.3.19.1
* libyui-ncurses-tools-4.5.3-150500.3.10.1
* ruby-solv-0.7.30-150400.3.27.2
* libyui-qt-debugsource-4.5.3-150500.3.10.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* Basesystem Module 15-SP6 (noarch)
* zypper-needs-restarting-1.14.76-150600.10.6.13
* python3-zypp-plugin-0.6.4-150400.13.4.1
* zypper-log-1.14.76-150600.10.6.13
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* PackageKit-devel-1.2.4-150400.3.20.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* Desktop Applications Module 15-SP5 (noarch)
* PackageKit-branding-SLE-12.0-150400.15.7.2
* PackageKit-lang-1.2.4-150400.3.20.2
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpackagekit-glib2-18-1.2.8-150600.4.5.2
* libpackagekit-glib2-18-debuginfo-1.2.8-150600.4.5.2
* libyui-qt-pkg-debugsource-4.5.3-150500.3.10.1
* typelib-1_0-PackageKitGlib-1_0-1.2.8-150600.4.5.2
* PackageKit-devel-1.2.8-150600.4.5.2
* PackageKit-1.2.8-150600.4.5.2
* libyui-qt-pkg16-debuginfo-4.5.3-150500.3.10.1
* PackageKit-backend-zypp-debuginfo-1.2.8-150600.4.5.2
* PackageKit-debuginfo-1.2.8-150600.4.5.2
* libyui-qt-pkg16-4.5.3-150500.3.10.1
* libyui-qt-pkg-devel-4.5.3-150500.3.10.1
* PackageKit-devel-debuginfo-1.2.8-150600.4.5.2
* PackageKit-backend-zypp-1.2.8-150600.4.5.2
* PackageKit-debugsource-1.2.8-150600.4.5.2
* libpackagekit-glib2-devel-1.2.8-150600.4.5.2
* Desktop Applications Module 15-SP6 (noarch)
* PackageKit-lang-1.2.8-150600.4.5.2
* PackageKit-branding-SLE-12.0-150600.22.5.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* perl-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libyui-qt-rest-api-devel-4.5.3-150500.3.10.1
* libyui-qt-rest-api-debugsource-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-4.5.3-150500.3.10.1
* libyui-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-qt-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api-debugsource-4.5.3-150500.3.10.1
* perl-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-devel-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api16-debuginfo-4.5.3-150500.3.10.1
* libyui-rest-api16-4.5.3-150500.3.10.1
* libyui-ncurses-rest-api-debugsource-4.5.3-150500.3.10.1
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libyui-rest-api-devel-4.5.3-150500.3.10.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-debugsource-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api16-4.5.3-150500.3.10.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libyui-bindings-debuginfo-4.5.3-150500.3.10.1
* perl-yui-4.5.3-150500.3.10.1
* python3-yui-debuginfo-4.5.3-150500.3.10.1
* ruby-yui-4.5.3-150500.3.10.1
* perl-yui-debuginfo-4.5.3-150500.3.10.1
* python3-yui-4.5.3-150500.3.10.1
* libyui-bindings-debugsource-4.5.3-150500.3.10.1
* ruby-yui-debuginfo-4.5.3-150500.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-devel-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libyui-qt-rest-api-devel-4.3.7-150400.3.12.1
* perl-solv-0.7.30-150400.3.27.2
* zypper-debuginfo-1.14.76-150400.3.57.16
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-1.2.4-150400.3.20.2
* libsolv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-0.7.30-150400.3.27.2
* PackageKit-devel-debuginfo-1.2.4-150400.3.20.2
* PackageKit-backend-zypp-1.2.4-150400.3.20.2
* libyui-ncurses16-4.3.7-150400.3.12.1
* libyui-qt-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libpackagekit-glib2-18-1.2.4-150400.3.20.2
* python3-solv-debuginfo-0.7.30-150400.3.27.2
* libsolv-tools-debuginfo-0.7.30-150400.3.27.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.20.2
* yast2-pkg-bindings-4.4.7-150400.3.16.1
* libyui-qt-rest-api-debugsource-4.3.7-150400.3.12.1
* libzypp-devel-17.35.8-150400.3.85.1
* libyui-ncurses-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-graph-devel-4.3.7-150400.3.12.1
* python3-solv-0.7.30-150400.3.27.2
* libyui-ncurses-rest-api-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api-devel-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-4.3.7-150400.3.12.1
* libyui-qt-graph16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-debugsource-4.3.7-150400.3.12.1
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses16-debuginfo-4.3.7-150400.3.12.1
* libsolv-tools-base-debuginfo-0.7.30-150400.3.27.2
* libzypp-debugsource-17.35.8-150400.3.85.1
* libpackagekit-glib2-devel-1.2.4-150400.3.20.2
* libyui-qt16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-rest-api16-debuginfo-4.3.7-150400.3.12.1
* libyui-qt-devel-4.3.7-150400.3.12.1
* PackageKit-devel-1.2.4-150400.3.20.2
* libyui-rest-api16-4.3.7-150400.3.12.1
* libyui-ncurses-pkg16-4.3.7-150400.3.12.1
* zypper-1.14.76-150400.3.57.16
* libyui-rest-api-devel-4.3.7-150400.3.12.1
* libyui16-4.3.7-150400.3.12.1
* libyui-rest-api16-debuginfo-4.3.7-150400.3.12.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.20.2
* libyui-ncurses-devel-4.3.7-150400.3.12.1
* libyui16-debuginfo-4.3.7-150400.3.12.1
* libyui-ncurses-tools-4.3.7-150400.3.12.1
* perl-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-qt16-4.3.7-150400.3.12.1
* libsolv-devel-debuginfo-0.7.30-150400.3.27.2
* libsolv-devel-0.7.30-150400.3.27.2
* libyui-ncurses-pkg-debugsource-4.3.7-150400.3.12.1
* libyui-ncurses-pkg-devel-4.3.7-150400.3.12.1
* libyui-qt-pkg16-4.3.7-150400.3.12.1
* libyui-qt-rest-api16-4.3.7-150400.3.12.1
* libzypp-debuginfo-17.35.8-150400.3.85.1
* yast2-pkg-bindings-debuginfo-4.4.7-150400.3.16.1
* zypper-debugsource-1.14.76-150400.3.57.16
* libsolv-tools-base-0.7.30-150400.3.27.2
* libyui-debugsource-4.3.7-150400.3.12.1
* libyui-qt-graph-debugsource-4.3.7-150400.3.12.1
* libyui-qt-pkg-debugsource-4.3.7-150400.3.12.1
* ruby-solv-debuginfo-0.7.30-150400.3.27.2
* libyui-devel-4.3.7-150400.3.12.1
* yast2-pkg-bindings-debugsource-4.4.7-150400.3.16.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.20.2
* ruby-solv-0.7.30-150400.3.27.2
* libzypp-17.35.8-150400.3.85.1
* libsolv-debugsource-0.7.30-150400.3.27.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* zypper-needs-restarting-1.14.76-150400.3.57.16
* PackageKit-branding-SLE-12.0-150400.15.7.2
* python3-zypp-plugin-0.6.4-150400.13.4.1
* PackageKit-lang-1.2.4-150400.3.20.2
* zypper-log-1.14.76-150400.3.57.16
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* PackageKit-gstreamer-plugin-1.2.4-150400.3.20.2
* PackageKit-debugsource-1.2.4-150400.3.20.2
* PackageKit-debuginfo-1.2.4-150400.3.20.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.20.2
* PackageKit-gtk3-module-1.2.4-150400.3.20.2
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.20.2
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* PackageKit-debuginfo-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-1.2.8-150600.4.5.2
* PackageKit-gstreamer-plugin-debuginfo-1.2.8-150600.4.5.2
* PackageKit-debugsource-1.2.8-150600.4.5.2
* PackageKit-gtk3-module-debuginfo-1.2.8-150600.4.5.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1081596
* https://bugzilla.suse.com/show_bug.cgi?id=1223094
* https://bugzilla.suse.com/show_bug.cgi?id=1224771
* https://bugzilla.suse.com/show_bug.cgi?id=1225267
* https://bugzilla.suse.com/show_bug.cgi?id=1226014
* https://bugzilla.suse.com/show_bug.cgi?id=1226030
* https://bugzilla.suse.com/show_bug.cgi?id=1226493
* https://bugzilla.suse.com/show_bug.cgi?id=1227205
* https://bugzilla.suse.com/show_bug.cgi?id=1227625
* https://bugzilla.suse.com/show_bug.cgi?id=1227793
* https://bugzilla.suse.com/show_bug.cgi?id=1228138
* https://bugzilla.suse.com/show_bug.cgi?id=1228206
* https://bugzilla.suse.com/show_bug.cgi?id=1228208
* https://bugzilla.suse.com/show_bug.cgi?id=1228420
* https://bugzilla.suse.com/show_bug.cgi?id=1228787
* https://bugzilla.suse.com/show_bug.cgi?id=222971
1
0
09 Sep '24
# Recommended update for mksusecd
Announcement ID: SUSE-RU-2024:3177-1
Rating: important
References:
* bsc#1223982
* bsc#1227668
* jsc#PED-8374
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature and has two fixes can now be installed.
## Description:
This update for mksusecd fixes the following issues:
* Make some compression settings configurable (bsc#1223982, jsc#PED-8374).
* Update documentation.
* Fix UEFI image rebuild detection (bsc#1227668).
* Allow updating kernel in live initrd.
* Allow updating kernel in live root, support resizing live root.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3177=1 openSUSE-SLE-15.6-2024-3177=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3177=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* mksusecd-debugsource-3.0-150600.3.9.3
* mksusecd-3.0-150600.3.9.3
* mksusecd-debuginfo-3.0-150600.3.9.3
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mksusecd-debugsource-3.0-150600.3.9.3
* mksusecd-3.0-150600.3.9.3
* mksusecd-debuginfo-3.0-150600.3.9.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223982
* https://bugzilla.suse.com/show_bug.cgi?id=1227668
* https://jira.suse.com/browse/PED-8374
1
0
09 Sep '24
# Recommended update for binutils
Announcement ID: SUSE-RU-2024:3180-1
Rating: moderate
References:
* bsc#1215341
* bsc#1216908
* jsc#PED-10474
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that contains one feature and has two fixes can now be installed.
## Description:
This update for binutils fixes the following issues:
Update to current 2.43.1 branch [jsc#PED-10474]:
Update to version 2.43:
* new .base64 pseudo-op, allowing base64 encoded data as strings
* Intel APX: add support for CFCMOV, CCMP, CTEST, zero-upper, NF (APX_F now
fully supported)
* x86 Intel syntax now warns about more mnemonic suffixes
* macros and .irp/.irpc/.rept bodies can use + to get at number of times the
macro/body was executed
* aarch64: support 'armv9.5-a' for -march, add support for LUT and LUT2
* s390: base register operand in D(X,B) and D(L,B) can now be omitted (ala
'D(X,)'); warn when register type doesn't match operand type (use option
'warn-regtype-mismatch=[strict|relaxed|no]' to adjust)
* riscv: support various extensions: Zacas, Zcmp, Zfbfmin, Zvfbfmin, Zvfbfwma,
Smcsrind/Sscsrind, XCvMem, XCvBi, XCvElw, XSfCease, all at version 1.0;
remove support for assembly of privileged spec 1.9.1 (linking support
remains)
* arm: remove support for some old co-processors: Maverick and FPA
* mips: '\--trap' now causes either trap or breakpoint instructions to be
emitted as per current ISA, instead of always using trap insn and failing
when current ISA was incompatible with that
* LoongArch: accept .option pseudo-op for fine-grained control of assembly
code options; add support for DT_RELR
* readelf: now displays RELR relocations in full detail; add -j/--display-
section to show just those section(s) content according to their type
* objdump/readelf now dump also .eh_frame_hdr (when present) when dumping
.eh_frame
* gprofng: add event types for AMD Zen3/Zen4 and Intel Ice Lake processors;
add minimal support for riscv
* linker:
* put .got and .got.plt into relro segment
* add -z isa-level-report=[none|all|needed|used] to the x86 ELF linker to
report needed and used x86-64 ISA levels
* add --rosegment option which changes the -z separate-code option so that
only one read-only segment is created (instead of two)
* add --section-ordering-file <FILE> option to add extra mapping of input
sections to output sections
* add -plugin-save-temps to store plugin intermediate files permanently
Update to version 2.42:
* Add support for many aarch64 extensions: SVE2.1, SME2.1, B16B16, RASv2,
LSE128, GCS, CHK, SPECRES2, LRCPC3, THE, ITE, D128, XS and flags to enable
them: '+fcma', '+jscvt', '+frintts', '+flagm2', '+rcpc2' and '+wfxt'
* Add experimantal support for GAS to synthesize call-frame-info for some
hand-written asm (--scfi=experimental) on x86-64.
* Add support for more x86-64 extensions: APX: 32 GPRs, NDD, PUSH2/POP2,
PUSHP/POPP; USER_MSR, AVX10.1, PBNDKB, SM4, SM3, SHA512, AVX-VNNI-INT16.
* Add support for more RISC-V extensions: T-Head v2.3.0, CORE-V v1.0, SiFive
VCIX v1.0.
* BPF assembler: ';' separates statements now, and does not introduce line
comments anymore (use '#' or '//' for this).
* x86-64 ld: Add '-z mark-plt/-z nomark-plt' to mark PLT entries with dynamic
tags.
* risc-v ld: Add '\--[no-]check-uleb128'.
* New linker script directive: REVERSE, to be combined with SORT_BY_NAME or
SORT_BY_INIT_PRIORITY, reverses the generated order.
* New linker options --warn-execstack-objects (warn only about execstack when
input object files request it), and --error-execstack plus \--error-rxw-
segments to convert the existing warnings into errors.
* objdump: Add -Z/--decompress to be used with -s/--full-contents to
decompress section contents before displaying.
* readelf: Add --extra-sym-info to be used with --symbols (currently prints
section name of references section index).
* objcopy: Add --set-section-flags for x86_64 to include SHF_X86_64_LARGE.
* s390 disassembly: add target-specific disasm option 'insndesc', as in
"objdump -M insndesc" to display an instruction description as comment along
with the disassembly.
* Add binutils-use-less-memory.diff to be a little nicer to 32bit userspace
and huge links. [bsc#1216908]
* Add libzstd-devel to Requires of binutils-devel. (bsc#1215341)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3180=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3180=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3180=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3180=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3180=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3180=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3180=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3180=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3180=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3180=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3180=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3180=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3180=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3180=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3180=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3180=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3180=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3180=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3180=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3180=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3180=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3180=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3180=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cross-i386-binutils-debuginfo-2.43-150100.7.49.1
* cross-ppc64-binutils-2.43-150100.7.49.1
* cross-ppc64-binutils-debugsource-2.43-150100.7.49.1
* binutils-gold-2.43-150100.7.49.1
* cross-hppa-binutils-debugsource-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* cross-hppa64-binutils-debugsource-2.43-150100.7.49.1
* cross-hppa-binutils-debuginfo-2.43-150100.7.49.1
* cross-mips-binutils-2.43-150100.7.49.1
* cross-epiphany-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc-binutils-debuginfo-2.43-150100.7.49.1
* cross-hppa-binutils-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* cross-arm-binutils-2.43-150100.7.49.1
* cross-i386-binutils-debugsource-2.43-150100.7.49.1
* cross-spu-binutils-2.43-150100.7.49.1
* cross-xtensa-binutils-debuginfo-2.43-150100.7.49.1
* cross-riscv64-binutils-2.43-150100.7.49.1
* cross-arm-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc64-binutils-debugsource-2.43-150100.7.49.1
* cross-avr-binutils-debugsource-2.43-150100.7.49.1
* binutils-2.43-150100.7.49.1
* cross-m68k-binutils-debugsource-2.43-150100.7.49.1
* cross-rx-binutils-2.43-150100.7.49.1
* cross-rx-binutils-debugsource-2.43-150100.7.49.1
* cross-spu-binutils-debuginfo-2.43-150100.7.49.1
* cross-ia64-binutils-debuginfo-2.43-150100.7.49.1
* cross-xtensa-binutils-2.43-150100.7.49.1
* cross-rx-binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* cross-spu-binutils-debugsource-2.43-150100.7.49.1
* cross-xtensa-binutils-debugsource-2.43-150100.7.49.1
* cross-sparc-binutils-debugsource-2.43-150100.7.49.1
* cross-ppc-binutils-2.43-150100.7.49.1
* cross-i386-binutils-2.43-150100.7.49.1
* cross-riscv64-binutils-debuginfo-2.43-150100.7.49.1
* cross-ia64-binutils-2.43-150100.7.49.1
* cross-hppa64-binutils-2.43-150100.7.49.1
* cross-mips-binutils-debuginfo-2.43-150100.7.49.1
* cross-s390-binutils-debuginfo-2.43-150100.7.49.1
* cross-s390-binutils-debugsource-2.43-150100.7.49.1
* cross-hppa64-binutils-debuginfo-2.43-150100.7.49.1
* cross-ia64-binutils-debugsource-2.43-150100.7.49.1
* cross-s390-binutils-2.43-150100.7.49.1
* cross-epiphany-binutils-2.43-150100.7.49.1
* cross-sparc64-binutils-debuginfo-2.43-150100.7.49.1
* cross-arm-binutils-debugsource-2.43-150100.7.49.1
* cross-avr-binutils-2.43-150100.7.49.1
* cross-ppc64-binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* cross-m68k-binutils-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* cross-m68k-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc-binutils-2.43-150100.7.49.1
* cross-avr-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc64-binutils-2.43-150100.7.49.1
* cross-riscv64-binutils-debugsource-2.43-150100.7.49.1
* binutils-gold-debuginfo-2.43-150100.7.49.1
* cross-mips-binutils-debugsource-2.43-150100.7.49.1
* cross-ppc-binutils-debugsource-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* cross-ppc-binutils-debuginfo-2.43-150100.7.49.1
* cross-epiphany-binutils-debugsource-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* openSUSE Leap 15.5 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* cross-aarch64-binutils-2.43-150100.7.49.1
* cross-aarch64-binutils-debuginfo-2.43-150100.7.49.1
* cross-aarch64-binutils-debugsource-2.43-150100.7.49.1
* openSUSE Leap 15.5 (aarch64 s390x x86_64)
* cross-ppc64le-binutils-debugsource-2.43-150100.7.49.1
* cross-ppc64le-binutils-debuginfo-2.43-150100.7.49.1
* cross-ppc64le-binutils-2.43-150100.7.49.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* cross-s390x-binutils-debugsource-2.43-150100.7.49.1
* cross-s390x-binutils-2.43-150100.7.49.1
* cross-s390x-binutils-debuginfo-2.43-150100.7.49.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x)
* cross-x86_64-binutils-debuginfo-2.43-150100.7.49.1
* cross-x86_64-binutils-2.43-150100.7.49.1
* cross-x86_64-binutils-debugsource-2.43-150100.7.49.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cross-i386-binutils-debuginfo-2.43-150100.7.49.1
* cross-ppc64-binutils-2.43-150100.7.49.1
* cross-ppc64-binutils-debugsource-2.43-150100.7.49.1
* binutils-gold-2.43-150100.7.49.1
* cross-hppa-binutils-debugsource-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* cross-hppa64-binutils-debugsource-2.43-150100.7.49.1
* cross-hppa-binutils-debuginfo-2.43-150100.7.49.1
* cross-mips-binutils-2.43-150100.7.49.1
* cross-epiphany-binutils-debuginfo-2.43-150100.7.49.1
* cross-bpf-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc-binutils-debuginfo-2.43-150100.7.49.1
* cross-hppa-binutils-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* cross-arm-binutils-2.43-150100.7.49.1
* cross-i386-binutils-debugsource-2.43-150100.7.49.1
* cross-spu-binutils-2.43-150100.7.49.1
* cross-xtensa-binutils-debuginfo-2.43-150100.7.49.1
* cross-riscv64-binutils-2.43-150100.7.49.1
* cross-arm-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc64-binutils-debugsource-2.43-150100.7.49.1
* cross-avr-binutils-debugsource-2.43-150100.7.49.1
* binutils-2.43-150100.7.49.1
* cross-m68k-binutils-debugsource-2.43-150100.7.49.1
* cross-pru-binutils-2.43-150100.7.49.1
* cross-bpf-binutils-2.43-150100.7.49.1
* cross-pru-binutils-debuginfo-2.43-150100.7.49.1
* cross-ia64-binutils-debuginfo-2.43-150100.7.49.1
* cross-rx-binutils-2.43-150100.7.49.1
* cross-rx-binutils-debuginfo-2.43-150100.7.49.1
* cross-rx-binutils-debugsource-2.43-150100.7.49.1
* cross-spu-binutils-debuginfo-2.43-150100.7.49.1
* cross-spu-binutils-debugsource-2.43-150100.7.49.1
* cross-xtensa-binutils-2.43-150100.7.49.1
* cross-xtensa-binutils-debugsource-2.43-150100.7.49.1
* cross-sparc-binutils-debugsource-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* cross-ppc-binutils-2.43-150100.7.49.1
* cross-i386-binutils-2.43-150100.7.49.1
* cross-riscv64-binutils-debuginfo-2.43-150100.7.49.1
* cross-ia64-binutils-2.43-150100.7.49.1
* cross-hppa64-binutils-2.43-150100.7.49.1
* cross-mips-binutils-debuginfo-2.43-150100.7.49.1
* cross-s390-binutils-debuginfo-2.43-150100.7.49.1
* cross-s390-binutils-debugsource-2.43-150100.7.49.1
* cross-hppa64-binutils-debuginfo-2.43-150100.7.49.1
* cross-ia64-binutils-debugsource-2.43-150100.7.49.1
* cross-s390-binutils-2.43-150100.7.49.1
* cross-epiphany-binutils-2.43-150100.7.49.1
* cross-sparc64-binutils-debuginfo-2.43-150100.7.49.1
* cross-arm-binutils-debugsource-2.43-150100.7.49.1
* cross-avr-binutils-2.43-150100.7.49.1
* cross-ppc64-binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* cross-bpf-binutils-debugsource-2.43-150100.7.49.1
* cross-m68k-binutils-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* cross-m68k-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc-binutils-2.43-150100.7.49.1
* cross-avr-binutils-debuginfo-2.43-150100.7.49.1
* cross-sparc64-binutils-2.43-150100.7.49.1
* cross-pru-binutils-debugsource-2.43-150100.7.49.1
* cross-riscv64-binutils-debugsource-2.43-150100.7.49.1
* binutils-gold-debuginfo-2.43-150100.7.49.1
* cross-mips-binutils-debugsource-2.43-150100.7.49.1
* cross-ppc-binutils-debugsource-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* cross-ppc-binutils-debuginfo-2.43-150100.7.49.1
* cross-epiphany-binutils-debugsource-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* openSUSE Leap 15.6 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* cross-aarch64-binutils-2.43-150100.7.49.1
* cross-aarch64-binutils-debuginfo-2.43-150100.7.49.1
* cross-aarch64-binutils-debugsource-2.43-150100.7.49.1
* openSUSE Leap 15.6 (aarch64 s390x x86_64)
* cross-ppc64le-binutils-debugsource-2.43-150100.7.49.1
* cross-ppc64le-binutils-debuginfo-2.43-150100.7.49.1
* cross-ppc64le-binutils-2.43-150100.7.49.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* cross-s390x-binutils-debugsource-2.43-150100.7.49.1
* cross-s390x-binutils-2.43-150100.7.49.1
* cross-s390x-binutils-debuginfo-2.43-150100.7.49.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x)
* cross-x86_64-binutils-debuginfo-2.43-150100.7.49.1
* cross-x86_64-binutils-2.43-150100.7.49.1
* cross-x86_64-binutils-debugsource-2.43-150100.7.49.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* Development Tools Module 15-SP5 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* Development Tools Module 15-SP6 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* binutils-gold-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* binutils-gold-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* binutils-gold-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* binutils-gold-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* binutils-2.43-150100.7.49.1
* binutils-devel-32bit-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
* SUSE Manager Proxy 4.3 (x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* binutils-2.43-150100.7.49.1
* libctf0-2.43-150100.7.49.1
* libctf-nobfd0-2.43-150100.7.49.1
* binutils-debuginfo-2.43-150100.7.49.1
* libctf-nobfd0-debuginfo-2.43-150100.7.49.1
* binutils-debugsource-2.43-150100.7.49.1
* binutils-devel-2.43-150100.7.49.1
* libctf0-debuginfo-2.43-150100.7.49.1
* SUSE Enterprise Storage 7.1 (x86_64)
* binutils-devel-32bit-2.43-150100.7.49.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1215341
* https://bugzilla.suse.com/show_bug.cgi?id=1216908
* https://jira.suse.com/browse/PED-10474
1
0
09 Sep '24
openSUSE Recommended Update: Recommended update for python-yq
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0293-1
Rating: low
References: #1229853
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for python-yq fixes the following issue:
- Build with python 3.11 (bsc#1229853).
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-293=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
python311-yq-3.2.2-bp156.2.3.1
References:
https://bugzilla.suse.com/1229853
1
0
openSUSE-SU-2024:0294-1: moderate: Security update for kanidm
by opensuse-security@opensuse.org 09 Sep '24
by opensuse-security@opensuse.org 09 Sep '24
09 Sep '24
openSUSE Security Update: Security update for kanidm
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0294-1
Rating: moderate
References: #1191031 #1194119 #1196972 #1210356
Cross-References: CVE-2021-45710 CVE-2022-24713 CVE-2023-26964
CVSS scores:
CVE-2021-45710 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-24713 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2023-26964 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for kanidm fixes the following issues:
- kanidm version 1.3.3~git0.f075d13:
* Release 1.3.3
* Mail substr index (#2981)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-294=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
kanidm-1.3.3~git0.f075d13-bp156.4.1
kanidm-clients-1.3.3~git0.f075d13-bp156.4.1
kanidm-docs-1.3.3~git0.f075d13-bp156.4.1
kanidm-server-1.3.3~git0.f075d13-bp156.4.1
kanidm-unixd-clients-1.3.3~git0.f075d13-bp156.4.1
References:
https://www.suse.com/security/cve/CVE-2021-45710.html
https://www.suse.com/security/cve/CVE-2022-24713.html
https://www.suse.com/security/cve/CVE-2023-26964.html
https://bugzilla.suse.com/1191031
https://bugzilla.suse.com/1194119
https://bugzilla.suse.com/1196972
https://bugzilla.suse.com/1210356
1
0
openSUSE-RU-2024:0292-1: moderate: Recommended update for adios
by maintenance@opensuse.org 09 Sep '24
by maintenance@opensuse.org 09 Sep '24
09 Sep '24
openSUSE Recommended Update: Recommended update for adios
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0292-1
Rating: moderate
References: #1228146
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for adios fixes the following issues:
- Require python3-PyYAML instead of non-existent python-PyYAML
(boo#1228146)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-292=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le x86_64):
adios-openmpi2-1.13.1-bp156.4.3.1
adios-openmpi2-devel-1.13.1-bp156.4.3.1
adios-openmpi2-devel-static-1.13.1-bp156.4.3.1
adios-openmpi3-1.13.1-bp156.4.3.1
adios-openmpi3-devel-1.13.1-bp156.4.3.1
adios-openmpi3-devel-static-1.13.1-bp156.4.3.1
adios-openmpi4-1.13.1-bp156.4.3.1
adios-openmpi4-devel-1.13.1-bp156.4.3.1
adios-openmpi4-devel-static-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-mpich-hpc-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-mpich-hpc-devel-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-mpich-hpc-devel-static-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-mvapich2-hpc-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-mvapich2-hpc-devel-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-mvapich2-hpc-devel-static-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi2-hpc-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi2-hpc-devel-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi2-hpc-devel-static-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi3-hpc-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi3-hpc-devel-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi3-hpc-devel-static-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi4-hpc-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi4-hpc-devel-1.13.1-bp156.4.3.1
adios_1_13_1-gnu-openmpi4-hpc-devel-static-1.13.1-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
adios-gnu-mpich-hpc-1.13.1-bp156.4.3.1
adios-gnu-mpich-hpc-devel-1.13.1-bp156.4.3.1
adios-gnu-mpich-hpc-devel-static-1.13.1-bp156.4.3.1
adios-gnu-mvapich2-hpc-1.13.1-bp156.4.3.1
adios-gnu-mvapich2-hpc-devel-1.13.1-bp156.4.3.1
adios-gnu-mvapich2-hpc-devel-static-1.13.1-bp156.4.3.1
adios-gnu-openmpi2-hpc-1.13.1-bp156.4.3.1
adios-gnu-openmpi2-hpc-devel-1.13.1-bp156.4.3.1
adios-gnu-openmpi2-hpc-devel-static-1.13.1-bp156.4.3.1
adios-gnu-openmpi3-hpc-1.13.1-bp156.4.3.1
adios-gnu-openmpi3-hpc-devel-1.13.1-bp156.4.3.1
adios-gnu-openmpi3-hpc-devel-static-1.13.1-bp156.4.3.1
adios-gnu-openmpi4-hpc-1.13.1-bp156.4.3.1
adios-gnu-openmpi4-hpc-devel-1.13.1-bp156.4.3.1
adios-gnu-openmpi4-hpc-devel-static-1.13.1-bp156.4.3.1
References:
https://bugzilla.suse.com/1228146
1
0
09 Sep '24
# Recommended update for suse-fonts
Announcement ID: SUSE-RU-2024:3164-1
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for suse-fonts fixes the following issues:
Update to v1.000:
* Prep for Google Fonts submission
* Update copyright
* Files ready for GF
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3164=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3164=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3164=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3164=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* suse-fonts-1.000-150000.1.6.1
* openSUSE Leap 15.6 (noarch)
* suse-fonts-1.000-150000.1.6.1
* Basesystem Module 15-SP5 (noarch)
* suse-fonts-1.000-150000.1.6.1
* Basesystem Module 15-SP6 (noarch)
* suse-fonts-1.000-150000.1.6.1
1
0
09 Sep '24
# Security update for wireshark
Announcement ID: SUSE-SU-2024:3165-1
Rating: important
References:
* bsc#1207666
* bsc#1211708
* bsc#1211709
* bsc#1213318
* bsc#1215959
* bsc#1217247
* bsc#1217272
* bsc#1218503
* bsc#1218506
* bsc#1218507
* bsc#1222030
* jsc#PED-8517
Cross-References:
* CVE-2023-0414
* CVE-2023-0666
* CVE-2023-2854
* CVE-2023-3649
* CVE-2023-5371
* CVE-2023-6174
* CVE-2023-6175
* CVE-2024-0207
* CVE-2024-0210
* CVE-2024-0211
* CVE-2024-2955
CVSS scores:
* CVE-2023-0414 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-0414 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-0666 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-0666 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-2854 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-2854 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2023-3649 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-3649 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2023-5371 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-5371 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-6174 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-6174 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-6175 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-0207 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-0207 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0210 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-0210 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-0211 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-0211 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2955 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 11 vulnerabilities and contains one feature can now be
installed.
## Description:
This update for wireshark fixes the following issues:
wireshark was updated from version 3.6.23 to version 4.2.6 (jsc#PED-8517):
* Security issues fixed with this update:
* CVE-2024-0207: HTTP3 dissector crash (bsc#1218503)
* CVE-2024-0210: Zigbee TLV dissector crash (bsc#1218506)
* CVE-2024-0211: DOCSIS dissector crash (bsc#1218507)
* CVE-2023-6174: Fixed SSH dissector crash (bsc#1217247)
* CVE-2023-6175: NetScreen file parser crash (bsc#1217272)
* CVE-2023-5371: RTPS dissector memory leak (bsc#1215959)
* CVE-2023-3649: iSCSI dissector crash (bsc#1213318)
* CVE-2023-2854: BLF file parser crash (bsc#1211708)
* CVE-2023-0666: RTPS dissector crash (bsc#1211709)
* CVE-2023-0414: EAP dissector crash (bsc#1207666)
* Major changes introduced with versions 4.2.0 and 4.0.0:
* Version 4.2.0 https://www.wireshark.org/docs/relnotes/wireshark-4.2.0.html
* Version 4.0.0 https://www.wireshark.org/docs/relnotes/wireshark-4.0.0.html
* Added an aditional desktopfile to start wireshark which asks for the super
user password.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3165=1 SUSE-2024-3165=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3165=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3165=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* wireshark-devel-4.2.6-150600.18.6.1
* wireshark-debuginfo-4.2.6-150600.18.6.1
* libwiretap14-4.2.6-150600.18.6.1
* wireshark-4.2.6-150600.18.6.1
* wireshark-ui-qt-4.2.6-150600.18.6.1
* libwireshark17-4.2.6-150600.18.6.1
* libwsutil15-debuginfo-4.2.6-150600.18.6.1
* libwsutil15-4.2.6-150600.18.6.1
* libwireshark17-debuginfo-4.2.6-150600.18.6.1
* libwiretap14-debuginfo-4.2.6-150600.18.6.1
* wireshark-debugsource-4.2.6-150600.18.6.1
* wireshark-ui-qt-debuginfo-4.2.6-150600.18.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* wireshark-debuginfo-4.2.6-150600.18.6.1
* libwiretap14-4.2.6-150600.18.6.1
* wireshark-4.2.6-150600.18.6.1
* libwireshark17-4.2.6-150600.18.6.1
* libwsutil15-debuginfo-4.2.6-150600.18.6.1
* libwsutil15-4.2.6-150600.18.6.1
* libwireshark17-debuginfo-4.2.6-150600.18.6.1
* libwiretap14-debuginfo-4.2.6-150600.18.6.1
* wireshark-debugsource-4.2.6-150600.18.6.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* wireshark-devel-4.2.6-150600.18.6.1
* wireshark-debuginfo-4.2.6-150600.18.6.1
* wireshark-ui-qt-4.2.6-150600.18.6.1
* wireshark-ui-qt-debuginfo-4.2.6-150600.18.6.1
* wireshark-debugsource-4.2.6-150600.18.6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-0414.html
* https://www.suse.com/security/cve/CVE-2023-0666.html
* https://www.suse.com/security/cve/CVE-2023-2854.html
* https://www.suse.com/security/cve/CVE-2023-3649.html
* https://www.suse.com/security/cve/CVE-2023-5371.html
* https://www.suse.com/security/cve/CVE-2023-6174.html
* https://www.suse.com/security/cve/CVE-2023-6175.html
* https://www.suse.com/security/cve/CVE-2024-0207.html
* https://www.suse.com/security/cve/CVE-2024-0210.html
* https://www.suse.com/security/cve/CVE-2024-0211.html
* https://www.suse.com/security/cve/CVE-2024-2955.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207666
* https://bugzilla.suse.com/show_bug.cgi?id=1211708
* https://bugzilla.suse.com/show_bug.cgi?id=1211709
* https://bugzilla.suse.com/show_bug.cgi?id=1213318
* https://bugzilla.suse.com/show_bug.cgi?id=1215959
* https://bugzilla.suse.com/show_bug.cgi?id=1217247
* https://bugzilla.suse.com/show_bug.cgi?id=1217272
* https://bugzilla.suse.com/show_bug.cgi?id=1218503
* https://bugzilla.suse.com/show_bug.cgi?id=1218506
* https://bugzilla.suse.com/show_bug.cgi?id=1218507
* https://bugzilla.suse.com/show_bug.cgi?id=1222030
* https://jira.suse.com/browse/PED-8517
1
0
09 Sep '24
# Recommended update for glibc
Announcement ID: SUSE-RU-2024:3166-1
Rating: moderate
References:
* bsc#1228042
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for glibc fixes the following issue:
* s390x-wcsncmp patch for s390x: Fix segfault in wcsncmp (bsc#1228042).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3166=1 openSUSE-SLE-15.6-2024-3166=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3166=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3166=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-devel-static-2.38-150600.14.8.2
* glibc-locale-base-debuginfo-2.38-150600.14.8.2
* libnsl1-debuginfo-2.38-150600.14.8.2
* glibc-2.38-150600.14.8.2
* libnsl1-2.38-150600.14.8.2
* glibc-devel-2.38-150600.14.8.2
* glibc-locale-2.38-150600.14.8.2
* glibc-debuginfo-2.38-150600.14.8.2
* glibc-debugsource-2.38-150600.14.8.2
* glibc-profile-2.38-150600.14.8.2
* glibc-locale-base-2.38-150600.14.8.2
* glibc-devel-debuginfo-2.38-150600.14.8.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glibc-utils-debuginfo-2.38-150600.14.8.2
* nscd-debuginfo-2.38-150600.14.8.2
* glibc-utils-2.38-150600.14.8.2
* nscd-2.38-150600.14.8.2
* glibc-extra-2.38-150600.14.8.2
* glibc-extra-debuginfo-2.38-150600.14.8.2
* glibc-utils-src-debugsource-2.38-150600.14.8.2
* openSUSE Leap 15.6 (noarch)
* glibc-html-2.38-150600.14.8.2
* glibc-info-2.38-150600.14.8.2
* glibc-i18ndata-2.38-150600.14.8.2
* glibc-lang-2.38-150600.14.8.2
* openSUSE Leap 15.6 (x86_64)
* glibc-utils-32bit-debuginfo-2.38-150600.14.8.2
* glibc-utils-32bit-2.38-150600.14.8.2
* glibc-locale-base-32bit-2.38-150600.14.8.2
* glibc-profile-32bit-2.38-150600.14.8.2
* libnsl1-32bit-2.38-150600.14.8.2
* glibc-devel-static-32bit-2.38-150600.14.8.2
* libnsl1-32bit-debuginfo-2.38-150600.14.8.2
* glibc-devel-32bit-2.38-150600.14.8.2
* glibc-devel-32bit-debuginfo-2.38-150600.14.8.2
* glibc-32bit-debuginfo-2.38-150600.14.8.2
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.8.2
* glibc-32bit-2.38-150600.14.8.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* glibc-utils-64bit-2.38-150600.14.8.2
* glibc-locale-base-64bit-2.38-150600.14.8.2
* glibc-utils-64bit-debuginfo-2.38-150600.14.8.2
* libnsl1-64bit-debuginfo-2.38-150600.14.8.2
* libnsl1-64bit-2.38-150600.14.8.2
* glibc-devel-64bit-2.38-150600.14.8.2
* glibc-64bit-2.38-150600.14.8.2
* glibc-profile-64bit-2.38-150600.14.8.2
* glibc-64bit-debuginfo-2.38-150600.14.8.2
* glibc-devel-static-64bit-2.38-150600.14.8.2
* glibc-devel-64bit-debuginfo-2.38-150600.14.8.2
* glibc-locale-base-64bit-debuginfo-2.38-150600.14.8.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-locale-base-debuginfo-2.38-150600.14.8.2
* libnsl1-debuginfo-2.38-150600.14.8.2
* glibc-2.38-150600.14.8.2
* libnsl1-2.38-150600.14.8.2
* nscd-debuginfo-2.38-150600.14.8.2
* glibc-extra-2.38-150600.14.8.2
* glibc-devel-2.38-150600.14.8.2
* glibc-locale-2.38-150600.14.8.2
* glibc-debuginfo-2.38-150600.14.8.2
* glibc-debugsource-2.38-150600.14.8.2
* glibc-profile-2.38-150600.14.8.2
* glibc-locale-base-2.38-150600.14.8.2
* nscd-2.38-150600.14.8.2
* glibc-extra-debuginfo-2.38-150600.14.8.2
* glibc-devel-debuginfo-2.38-150600.14.8.2
* Basesystem Module 15-SP6 (noarch)
* glibc-info-2.38-150600.14.8.2
* glibc-lang-2.38-150600.14.8.2
* glibc-i18ndata-2.38-150600.14.8.2
* Basesystem Module 15-SP6 (x86_64)
* glibc-locale-base-32bit-2.38-150600.14.8.2
* libnsl1-32bit-2.38-150600.14.8.2
* libnsl1-32bit-debuginfo-2.38-150600.14.8.2
* glibc-32bit-debuginfo-2.38-150600.14.8.2
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.8.2
* glibc-32bit-2.38-150600.14.8.2
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-devel-static-2.38-150600.14.8.2
* glibc-utils-debuginfo-2.38-150600.14.8.2
* glibc-utils-2.38-150600.14.8.2
* glibc-debuginfo-2.38-150600.14.8.2
* glibc-utils-src-debugsource-2.38-150600.14.8.2
* glibc-debugsource-2.38-150600.14.8.2
* Development Tools Module 15-SP6 (x86_64)
* glibc-devel-32bit-2.38-150600.14.8.2
* glibc-devel-32bit-debuginfo-2.38-150600.14.8.2
* glibc-32bit-debuginfo-2.38-150600.14.8.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228042
1
0
09 Sep '24
# Recommended update for glibc
Announcement ID: SUSE-RU-2024:3167-1
Rating: moderate
References:
* bsc#1228043
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for glibc fixes the following issue:
* s390x: Fix segfault in wcsncmp (bsc#1228043).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3167=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3167=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3167=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3167=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3167=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3167=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3167=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3167=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3167=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3167=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3167=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3167=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3167=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3167=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3167=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3167=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3167=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3167=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3167=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3167=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3167=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3167=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3167=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3167=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* nscd-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* openSUSE Leap 15.3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* glibc-html-2.31-150300.86.3
* openSUSE Leap 15.3 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-utils-32bit-2.31-150300.86.3
* glibc-devel-static-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-utils-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-profile-32bit-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* openSUSE Leap 15.3 (aarch64_ilp32)
* glibc-utils-64bit-debuginfo-2.31-150300.86.3
* glibc-devel-static-64bit-2.31-150300.86.3
* glibc-locale-base-64bit-debuginfo-2.31-150300.86.3
* glibc-64bit-2.31-150300.86.3
* glibc-utils-64bit-2.31-150300.86.3
* glibc-profile-64bit-2.31-150300.86.3
* glibc-locale-base-64bit-2.31-150300.86.3
* glibc-64bit-debuginfo-2.31-150300.86.3
* glibc-devel-64bit-debuginfo-2.31-150300.86.3
* glibc-devel-64bit-2.31-150300.86.3
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* openSUSE Leap 15.5 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-utils-32bit-2.31-150300.86.3
* glibc-devel-static-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-utils-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-profile-32bit-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* openSUSE Leap 15.5 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* glibc-html-2.31-150300.86.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* Basesystem Module 15-SP5 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* Basesystem Module 15-SP5 (x86_64)
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* Development Tools Module 15-SP5 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* nscd-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Manager Proxy 4.3 (x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Manager Proxy 4.3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Manager Retail Branch Server 4.3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Manager Server 4.3 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Manager Server 4.3 (x86_64)
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* nscd-2.31-150300.86.3
* glibc-debugsource-2.31-150300.86.3
* glibc-profile-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-devel-static-2.31-150300.86.3
* glibc-utils-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-devel-debuginfo-2.31-150300.86.3
* glibc-utils-debuginfo-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-extra-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* glibc-utils-src-debugsource-2.31-150300.86.3
* nscd-debuginfo-2.31-150300.86.3
* glibc-extra-debuginfo-2.31-150300.86.3
* SUSE Enterprise Storage 7.1 (noarch)
* glibc-i18ndata-2.31-150300.86.3
* glibc-info-2.31-150300.86.3
* glibc-lang-2.31-150300.86.3
* SUSE Enterprise Storage 7.1 (x86_64)
* glibc-devel-32bit-2.31-150300.86.3
* glibc-locale-base-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-debuginfo-2.31-150300.86.3
* glibc-locale-base-32bit-2.31-150300.86.3
* glibc-devel-32bit-debuginfo-2.31-150300.86.3
* glibc-32bit-2.31-150300.86.3
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.86.3
* glibc-devel-2.31-150300.86.3
* glibc-locale-base-debuginfo-2.31-150300.86.3
* glibc-locale-2.31-150300.86.3
* glibc-2.31-150300.86.3
* glibc-debuginfo-2.31-150300.86.3
* glibc-locale-base-2.31-150300.86.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228043
1
0
09 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3168-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 15.8 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3168=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3168=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3168=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3168=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3168=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3168=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3168=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3168=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3168=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3168=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3168=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3168=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3168=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3168=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3168=1
## Package List:
* SUSE Manager Proxy 4.3 (x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Manager Proxy 4.3 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Manager Server 4.3 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Enterprise Storage 7.1 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-test-15.8-150200.5.30.1
* postgresql15-llvmjit-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-llvmjit-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-llvmjit-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* openSUSE Leap 15.5 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* Server Applications Module 15-SP5 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* postgresql15-plperl-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-15.8-150200.5.30.1
* postgresql15-server-debuginfo-15.8-150200.5.30.1
* postgresql15-devel-15.8-150200.5.30.1
* postgresql15-contrib-15.8-150200.5.30.1
* postgresql15-pltcl-debuginfo-15.8-150200.5.30.1
* postgresql15-debugsource-15.8-150200.5.30.1
* postgresql15-15.8-150200.5.30.1
* postgresql15-devel-debuginfo-15.8-150200.5.30.1
* postgresql15-plpython-debuginfo-15.8-150200.5.30.1
* postgresql15-contrib-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-15.8-150200.5.30.1
* postgresql15-plperl-15.8-150200.5.30.1
* postgresql15-server-15.8-150200.5.30.1
* postgresql15-pltcl-15.8-150200.5.30.1
* postgresql15-debuginfo-15.8-150200.5.30.1
* postgresql15-server-devel-debuginfo-15.8-150200.5.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* postgresql15-docs-15.8-150200.5.30.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
09 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3169-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 14.13 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3169=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3169=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3169=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3169=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3169=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3169=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3169=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3169=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3169=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3169=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3169=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3169=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3169=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3169=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3169=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3169=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3169=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3169=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-test-14.13-150200.5.47.1
* postgresql14-14.13-150200.5.47.1
* postgresql14-llvmjit-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-llvmjit-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-llvmjit-debuginfo-14.13-150200.5.47.1
* openSUSE Leap 15.5 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-llvmjit-devel-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-llvmjit-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-llvmjit-debuginfo-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* Legacy Module 15-SP5 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql14-llvmjit-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-llvmjit-debuginfo-14.13-150200.5.47.1
* postgresql14-test-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Manager Proxy 4.3 (x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Manager Proxy 4.3 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Manager Server 4.3 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* postgresql14-14.13-150200.5.47.1
* postgresql14-server-devel-14.13-150200.5.47.1
* postgresql14-server-14.13-150200.5.47.1
* postgresql14-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-14.13-150200.5.47.1
* postgresql14-devel-14.13-150200.5.47.1
* postgresql14-server-devel-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-debuginfo-14.13-150200.5.47.1
* postgresql14-plperl-debuginfo-14.13-150200.5.47.1
* postgresql14-contrib-14.13-150200.5.47.1
* postgresql14-debuginfo-14.13-150200.5.47.1
* postgresql14-debugsource-14.13-150200.5.47.1
* postgresql14-plperl-14.13-150200.5.47.1
* postgresql14-pltcl-14.13-150200.5.47.1
* postgresql14-pltcl-debuginfo-14.13-150200.5.47.1
* postgresql14-server-debuginfo-14.13-150200.5.47.1
* postgresql14-plpython-debuginfo-14.13-150200.5.47.1
* SUSE Enterprise Storage 7.1 (noarch)
* postgresql14-docs-14.13-150200.5.47.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
09 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3170-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 16.4 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3170=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3170=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3170=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3170=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3170=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3170=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3170=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3170=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3170=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3170=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3170=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3170=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3170=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3170=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3170=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3170=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3170=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3170=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3170=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libecpg6-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libecpg6-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libecpg6-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Manager Proxy 4.3 (x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Manager Proxy 4.3 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Manager Server 4.3 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Manager Server 4.3 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libecpg6-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-mini-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-llvmjit-devel-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* postgresql16-llvmjit-debuginfo-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-test-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-mini-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-mini-debugsource-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* postgresql16-llvmjit-16.4-150200.5.16.1
* openSUSE Leap 15.5 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libecpg6-32bit-16.4-150200.5.16.1
* libecpg6-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* openSUSE Leap 15.5 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql16-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* Basesystem Module 15-SP5 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql16-test-16.4-150200.5.16.1
* postgresql16-llvmjit-debuginfo-16.4-150200.5.16.1
* postgresql16-llvmjit-16.4-150200.5.16.1
* postgresql16-llvmjit-devel-16.4-150200.5.16.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libecpg6-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* Server Applications Module 15-SP5 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libecpg6-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libecpg6-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* postgresql16-plperl-debuginfo-16.4-150200.5.16.1
* postgresql16-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-pltcl-16.4-150200.5.16.1
* postgresql16-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-devel-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* postgresql16-plpython-16.4-150200.5.16.1
* postgresql16-plpython-debuginfo-16.4-150200.5.16.1
* libecpg6-16.4-150200.5.16.1
* postgresql16-pltcl-debuginfo-16.4-150200.5.16.1
* postgresql16-plperl-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* postgresql16-contrib-debuginfo-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* postgresql16-contrib-16.4-150200.5.16.1
* postgresql16-server-devel-debuginfo-16.4-150200.5.16.1
* postgresql16-server-debuginfo-16.4-150200.5.16.1
* postgresql16-devel-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* postgresql16-server-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* postgresql16-docs-16.4-150200.5.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* postgresql16-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* postgresql16-16.4-150200.5.16.1
* postgresql16-debugsource-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libecpg6-16.4-150200.5.16.1
* libpq5-16.4-150200.5.16.1
* libecpg6-debuginfo-16.4-150200.5.16.1
* libpq5-debuginfo-16.4-150200.5.16.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libpq5-32bit-debuginfo-16.4-150200.5.16.1
* libpq5-32bit-16.4-150200.5.16.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
09 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3171-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Galera for Ericsson 15 SP5
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 13.16 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3171=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3171=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3171=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3171=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3171=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3171=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3171=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3171=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3171=1
* Galera for Ericsson 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-3171=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3171=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3171=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3171=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3171=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* postgresql13-llvmjit-devel-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-test-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* postgresql13-llvmjit-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-llvmjit-debuginfo-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* openSUSE Leap 15.5 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* postgresql13-llvmjit-devel-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-test-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* postgresql13-llvmjit-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-llvmjit-debuginfo-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* openSUSE Leap 15.6 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-llvmjit-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-llvmjit-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* postgresql13-llvmjit-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-llvmjit-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-llvmjit-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* postgresql13-llvmjit-13.16-150200.5.61.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-llvmjit-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-llvmjit-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* postgresql13-llvmjit-13.16-150200.5.61.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* Galera for Ericsson 15 SP5 (x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* Galera for Ericsson 15 SP5 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-llvmjit-debuginfo-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-llvmjit-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* postgresql13-llvmjit-13.16-150200.5.61.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* postgresql13-13.16-150200.5.61.1
* postgresql13-pltcl-debuginfo-13.16-150200.5.61.1
* postgresql13-server-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-debugsource-13.16-150200.5.61.1
* postgresql13-server-13.16-150200.5.61.1
* postgresql13-contrib-13.16-150200.5.61.1
* postgresql13-plperl-13.16-150200.5.61.1
* postgresql13-server-devel-13.16-150200.5.61.1
* postgresql13-contrib-debuginfo-13.16-150200.5.61.1
* postgresql13-devel-debuginfo-13.16-150200.5.61.1
* postgresql13-plperl-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-debuginfo-13.16-150200.5.61.1
* postgresql13-server-debuginfo-13.16-150200.5.61.1
* postgresql13-plpython-13.16-150200.5.61.1
* postgresql13-devel-13.16-150200.5.61.1
* postgresql13-pltcl-13.16-150200.5.61.1
* postgresql13-debuginfo-13.16-150200.5.61.1
* SUSE Enterprise Storage 7.1 (noarch)
* postgresql13-docs-13.16-150200.5.61.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
09 Sep '24
# Security update for apache2
Announcement ID: SUSE-SU-2024:3172-1
Rating: important
References:
* bsc#1227276
* bsc#1227278
* bsc#1227353
Cross-References:
* CVE-2024-38473
* CVE-2024-38474
* CVE-2024-39884
CVSS scores:
* CVE-2024-38473 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-38474 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
* CVE-2024-38474 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39884 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for apache2 fixes the following issues:
* CVE-2024-38474: Fixed substitution encoding issue in mod_rewrite
(bsc#1227278)
* CVE-2024-38473: Fixed encoding problem in mod_proxy (bsc#1227276)
* CVE-2024-39884: Fixed source code disclosure with handlers configured via
AddType (bsc#1227353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3172=1 SUSE-2024-3172=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3172=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3172=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3172=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* apache2-devel-2.4.58-150600.5.23.1
* apache2-worker-debugsource-2.4.58-150600.5.23.1
* apache2-worker-2.4.58-150600.5.23.1
* apache2-prefork-debuginfo-2.4.58-150600.5.23.1
* apache2-debuginfo-2.4.58-150600.5.23.1
* apache2-prefork-debugsource-2.4.58-150600.5.23.1
* apache2-2.4.58-150600.5.23.1
* apache2-debugsource-2.4.58-150600.5.23.1
* apache2-utils-2.4.58-150600.5.23.1
* apache2-worker-debuginfo-2.4.58-150600.5.23.1
* apache2-prefork-2.4.58-150600.5.23.1
* apache2-event-debuginfo-2.4.58-150600.5.23.1
* apache2-utils-debugsource-2.4.58-150600.5.23.1
* apache2-event-debugsource-2.4.58-150600.5.23.1
* apache2-event-2.4.58-150600.5.23.1
* apache2-utils-debuginfo-2.4.58-150600.5.23.1
* openSUSE Leap 15.6 (noarch)
* apache2-manual-2.4.58-150600.5.23.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* apache2-prefork-debuginfo-2.4.58-150600.5.23.1
* apache2-debuginfo-2.4.58-150600.5.23.1
* apache2-prefork-debugsource-2.4.58-150600.5.23.1
* apache2-2.4.58-150600.5.23.1
* apache2-debugsource-2.4.58-150600.5.23.1
* apache2-prefork-2.4.58-150600.5.23.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* apache2-debuginfo-2.4.58-150600.5.23.1
* apache2-debugsource-2.4.58-150600.5.23.1
* apache2-event-debuginfo-2.4.58-150600.5.23.1
* apache2-event-debugsource-2.4.58-150600.5.23.1
* apache2-event-2.4.58-150600.5.23.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* apache2-devel-2.4.58-150600.5.23.1
* apache2-worker-debugsource-2.4.58-150600.5.23.1
* apache2-utils-2.4.58-150600.5.23.1
* apache2-worker-debuginfo-2.4.58-150600.5.23.1
* apache2-utils-debugsource-2.4.58-150600.5.23.1
* apache2-worker-2.4.58-150600.5.23.1
* apache2-utils-debuginfo-2.4.58-150600.5.23.1
## References:
* https://www.suse.com/security/cve/CVE-2024-38473.html
* https://www.suse.com/security/cve/CVE-2024-38474.html
* https://www.suse.com/security/cve/CVE-2024-39884.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227276
* https://bugzilla.suse.com/show_bug.cgi?id=1227278
* https://bugzilla.suse.com/show_bug.cgi?id=1227353
1
0
09 Sep '24
# Security update for apache2
Announcement ID: SUSE-SU-2024:3173-1
Rating: important
References:
* bsc#1227276
* bsc#1227278
* bsc#1227353
Cross-References:
* CVE-2024-38473
* CVE-2024-38474
* CVE-2024-39884
CVSS scores:
* CVE-2024-38473 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-38474 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
* CVE-2024-38474 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-39884 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for apache2 fixes the following issues:
* CVE-2024-38474: Fixed substitution encoding issue in mod_rewrite
(bsc#1227278)
* CVE-2024-38473: Fixed encoding problem in mod_proxy (bsc#1227276)
* CVE-2024-39884: Fixed source code disclosure with handlers configured via
AddType (bsc#1227353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3173=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3173=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3173=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3173=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3173=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3173=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3173=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3173=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3173=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3173=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3173=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3173=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3173=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3173=1
## Package List:
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* Server Applications Module 15-SP5 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* Server Applications Module 15-SP6 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* apache2-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Manager Proxy 4.3 (x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Manager Proxy 4.3 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Manager Server 4.3 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* apache2-event-2.4.51-150400.6.34.1
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-event-debuginfo-2.4.51-150400.6.34.1
* apache2-example-pages-2.4.51-150400.6.34.1
* openSUSE Leap 15.4 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* apache2-event-2.4.51-150400.6.34.1
* apache2-worker-debuginfo-2.4.51-150400.6.34.1
* apache2-2.4.51-150400.6.34.1
* apache2-devel-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-worker-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-event-debuginfo-2.4.51-150400.6.34.1
* apache2-example-pages-2.4.51-150400.6.34.1
* openSUSE Leap 15.5 (noarch)
* apache2-doc-2.4.51-150400.6.34.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
* apache2-prefork-debuginfo-2.4.51-150400.6.34.1
* apache2-utils-2.4.51-150400.6.34.1
* apache2-prefork-2.4.51-150400.6.34.1
* apache2-utils-debuginfo-2.4.51-150400.6.34.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* apache2-event-2.4.51-150400.6.34.1
* apache2-event-debuginfo-2.4.51-150400.6.34.1
* apache2-debugsource-2.4.51-150400.6.34.1
* apache2-debuginfo-2.4.51-150400.6.34.1
## References:
* https://www.suse.com/security/cve/CVE-2024-38473.html
* https://www.suse.com/security/cve/CVE-2024-38474.html
* https://www.suse.com/security/cve/CVE-2024-39884.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227276
* https://bugzilla.suse.com/show_bug.cgi?id=1227278
* https://bugzilla.suse.com/show_bug.cgi?id=1227353
1
0
SUSE-SU-2024:3174-1: important: Security update for bubblewrap and flatpak
by OPENSUSE-UPDATES 09 Sep '24
by OPENSUSE-UPDATES 09 Sep '24
09 Sep '24
# Security update for bubblewrap and flatpak
Announcement ID: SUSE-SU-2024:3174-1
Rating: important
References:
* bsc#1229157
Cross-References:
* CVE-2024-42472
CVSS scores:
* CVE-2024-42472 ( SUSE ): 9.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
* CVE-2024-42472 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.4
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for bubblewrap and flatpak fixes the following issues:
* CVE-2024-42472: Fixed access to files outside sandbox for apps using
persistent (bsc#1229157)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3174=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3174=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3174=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3174=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3174=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3174=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3174=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3174=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3174=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3174=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3174=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3174=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3174=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3174=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3174=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3174=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* flatpak-debugsource-1.12.8-150400.3.9.1
* libflatpak0-debuginfo-1.12.8-150400.3.9.1
* flatpak-zsh-completion-1.12.8-150400.3.9.1
* flatpak-devel-1.12.8-150400.3.9.1
* flatpak-debuginfo-1.12.8-150400.3.9.1
* system-user-flatpak-1.12.8-150400.3.9.1
* typelib-1_0-Flatpak-1_0-1.12.8-150400.3.9.1
* flatpak-1.12.8-150400.3.9.1
* libflatpak0-1.12.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* flatpak-debugsource-1.12.8-150400.3.9.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* libflatpak0-debuginfo-1.12.8-150400.3.9.1
* flatpak-zsh-completion-1.12.8-150400.3.9.1
* flatpak-devel-1.12.8-150400.3.9.1
* flatpak-debuginfo-1.12.8-150400.3.9.1
* system-user-flatpak-1.12.8-150400.3.9.1
* typelib-1_0-Flatpak-1_0-1.12.8-150400.3.9.1
* flatpak-1.12.8-150400.3.9.1
* libflatpak0-1.12.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* flatpak-debugsource-1.12.8-150400.3.9.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* libflatpak0-debuginfo-1.12.8-150400.3.9.1
* flatpak-zsh-completion-1.12.8-150400.3.9.1
* flatpak-devel-1.12.8-150400.3.9.1
* flatpak-debuginfo-1.12.8-150400.3.9.1
* system-user-flatpak-1.12.8-150400.3.9.1
* typelib-1_0-Flatpak-1_0-1.12.8-150400.3.9.1
* flatpak-1.12.8-150400.3.9.1
* libflatpak0-1.12.8-150400.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* flatpak-debugsource-1.12.8-150400.3.9.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* libflatpak0-debuginfo-1.12.8-150400.3.9.1
* flatpak-zsh-completion-1.12.8-150400.3.9.1
* flatpak-devel-1.12.8-150400.3.9.1
* flatpak-debuginfo-1.12.8-150400.3.9.1
* system-user-flatpak-1.12.8-150400.3.9.1
* typelib-1_0-Flatpak-1_0-1.12.8-150400.3.9.1
* flatpak-1.12.8-150400.3.9.1
* libflatpak0-1.12.8-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* flatpak-debugsource-1.12.8-150400.3.9.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* libflatpak0-debuginfo-1.12.8-150400.3.9.1
* flatpak-zsh-completion-1.12.8-150400.3.9.1
* flatpak-devel-1.12.8-150400.3.9.1
* flatpak-debuginfo-1.12.8-150400.3.9.1
* system-user-flatpak-1.12.8-150400.3.9.1
* typelib-1_0-Flatpak-1_0-1.12.8-150400.3.9.1
* flatpak-1.12.8-150400.3.9.1
* libflatpak0-1.12.8-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* flatpak-debugsource-1.12.8-150400.3.9.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* libflatpak0-debuginfo-1.12.8-150400.3.9.1
* flatpak-zsh-completion-1.12.8-150400.3.9.1
* flatpak-devel-1.12.8-150400.3.9.1
* flatpak-debuginfo-1.12.8-150400.3.9.1
* system-user-flatpak-1.12.8-150400.3.9.1
* typelib-1_0-Flatpak-1_0-1.12.8-150400.3.9.1
* flatpak-1.12.8-150400.3.9.1
* libflatpak0-1.12.8-150400.3.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* flatpak-debuginfo-1.10.8-150200.4.21.1
* bubblewrap-debugsource-0.4.1-150200.3.3.1
* bubblewrap-0.4.1-150200.3.3.1
* bubblewrap-debuginfo-0.4.1-150200.3.3.1
* flatpak-debugsource-1.10.8-150200.4.21.1
* flatpak-1.10.8-150200.4.21.1
* libflatpak0-1.10.8-150200.4.21.1
* flatpak-zsh-completion-1.10.8-150200.4.21.1
* typelib-1_0-Flatpak-1_0-1.10.8-150200.4.21.1
* system-user-flatpak-1.10.8-150200.4.21.1
* libflatpak0-debuginfo-1.10.8-150200.4.21.1
* flatpak-devel-1.10.8-150200.4.21.1
## References:
* https://www.suse.com/security/cve/CVE-2024-42472.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229157
1
0
09 Sep '24
# Recommended update for mksusecd
Announcement ID: SUSE-RU-2024:3175-1
Rating: important
References:
* bsc#1223982
* bsc#1227668
* jsc#PED-8374
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that contains one feature and has two fixes can now be installed.
## Description:
This update for mksusecd fixes the following issues:
* Make some compression settings configurable (bsc#1223982, jsc#PED-8374).
* Update documentation.
* Fix UEFI image rebuild detection (bsc#1227668).
* Allow updating kernel in live initrd.
* Allow updating kernel in live root, support resizing live root.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3175=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3175=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3175=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3175=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3175=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3175=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* mksusecd-debuginfo-3.0-150400.3.24.4
* mksusecd-debugsource-3.0-150400.3.24.4
* mksusecd-3.0-150400.3.24.4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* mksusecd-debuginfo-3.0-150400.3.24.4
* mksusecd-debugsource-3.0-150400.3.24.4
* mksusecd-3.0-150400.3.24.4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* mksusecd-debuginfo-3.0-150400.3.24.4
* mksusecd-debugsource-3.0-150400.3.24.4
* mksusecd-3.0-150400.3.24.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* mksusecd-debuginfo-3.0-150400.3.24.4
* mksusecd-debugsource-3.0-150400.3.24.4
* mksusecd-3.0-150400.3.24.4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* mksusecd-debuginfo-3.0-150400.3.24.4
* mksusecd-debugsource-3.0-150400.3.24.4
* mksusecd-3.0-150400.3.24.4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* mksusecd-debuginfo-3.0-150400.3.24.4
* mksusecd-debugsource-3.0-150400.3.24.4
* mksusecd-3.0-150400.3.24.4
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223982
* https://bugzilla.suse.com/show_bug.cgi?id=1227668
* https://jira.suse.com/browse/PED-8374
1
0
09 Sep '24
# Recommended update for mksusecd
Announcement ID: SUSE-RU-2024:3176-1
Rating: important
References:
* bsc#1223982
* bsc#1227668
* jsc#PED-8374
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that contains one feature and has two fixes can now be installed.
## Description:
This update for mksusecd fixes the following issues:
* Make some compression settings configurable (bsc#1223982, jsc#PED-8374).
* Update documentation.
* Fix UEFI image rebuild detection (bsc#1227668).
* Allow updating kernel in live initrd.
* Allow updating kernel in live root, support resizing live root.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3176=1 openSUSE-SLE-15.5-2024-3176=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3176=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* mksusecd-3.0-150500.3.9.3
* mksusecd-debugsource-3.0-150500.3.9.3
* mksusecd-debuginfo-3.0-150500.3.9.3
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* mksusecd-3.0-150500.3.9.3
* mksusecd-debugsource-3.0-150500.3.9.3
* mksusecd-debuginfo-3.0-150500.3.9.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223982
* https://bugzilla.suse.com/show_bug.cgi?id=1227668
* https://jira.suse.com/browse/PED-8374
1
0
openSUSE-RU-2024:0287-1: moderate: Recommended update for cockpit, cockpit-machines
by maintenance@opensuse.org 07 Sep '24
by maintenance@opensuse.org 07 Sep '24
07 Sep '24
openSUSE Recommended Update: Recommended update for cockpit, cockpit-machines
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0287-1
Rating: moderate
References: #1196971 #1197003 #1199672 #1199673 #1202166
#1223533 #1226541
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 7 recommended fixes can now be installed.
Description:
This update for cockpit, cockpit-machines fixes the following issues:
Changes in cockpit:
- Fix libexecdir for leap and sle (boo#1223533)
- Fix systemd units folder for leap and sle (boo#1226541)
- Recommend cockpit-packagekit if zypper is installed
- new version 321:
* Bug fixes and performance improvements
- update_version.sh: use instead of `osc service mr` to do version
updates. updated README.packaging
Changes in cockpit-machines:
- Add initial package of version 316
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-287=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
cockpit-321-bp156.2.9.1
cockpit-bridge-321-bp156.2.9.1
cockpit-devel-321-bp156.2.9.1
cockpit-pcp-321-bp156.2.9.1
cockpit-ws-321-bp156.2.9.1
- openSUSE Backports SLE-15-SP6 (noarch):
cockpit-doc-321-bp156.2.9.1
cockpit-kdump-321-bp156.2.9.1
cockpit-machines-316-bp156.2.2
cockpit-networkmanager-321-bp156.2.9.1
cockpit-packagekit-321-bp156.2.9.1
cockpit-selinux-321-bp156.2.9.1
cockpit-storaged-321-bp156.2.9.1
cockpit-system-321-bp156.2.9.1
References:
https://bugzilla.suse.com/1196971
https://bugzilla.suse.com/1197003
https://bugzilla.suse.com/1199672
https://bugzilla.suse.com/1199673
https://bugzilla.suse.com/1202166
https://bugzilla.suse.com/1223533
https://bugzilla.suse.com/1226541
1
0
openSUSE-SU-2024:0283-1: important: Security update for chromium
by opensuse-security@opensuse.org 06 Sep '24
by opensuse-security@opensuse.org 06 Sep '24
06 Sep '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0283-1
Rating: important
References: #1230108
Cross-References: CVE-2024-7970 CVE-2024-8362
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 128.0.6613.119 (released 2024-09-02) (boo#1230108)
* CVE-2024-8362: Use after free in WebAudio
* CVE-2024-7970: Out of bounds write in V8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-283=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
chromedriver-128.0.6613.119-bp155.2.111.1
chromium-128.0.6613.119-bp155.2.111.1
References:
https://www.suse.com/security/cve/CVE-2024-7970.html
https://www.suse.com/security/cve/CVE-2024-8362.html
https://bugzilla.suse.com/1230108
1
0
openSUSE-RU-2024:0284-1: moderate: Recommended update for python-maxminddb
by maintenance@opensuse.org 06 Sep '24
by maintenance@opensuse.org 06 Sep '24
06 Sep '24
openSUSE Recommended Update: Recommended update for python-maxminddb
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0284-1
Rating: moderate
References: #1186841
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for python-maxminddb delivers the 2.2.0 version.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-284=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
python3-maxminddb-2.2.0-bp156.2.1
References:
https://bugzilla.suse.com/1186841
1
0
openSUSE-RU-2024:0285-1: moderate: Recommended update for python-PasteDeploy
by maintenance@opensuse.org 06 Sep '24
by maintenance@opensuse.org 06 Sep '24
06 Sep '24
openSUSE Recommended Update: Recommended update for python-PasteDeploy
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0285-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for python-PasteDeploy fixes the following issues:
Ship python-PasteDeploy version 2.1.1+git.1652668078.0f0697d.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-285=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
python311-PasteDeploy-2.1.1+git.1652668078.0f0697d-bp156.2.1
References:
1
0
06 Sep '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:3151-1
Rating: important
References:
* bsc#1221243
* bsc#1221677
* bsc#1224117
Cross-References:
* CVE-2024-1753
* CVE-2024-24786
* CVE-2024-28180
* CVE-2024-3727
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for buildah fixes the following issues:
Update to version 1.35.4:
* Bump to Buildah v1.35.4
* CVE-2024-3727 updates (bsc#1224117)
* integration test: handle new labels in "bud and test --unsetlabel"
* Bump go-jose CVE-2024-28180
* Bump ocicrypt and go-jose CVE-2024-28180
Update to version 1.35.3:
* correctly configure /etc/hosts and resolv.conf
* buildah: refactor resolv/hosts setup.
* CVE-2024-24786 protobuf to 1.33
Update to version 1.35.1:
* CVE-2024-1753 container escape fix (bsc#1221677)
* Buildah dropped cni support, require netavark instead (bsc#1221243)
* Remove obsolete requires libcontainers-image & libcontainers-storage
* Require passt for rootless networking (poo#156955) Buildah moved to
passt/pasta for rootless networking from slirp4netns
(https://github.com/containers/common/pull/1846)
Update to version 1.35.0:
* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
* Update module go.etcd.io/bbolt to v1.3.9
* Revert "Reduce official image size"
* Update module github.com/opencontainers/image-spec to v1.1.0
* Reduce official image size
* Build with CNI support on FreeBSD
* build --all-platforms: skip some base "image" platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Disable loong64 again
* Fix a couple of typos in one-line comments
* egrep is obsolescent; use grep -E
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* imagebuildah: fix crash with empty RUN
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* Replace map[K]bool with map[K]struct{} where it makes sense
* Replace strings.SplitN with strings.Cut
* Document use of containers-transports values in buildah
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* Ignore errors if label.Relabel returns ENOSUP
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3151=1 openSUSE-SLE-15.5-2024-3151=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3151=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3151=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3151=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150500.3.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150500.3.10.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150500.3.10.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150500.3.10.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-28180.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221243
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
* https://bugzilla.suse.com/show_bug.cgi?id=1224117
1
0
06 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3153-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 12.20 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3153=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3153=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3153=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3153=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3153=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3153=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3153=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3153=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3153=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-test-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-llvmjit-debuginfo-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-llvmjit-12.20-150200.8.63.1
* postgresql12-llvmjit-devel-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* openSUSE Leap 15.5 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-test-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-llvmjit-debuginfo-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-llvmjit-12.20-150200.8.63.1
* postgresql12-llvmjit-devel-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* openSUSE Leap 15.6 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* postgresql12-plperl-12.20-150200.8.63.1
* postgresql12-contrib-debuginfo-12.20-150200.8.63.1
* postgresql12-contrib-12.20-150200.8.63.1
* postgresql12-server-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debugsource-12.20-150200.8.63.1
* postgresql12-devel-debuginfo-12.20-150200.8.63.1
* postgresql12-debuginfo-12.20-150200.8.63.1
* postgresql12-plperl-debuginfo-12.20-150200.8.63.1
* postgresql12-pltcl-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-debuginfo-12.20-150200.8.63.1
* postgresql12-plpython-12.20-150200.8.63.1
* postgresql12-12.20-150200.8.63.1
* postgresql12-server-12.20-150200.8.63.1
* postgresql12-server-debuginfo-12.20-150200.8.63.1
* postgresql12-server-devel-12.20-150200.8.63.1
* postgresql12-pltcl-12.20-150200.8.63.1
* postgresql12-devel-12.20-150200.8.63.1
* SUSE Enterprise Storage 7.1 (noarch)
* postgresql12-docs-12.20-150200.8.63.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
06 Sep '24
# Security update for kubernetes1.26
Announcement ID: SUSE-SU-2024:3155-1
Rating: important
References:
* bsc#1229869
Cross-References:
* CVE-2023-45288
CVSS scores:
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for kubernetes1.26 fixes the following issues:
* CVE-2023-45288: Close connections when receiving too many headers.
(bsc#1229869)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3155=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3155=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3155=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3155=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3155=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3155=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3155=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3155=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3155=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-scheduler-1.26.15-150400.9.14.1
* kubernetes1.26-apiserver-1.26.15-150400.9.14.1
* kubernetes1.26-kubelet-1.26.15-150400.9.14.1
* kubernetes1.26-kubelet-common-1.26.15-150400.9.14.1
* kubernetes1.26-kubeadm-1.26.15-150400.9.14.1
* kubernetes1.26-controller-manager-1.26.15-150400.9.14.1
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* kubernetes1.26-proxy-1.26.15-150400.9.14.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.26-client-fish-completion-1.26.15-150400.9.14.1
* kubernetes1.26-client-bash-completion-1.26.15-150400.9.14.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-scheduler-1.26.15-150400.9.14.1
* kubernetes1.26-apiserver-1.26.15-150400.9.14.1
* kubernetes1.26-kubelet-1.26.15-150400.9.14.1
* kubernetes1.26-kubelet-common-1.26.15-150400.9.14.1
* kubernetes1.26-kubeadm-1.26.15-150400.9.14.1
* kubernetes1.26-controller-manager-1.26.15-150400.9.14.1
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* kubernetes1.26-proxy-1.26.15-150400.9.14.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.26-client-fish-completion-1.26.15-150400.9.14.1
* kubernetes1.26-client-bash-completion-1.26.15-150400.9.14.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kubernetes1.26-client-common-1.26.15-150400.9.14.1
* kubernetes1.26-client-1.26.15-150400.9.14.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229869
1
0
06 Sep '24
# Security update for python312-pip
Announcement ID: SUSE-SU-2024:3156-1
Rating: low
References:
* bsc#1217353
Cross-References:
* CVE-2023-5752
CVSS scores:
* CVE-2023-5752 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-5752 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* openSUSE Leap 15.6
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python312-pip fixes the following issues:
* CVE-2023-5752: Avoiding injection of arbitrary configuration through
Mercurial parameter. (bsc#1217353)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3156=1 openSUSE-SLE-15.6-2024-3156=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3156=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python312-pip-23.2.1-150600.3.3.1
* Python 3 Module 15-SP6 (noarch)
* python312-pip-23.2.1-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2023-5752.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217353
1
0
06 Sep '24
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:3157-1
Rating: important
References:
* bsc#1229821
Cross-References:
* CVE-2024-8381
* CVE-2024-8382
* CVE-2024-8383
* CVE-2024-8384
* CVE-2024-8385
* CVE-2024-8386
* CVE-2024-8387
CVSS scores:
* CVE-2024-8381 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-8381 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8382 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-8382 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8383 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8383 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-8384 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-8384 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8385 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8385 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8386 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8386 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-8387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8387 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
* Update to Firefox Extended Support Release 128.2.0 ESR (bsc#1229821)
* CVE-2024-8381: Type confusion when looking up a property name in a 'with'
block
* CVE-2024-8382: Internal event interfaces were exposed to web content when
browser EventHandler listener callbacks ran
* CVE-2024-8383: Firefox did not ask before openings news: links in an
external application
* CVE-2024-8384: Garbage collection could mis-color cross-compartment objects
in OOM conditions
* CVE-2024-8385: WASM type confusion involving ArrayTypes
* CVE-2024-8386: SelectElements could be shown over another site if popups are
allowed
* CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2,
and Thunderbird 128.2
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3157=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3157=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3157=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3157=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3157=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3157=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3157=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3157=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3157=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3157=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3157=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3157=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3157=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3157=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3157=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3157=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-branding-upstream-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-branding-upstream-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-debuginfo-128.2.0-150200.152.149.1
* MozillaFirefox-translations-other-128.2.0-150200.152.149.1
* MozillaFirefox-128.2.0-150200.152.149.1
* MozillaFirefox-debugsource-128.2.0-150200.152.149.1
* MozillaFirefox-translations-common-128.2.0-150200.152.149.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-128.2.0-150200.152.149.1
## References:
* https://www.suse.com/security/cve/CVE-2024-8381.html
* https://www.suse.com/security/cve/CVE-2024-8382.html
* https://www.suse.com/security/cve/CVE-2024-8383.html
* https://www.suse.com/security/cve/CVE-2024-8384.html
* https://www.suse.com/security/cve/CVE-2024-8385.html
* https://www.suse.com/security/cve/CVE-2024-8386.html
* https://www.suse.com/security/cve/CVE-2024-8387.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229821
1
0
06 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3158-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 15.8 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3158=1 openSUSE-SLE-15.6-2024-3158=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3158=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql15-llvmjit-15.8-150600.16.6.1
* postgresql15-plperl-debuginfo-15.8-150600.16.6.1
* postgresql15-test-15.8-150600.16.6.1
* postgresql15-devel-debuginfo-15.8-150600.16.6.1
* postgresql15-contrib-15.8-150600.16.6.1
* postgresql15-debuginfo-15.8-150600.16.6.1
* postgresql15-15.8-150600.16.6.1
* postgresql15-llvmjit-devel-15.8-150600.16.6.1
* postgresql15-debugsource-15.8-150600.16.6.1
* postgresql15-plpython-15.8-150600.16.6.1
* postgresql15-server-devel-15.8-150600.16.6.1
* postgresql15-llvmjit-debuginfo-15.8-150600.16.6.1
* postgresql15-server-debuginfo-15.8-150600.16.6.1
* postgresql15-server-devel-debuginfo-15.8-150600.16.6.1
* postgresql15-devel-15.8-150600.16.6.1
* postgresql15-server-15.8-150600.16.6.1
* postgresql15-pltcl-15.8-150600.16.6.1
* postgresql15-contrib-debuginfo-15.8-150600.16.6.1
* postgresql15-pltcl-debuginfo-15.8-150600.16.6.1
* postgresql15-plpython-debuginfo-15.8-150600.16.6.1
* postgresql15-plperl-15.8-150600.16.6.1
* openSUSE Leap 15.6 (noarch)
* postgresql15-docs-15.8-150600.16.6.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql15-debuginfo-15.8-150600.16.6.1
* postgresql15-contrib-debuginfo-15.8-150600.16.6.1
* postgresql15-server-debuginfo-15.8-150600.16.6.1
* postgresql15-15.8-150600.16.6.1
* postgresql15-debugsource-15.8-150600.16.6.1
* postgresql15-server-15.8-150600.16.6.1
* postgresql15-contrib-15.8-150600.16.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
06 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3159-1
Rating: important
References:
* bsc#1224038
* bsc#1224051
* bsc#1229013
Cross-References:
* CVE-2024-4317
* CVE-2024-7348
CVSS scores:
* CVE-2024-4317 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities and has one security fix can now be
installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 16.4 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
* CVE-2024-4317: Restrict visibility of pg_stats_ext and pg_stats_ext_exprs
entries to the table owner. See the release notes for the steps that have to
be taken to fix existing PostgreSQL instances. (bsc#1224038)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3159=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3159=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3159=1 openSUSE-SLE-15.6-2024-3159=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql16-16.4-150600.16.5.1
* libpq5-debuginfo-16.4-150600.16.5.1
* postgresql16-debugsource-16.4-150600.16.5.1
* postgresql16-debuginfo-16.4-150600.16.5.1
* libpq5-16.4-150600.16.5.1
* Basesystem Module 15-SP6 (x86_64)
* libpq5-32bit-debuginfo-16.4-150600.16.5.1
* libpq5-32bit-16.4-150600.16.5.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql16-devel-16.4-150600.16.5.1
* postgresql16-server-16.4-150600.16.5.1
* postgresql16-server-devel-debuginfo-16.4-150600.16.5.1
* libecpg6-16.4-150600.16.5.1
* postgresql16-plperl-debuginfo-16.4-150600.16.5.1
* postgresql16-server-debuginfo-16.4-150600.16.5.1
* postgresql16-plpython-16.4-150600.16.5.1
* postgresql16-plpython-debuginfo-16.4-150600.16.5.1
* postgresql16-contrib-debuginfo-16.4-150600.16.5.1
* postgresql16-pltcl-debuginfo-16.4-150600.16.5.1
* postgresql16-debugsource-16.4-150600.16.5.1
* postgresql16-debuginfo-16.4-150600.16.5.1
* postgresql16-server-devel-16.4-150600.16.5.1
* libecpg6-debuginfo-16.4-150600.16.5.1
* postgresql16-devel-debuginfo-16.4-150600.16.5.1
* postgresql16-contrib-16.4-150600.16.5.1
* postgresql16-plperl-16.4-150600.16.5.1
* postgresql16-pltcl-16.4-150600.16.5.1
* Server Applications Module 15-SP6 (noarch)
* postgresql16-docs-16.4-150600.16.5.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql16-16.4-150600.16.5.1
* postgresql16-test-16.4-150600.16.5.1
* libpq5-debuginfo-16.4-150600.16.5.1
* postgresql16-plpython-debuginfo-16.4-150600.16.5.1
* postgresql16-llvmjit-devel-16.4-150600.16.5.1
* postgresql16-debugsource-16.4-150600.16.5.1
* postgresql16-debuginfo-16.4-150600.16.5.1
* postgresql16-plperl-16.4-150600.16.5.1
* postgresql16-devel-debuginfo-16.4-150600.16.5.1
* postgresql16-llvmjit-16.4-150600.16.5.1
* postgresql16-server-16.4-150600.16.5.1
* postgresql16-server-debuginfo-16.4-150600.16.5.1
* postgresql16-contrib-debuginfo-16.4-150600.16.5.1
* postgresql16-devel-mini-16.4-150600.16.5.1
* libecpg6-debuginfo-16.4-150600.16.5.1
* libpq5-16.4-150600.16.5.1
* postgresql16-contrib-16.4-150600.16.5.1
* postgresql16-mini-debugsource-16.4-150600.16.5.1
* postgresql16-plperl-debuginfo-16.4-150600.16.5.1
* postgresql16-plpython-16.4-150600.16.5.1
* postgresql16-llvmjit-debuginfo-16.4-150600.16.5.1
* postgresql16-server-devel-16.4-150600.16.5.1
* postgresql16-server-devel-debuginfo-16.4-150600.16.5.1
* postgresql16-pltcl-debuginfo-16.4-150600.16.5.1
* postgresql16-pltcl-16.4-150600.16.5.1
* postgresql16-devel-16.4-150600.16.5.1
* libecpg6-16.4-150600.16.5.1
* postgresql16-devel-mini-debuginfo-16.4-150600.16.5.1
* openSUSE Leap 15.6 (x86_64)
* libpq5-32bit-debuginfo-16.4-150600.16.5.1
* libecpg6-32bit-16.4-150600.16.5.1
* libpq5-32bit-16.4-150600.16.5.1
* libecpg6-32bit-debuginfo-16.4-150600.16.5.1
* openSUSE Leap 15.6 (noarch)
* postgresql16-docs-16.4-150600.16.5.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libecpg6-64bit-debuginfo-16.4-150600.16.5.1
* libpq5-64bit-16.4-150600.16.5.1
* libpq5-64bit-debuginfo-16.4-150600.16.5.1
* libecpg6-64bit-16.4-150600.16.5.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4317.html
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224038
* https://bugzilla.suse.com/show_bug.cgi?id=1224051
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
06 Sep '24
# Security update for postgresql16
Announcement ID: SUSE-SU-2024:3160-1
Rating: important
References:
* bsc#1229013
Cross-References:
* CVE-2024-7348
CVSS scores:
* CVE-2024-7348 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7348 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-7348 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for postgresql16 fixes the following issues:
* Upgrade to 14.13 (bsc#1229013)
* CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes
arbitrary SQL. (bsc#1229013)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3160=1 openSUSE-SLE-15.6-2024-3160=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3160=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3160=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* postgresql14-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-plpython-14.13-150600.16.6.1
* postgresql14-plperl-debuginfo-14.13-150600.16.6.1
* postgresql14-14.13-150600.16.6.1
* postgresql14-pltcl-14.13-150600.16.6.1
* postgresql14-contrib-14.13-150600.16.6.1
* postgresql14-llvmjit-14.13-150600.16.6.1
* postgresql14-pltcl-debuginfo-14.13-150600.16.6.1
* postgresql14-server-devel-14.13-150600.16.6.1
* postgresql14-server-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-plpython-debuginfo-14.13-150600.16.6.1
* postgresql14-test-14.13-150600.16.6.1
* postgresql14-llvmjit-devel-14.13-150600.16.6.1
* postgresql14-devel-14.13-150600.16.6.1
* postgresql14-server-14.13-150600.16.6.1
* postgresql14-debuginfo-14.13-150600.16.6.1
* postgresql14-debugsource-14.13-150600.16.6.1
* postgresql14-server-debuginfo-14.13-150600.16.6.1
* postgresql14-plperl-14.13-150600.16.6.1
* postgresql14-contrib-debuginfo-14.13-150600.16.6.1
* postgresql14-llvmjit-debuginfo-14.13-150600.16.6.1
* openSUSE Leap 15.6 (noarch)
* postgresql14-docs-14.13-150600.16.6.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql14-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-devel-14.13-150600.16.6.1
* postgresql14-plpython-14.13-150600.16.6.1
* postgresql14-pltcl-14.13-150600.16.6.1
* postgresql14-server-14.13-150600.16.6.1
* postgresql14-debuginfo-14.13-150600.16.6.1
* postgresql14-contrib-14.13-150600.16.6.1
* postgresql14-debugsource-14.13-150600.16.6.1
* postgresql14-pltcl-debuginfo-14.13-150600.16.6.1
* postgresql14-plpython-debuginfo-14.13-150600.16.6.1
* postgresql14-server-devel-14.13-150600.16.6.1
* postgresql14-server-devel-debuginfo-14.13-150600.16.6.1
* postgresql14-server-debuginfo-14.13-150600.16.6.1
* postgresql14-plperl-debuginfo-14.13-150600.16.6.1
* postgresql14-plperl-14.13-150600.16.6.1
* postgresql14-contrib-debuginfo-14.13-150600.16.6.1
* postgresql14-14.13-150600.16.6.1
* Legacy Module 15-SP6 (noarch)
* postgresql14-docs-14.13-150600.16.6.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* postgresql14-debuginfo-14.13-150600.16.6.1
* postgresql14-llvmjit-14.13-150600.16.6.1
* postgresql14-debugsource-14.13-150600.16.6.1
* postgresql14-llvmjit-debuginfo-14.13-150600.16.6.1
* postgresql14-test-14.13-150600.16.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7348.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229013
1
0
06 Sep '24
# Security update for python-Django
Announcement ID: SUSE-SU-2024:3161-1
Rating: important
References:
* bsc#1229823
* bsc#1229824
Cross-References:
* CVE-2024-45230
* CVE-2024-45231
CVSS scores:
* CVE-2024-45230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45231 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for python-Django fixes the following issues:
* CVE-2024-45230: Fixed potential denial-of-service vulnerability in
django.utils.html.urlize(). (bsc#1229823)
* CVE-2024-45231: Fixed potential user email enumeration via response status
on password reset. (bsc#1229824)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3161=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3161=1 openSUSE-SLE-15.6-2024-3161=1
## Package List:
* SUSE Package Hub 15 15-SP6 (noarch)
* python311-Django-4.2.11-150600.3.9.1
* openSUSE Leap 15.6 (noarch)
* python311-Django-4.2.11-150600.3.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45230.html
* https://www.suse.com/security/cve/CVE-2024-45231.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229823
* https://bugzilla.suse.com/show_bug.cgi?id=1229824
1
0
06 Sep '24
# Security update for java-1_8_0-ibm
Announcement ID: SUSE-SU-2024:3162-1
Rating: important
References:
* bsc#1228046
* bsc#1228047
* bsc#1228048
* bsc#1228050
* bsc#1228051
* bsc#1228052
* bsc#1228346
* bsc#1229224
Cross-References:
* CVE-2024-21131
* CVE-2024-21138
* CVE-2024-21140
* CVE-2024-21144
* CVE-2024-21145
* CVE-2024-21147
* CVE-2024-27267
CVSS scores:
* CVE-2024-21131 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21138 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21140 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21144 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21147 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-27267 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves seven vulnerabilities and has one security fix can now be
installed.
## Description:
This update for java-1_8_0-ibm fixes the following issues:
* Update to Java 8.0 Service Refresh 8 Fix Pack 30 (bsc#1228346)
* CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination.
(bsc#1228052)
* CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling.
(bsc#1228051)
* CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow.
(bsc#1228048)
* CVE-2024-21144: Pack200 increase loading time due to improper header
validation. (bsc#1228050)
* CVE-2024-21138: Fixed an issue where excessive symbol length can lead to
infinite loop. (bsc#1228047)
* CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)
* CVE-2024-27267: Fixed an Object Request Broker (ORB) remote denial of
service. (bsc#1229224)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3162=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3162=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3162=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3162=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3162=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3162=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3162=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3162=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3162=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3162=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3162=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3162=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3162=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3162=1
## Package List:
* openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP5 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP5 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP6 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* Legacy Module 15-SP6 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc ppc64le s390x x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le s390x x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
* SUSE Enterprise Storage 7.1 (nosrc x86_64)
* java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1
* SUSE Enterprise Storage 7.1 (x86_64)
* java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1
* java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1
## References:
* https://www.suse.com/security/cve/CVE-2024-21131.html
* https://www.suse.com/security/cve/CVE-2024-21138.html
* https://www.suse.com/security/cve/CVE-2024-21140.html
* https://www.suse.com/security/cve/CVE-2024-21144.html
* https://www.suse.com/security/cve/CVE-2024-21145.html
* https://www.suse.com/security/cve/CVE-2024-21147.html
* https://www.suse.com/security/cve/CVE-2024-27267.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228046
* https://bugzilla.suse.com/show_bug.cgi?id=1228047
* https://bugzilla.suse.com/show_bug.cgi?id=1228048
* https://bugzilla.suse.com/show_bug.cgi?id=1228050
* https://bugzilla.suse.com/show_bug.cgi?id=1228051
* https://bugzilla.suse.com/show_bug.cgi?id=1228052
* https://bugzilla.suse.com/show_bug.cgi?id=1228346
* https://bugzilla.suse.com/show_bug.cgi?id=1229224
1
0
# Security update for gradle
Announcement ID: SUSE-SU-2024:3163-1
Rating: moderate
References:
* bsc#1212930
Cross-References:
* CVE-2023-35946
CVSS scores:
* CVE-2023-35946 ( SUSE ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L
* CVE-2023-35946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for gradle fixes the following issues:
* CVE-2023-35946: Fixed a dependency issue leading the cache to write files
into an unintended location. (bsc#1212930)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3163=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3163=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3163=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3163=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gradle-4.4.1-150200.3.24.1
## References:
* https://www.suse.com/security/cve/CVE-2023-35946.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212930
1
0
openSUSE-SU-2024:0282-1: important: Security update for python-Django
by opensuse-security@opensuse.org 06 Sep '24
by opensuse-security@opensuse.org 06 Sep '24
06 Sep '24
openSUSE Security Update: Security update for python-Django
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0282-1
Rating: important
References: #1229823 #1229824
Cross-References: CVE-2024-45230 CVE-2024-45231
CVSS scores:
CVE-2024-45230 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-45231 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for python-Django fixes the following issues:
* CVE-2024-45230: Fixed Potential denial-of-service vulnerability in
django.utils.html.urlize() (boo#1229823)
* CVE-2024-45231: Potential user email enumeration via response status on
password reset (boo#1229824)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-282=1
Package List:
References:
https://www.suse.com/security/cve/CVE-2024-45230.html
https://www.suse.com/security/cve/CVE-2024-45231.html
https://bugzilla.suse.com/1229823
https://bugzilla.suse.com/1229824
1
0
openSUSE-SU-2024:0281-1: important: Security update for opera
by opensuse-security@opensuse.org 05 Sep '24
by opensuse-security@opensuse.org 05 Sep '24
05 Sep '24
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0281-1
Rating: important
References:
Cross-References: CVE-2024-7971
CVSS scores:
CVE-2024-7971 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.5:NonFree
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for opera fixes the following issues:
- Update to 113.0.5230.32
* DNA-118250 Backport fix for CVE-2024-7971 from Chrome to Opera 113
- Changes in 113.0.5230.31
* CHR-9819 Update Chromium on desktop-stable-127-5230 to 127.0.6533.120
* DNA-116113 Print window boxes have frames and text is not vertically
centered
* DNA-117467 Crash at static void views::Combobox::
PaintIconAndText(class gfx::Canvas*)
* DNA-117557 Fix detected dangling ptr in WorkspacesTabCycler
ControllerIndexInCycleOrderTest.IndexInCyclingOrder
* DNA-117721 [Lin] When I drag a tab out of the tab strip and drop it,
it is not possible to do so without creating a new window.
* DNA-117854 Pinned tab takes whole tab strip
* DNA-117857 [Sync][Lost password] After profile error can’t add
passwords and sync can’t display synced passwords
* DNA-118215 Promote 113 to stable
- Complete Opera 113 changelog at:
https://blogs.opera.com/desktop/changelog-for-113
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.5:NonFree:
zypper in -t patch openSUSE-2024-281=1
Package List:
- openSUSE Leap 15.5:NonFree (x86_64):
opera-113.0.5230.32-lp155.3.60.1
References:
https://www.suse.com/security/cve/CVE-2024-7971.html
1
0
SUSE-RU-2024:3150-1: moderate: Recommended update for python3-PyNaCl, python3-paramiko
by OPENSUSE-UPDATES 05 Sep '24
by OPENSUSE-UPDATES 05 Sep '24
05 Sep '24
# Recommended update for python3-PyNaCl, python3-paramiko
Announcement ID: SUSE-RU-2024:3150-1
Rating: moderate
References:
* bsc#1161557
* bsc#1199282
* jsc#PED-68
* jsc#PM-3243
* jsc#SLE-24629
* jsc#SLE-7686
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains four features and has two fixes can now be installed.
## Description:
This update for python3-PyNaCl, python3-paramiko fixes the following issues:
* Upgrade python3-PyNaCl from 1.4.0 to 1.5.0
* upgrade python3-paramiko from 2.4.3 to 3.4.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3150=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3150=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3150=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3150=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3150=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3150=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3150=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3150=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3150=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3150=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3150=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3150=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Manager Proxy 4.3 (x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Manager Proxy 4.3 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Manager Retail Branch Server 4.3 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Manager Server 4.3 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* openSUSE Leap 15.4 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* openSUSE Leap 15.5 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* Basesystem Module 15-SP5 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* Basesystem Module 15-SP6 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python3-PyNaCl-1.5.0-150400.9.3.17
* python3-PyNaCl-debuginfo-1.5.0-150400.9.3.17
* python3-PyNaCl-debugsource-1.5.0-150400.9.3.17
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python3-paramiko-3.4.0-150400.9.3.3
* python3-paramiko-doc-3.4.0-150400.9.3.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1161557
* https://bugzilla.suse.com/show_bug.cgi?id=1199282
* https://jira.suse.com/browse/PED-68
* https://jira.suse.com/browse/PM-3243
* https://jira.suse.com/browse/SLE-24629
* https://jira.suse.com/browse/SLE-7686
1
0
openSUSE-RU-2024:0279-1: moderate: Recommended update for python-Paste
by maintenance@opensuse.org 05 Sep '24
by maintenance@opensuse.org 05 Sep '24
05 Sep '24
openSUSE Recommended Update: Recommended update for python-Paste
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0279-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for python-Paste fixes the following issues:
Update to 3.10.1:
* Correct packaging and testing when not in a clean virtualenv
version 3.10.0:
* Move development to https://github.com/pasteorg/paste
* Vendor cgi.FieldStorage and cgitb.Hook
* More cleaning of Python 2 style code.
update to 3.9.0:
* misc bugs + please pyflakes
* Remove unused format_environ method in watchthreads APP
update to 3.8.0:
* remove most python2 compatibility
update to 3.7.1:
* The main change for 3.7.0 and beyond is dropping support for Python 2.
In the past it was possible to get Paste to work in Python 2 with some
effort. That's now no longer possible. If Python 2 is required for
some reason, use an older version of Paste.
update to 3.6.1:
* Turn on github action for tests on pull requests
* Add a Makefile for simple automation
Update to 3.5.3:
* Use importlib instead of imp with Python 3.
update to 3.5.2:
* Fix py3 compatibility in paste.wsgilib.catch_errors (#70)
* A Python 3 application might only define `__next__`, not `next`. Use
`six.next` instead.
* This is very similar to https://github.com/cdent/paste/pull/53, and
was apparently missed there.
update to 3.5.1:
* Replace deprecated threading.currentThread, getName and setDaemon with
threading.current_thread, name and daemon.
update to 3.5.0:
* Python 3 fixes to auth and wsgi.errors handling; notably making
wsgi.errors text.
Update to 3.4.6:
* Explicit pkg_resource dependency to easy packaging.
* Remove deprecated dependencies paste/fixture.py.
* Update setup.py to work with setuptools 50.1.0+
update to 3.4.3:
* Patch auth ticket to be python3 compatible.
update to 3.4.2:
* Correct sorting of items() in EvalHTMLFormatter.
* Fix next in iterators in wsgilib.py.
update to 3.4.0
* Python 3 updates for use of StringIO and auth_tkt.py.
* Use six.BytesIO when reading wsgi.input.
* Allow binding IPv6 address when starting a server.
update to 3.2.6
* Correctly handle HEAD requests (to send empty body) when gzip encoding
requested.
* Use is_alive instead of isAlive for Python 3.9 compatibility.
* Use encodebytes instead of deprecated encodestring.
* Fix Python 2 and 3 compatibility for base64.
update to 3.2.3:
* Correct ``100 Continue`` in Python 3
* Avoid some reference cycles through tracebacks in httpserver.py
Update to 3.2.0:
* Ensure unicode URLs work in TestApp.
* Make LimitedLengthFile file return empty bytes.
* Protect against accidental close in FieldStorage.
version update to 3.1.0
* Allow anything that can read() for a file-like response, not just a
``file`` instance.
Update to v3.0.8:
* Fix quoting of bytestrings
Update to 3.0.7:
* Write bytestrings when calling wsgi_write_chunk
* Revert "Remove use of OpenSSL.tsafe, which links to OpenSSL.SSL
update to 3.0.5:
* Use correct variable when building message for exception
* Remove use of OpenSSL.tsafe, which links to OpenSSL.SSL anyways. (#16)
* Fix error on httpserver shutdown
* Add support for limited testing with travis-ci
* Merged in hroncok/paste/py37 (pull request #41)
* Don't raise StopIteration from generator, return instead
* Fix up testing after switch to pytest
* Make iterators Python3-compatible
* Don't raise StopIteration inside a generator
* add link to read the docs to README
* Prepare docs for publishing to RTFD
* py3 fixes for form handling in paste.fixture (#8)
* paste.fixture: fix form offset handling (#12)
* Don't delete dict item while iterating over same dict (#14)
* Enable coverage reporting via codecov (#10)
- update to 2.0.3:
* Add tests/test_httpserver.py
* Fix improper commas in request headers in wsgi_environ
* tests/test_httpserver.py: Use `email` module instead of `mimetools`
* tests/test_httpserver.py: Add test_environ_with_multiple_values
* Make get all values of a header work on both Python 2 and 3
* Make get_headers default to Python 3; fallback to Python 2
* Make utility function private: _get_headers
* Fix Python 3 issue in paste/fixture.py
* test_wsgirequest_charset: Use UTF-8 instead of iso-8859-1
* Replace cgi.parse_qsl w/ six.moves.urllib.parse.parse_sql
* replace ``has_key`` method to ``in`` operator #9
* Don't display invalid error message when socket in use
* Update docs/news.txt for 2.0.2
* Added tag 2.0.2 for changeset 53f5c2cd7f50
* Python 3: App must always return binary type.
* Python 3: Always encode params if passed as text types
* Python 3: Don't mangle strangely encoded input
* Python 3: Use the same python interpreter for CGI scripts.
* Python 3: add workarounds for cgi.FieldStorage
* Python 3: avoid spurious warnings
* Python 3: dict.items() doesn't return a list anymore
* Python 3: ignore exception details in doctests
* Python 3: let html_quote() and url() always return the same type
* Python 3: use compatible print syntax in example text
* Change six requirement to >=1.4.0
* tox.ini: Add py35 to envlist
* Enable testing with pypy
* tox.ini: Measure test coverage
* paste.wsgilib.add_close: Add __next__ method
* Add tests for `add_close` class
* Uncomment/cleanup paste.wsgilib.app_close.__next__
* Check paste.wsgilib.add_close._closed
* Make add_close.next() leverage add_close.__next__()
update to version 2.0.1:
* Fix setup.py for six dependency: move the six dependency from
extras_require to install_requires
* Port paste.proxy to Python 3
* Fix paste.exceptions.serial_number_generator.hash_identifier()
on Python 3
* Fix paste.util.threadedprint.uninstall()
* Add README.rst file
- additional changes from version 2.0:
* Experimental Python 3 support
* paste now requires the six module
* Drop support of Python 2.5 and older
* Fixed egg:Paste#cgi
* In paste.httpserver: give a 100 Continue response even when the server
has been configured as an HTTP/1.0 server
* Fixed parsing of paths beginning with multiple forward slashes
* Add tox.ini to run tests with tox on Python 2.6, 2.7 and 3.4
- Initial version, obsoletes 'python-paste'
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-279=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
python311-Paste-3.10.1-bp156.2.1
References:
1
0
openSUSE-RU-2024:0280-1: moderate: Recommended update for knot
by maintenance@opensuse.org 05 Sep '24
by maintenance@opensuse.org 05 Sep '24
05 Sep '24
openSUSE Recommended Update: Recommended update for knot
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0280-1
Rating: moderate
References: #1225969
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for knot fixes the following issues:
- update to version 3.3.9, see
https://www.knot-dns.cz/2024-08-26-version-339.html
- split knot-utils with kdig and friends
- update to version 3.3.8, see
https://www.knot-dns.cz/2024-07-22-version-338.html
- use distribution library on Tumbleweed for DoQ support
- enable DoH support (add dependency on libnghttp2) boo#1225969
- enable DoQ support using embedded library (libngtcp2)
- update to version 3.3.7, see
https://www.knot-dns.cz/2024-06-25-version-337.html
- update to version 3.3.6, see
https://www.knot-dns.cz/2024-06-12-version-336.html
- update to version 3.3.5, see
https://www.knot-dns.cz/2024-03-06-version-335.html
- update to version 3.3.4, see
https://www.knot-dns.cz/2024-01-24-version-334.html
- update to version 3.3.3, see
https://www.knot-dns.cz/2023-12-13-version-333.html
- update to version 3.3.2, see
https://www.knot-dns.cz/2023-10-20-version-332.html
- update to version 3.3.1, see:
https://www.knot-dns.cz/2023-09-11-version-331.html
- update to version 3.3.0, see:
https://www.knot-dns.cz/2023-08-28-version-330.html
- update to version 3.2.9, see:
https://www.knot-dns.cz/2023-07-27-version-329.html
- update to version 3.2.8, see:
https://www.knot-dns.cz/2023-06-26-version-328.html
- update to version 3.2.7, see:
https://www.knot-dns.cz/2023-06-06-version-327.html
- update to version 3.2.6, see:
https://www.knot-dns.cz/2023-04-04-version-326.html
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-280=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
knot-3.3.9-bp155.2.3.1
knot-devel-3.3.9-bp155.2.3.1
knot-utils-3.3.9-bp155.2.3.1
libdnssec9-3.3.9-bp155.2.3.1
libknot14-3.3.9-bp155.2.3.1
libzscanner4-3.3.9-bp155.2.3.1
References:
https://bugzilla.suse.com/1225969
1
0
05 Sep '24
# Security update for systemd
Announcement ID: SUSE-SU-2024:3149-1
Rating: moderate
References:
* bsc#1218297
* bsc#1221479
* bsc#1226414
* bsc#1228091
Cross-References:
* CVE-2023-7008
CVSS scores:
* CVE-2023-7008 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-7008 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability and has three security fixes can now be
installed.
## Description:
This update for systemd fixes the following issues:
* CVE-2023-7008: Fixed man-in-the-middle due to unsigned name response in
signed zone not refused when DNSSEC=yes (bsc#1218297)
Other fixes: \- Unit: drop ProtectClock=yes from systemd-udevd.service
(bsc#1226414) \- Don't mention any rpm macros inside comments, even if escaped
(bsc#1228091) \- Skip redundant dependencies specified the LSB description that
references the file name of the service itself for early boot scripts
(bsc#1221479).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3149=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3149=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3149=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3149=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3149=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3149=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3149=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3149=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3149=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3149=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* systemd-portable-debuginfo-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* systemd-mini-debuginfo-249.17-150400.8.43.1
* systemd-mini-doc-249.17-150400.8.43.1
* nss-systemd-debuginfo-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-network-debuginfo-249.17-150400.8.43.1
* systemd-mini-249.17-150400.8.43.1
* nss-myhostname-debuginfo-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* systemd-devel-249.17-150400.8.43.1
* systemd-mini-sysvinit-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-doc-249.17-150400.8.43.1
* systemd-mini-container-debuginfo-249.17-150400.8.43.1
* nss-myhostname-249.17-150400.8.43.1
* systemd-testsuite-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* udev-mini-debuginfo-249.17-150400.8.43.1
* systemd-network-249.17-150400.8.43.1
* libsystemd0-mini-249.17-150400.8.43.1
* udev-mini-249.17-150400.8.43.1
* systemd-mini-devel-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-testsuite-249.17-150400.8.43.1
* libudev-mini1-249.17-150400.8.43.1
* systemd-coredump-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* systemd-debugsource-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* libsystemd0-mini-debuginfo-249.17-150400.8.43.1
* systemd-mini-container-249.17-150400.8.43.1
* systemd-mini-debugsource-249.17-150400.8.43.1
* systemd-experimental-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev-mini1-debuginfo-249.17-150400.8.43.1
* systemd-experimental-249.17-150400.8.43.1
* systemd-portable-249.17-150400.8.43.1
* systemd-coredump-debuginfo-249.17-150400.8.43.1
* nss-systemd-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* openSUSE Leap 15.4 (x86_64)
* nss-myhostname-32bit-debuginfo-249.17-150400.8.43.1
* libsystemd0-32bit-249.17-150400.8.43.1
* systemd-32bit-249.17-150400.8.43.1
* systemd-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-debuginfo-249.17-150400.8.43.1
* nss-myhostname-32bit-249.17-150400.8.43.1
* openSUSE Leap 15.4 (noarch)
* systemd-lang-249.17-150400.8.43.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libudev1-64bit-249.17-150400.8.43.1
* libudev1-64bit-debuginfo-249.17-150400.8.43.1
* systemd-64bit-debuginfo-249.17-150400.8.43.1
* libsystemd0-64bit-249.17-150400.8.43.1
* nss-myhostname-64bit-249.17-150400.8.43.1
* nss-myhostname-64bit-debuginfo-249.17-150400.8.43.1
* systemd-64bit-249.17-150400.8.43.1
* libsystemd0-64bit-debuginfo-249.17-150400.8.43.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* systemd-portable-debuginfo-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* nss-systemd-debuginfo-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-network-debuginfo-249.17-150400.8.43.1
* nss-myhostname-debuginfo-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* systemd-devel-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-doc-249.17-150400.8.43.1
* nss-myhostname-249.17-150400.8.43.1
* systemd-testsuite-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-network-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-testsuite-249.17-150400.8.43.1
* systemd-coredump-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* systemd-debugsource-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* systemd-experimental-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* systemd-experimental-249.17-150400.8.43.1
* systemd-portable-249.17-150400.8.43.1
* systemd-coredump-debuginfo-249.17-150400.8.43.1
* nss-systemd-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* openSUSE Leap 15.5 (x86_64)
* nss-myhostname-32bit-debuginfo-249.17-150400.8.43.1
* libsystemd0-32bit-249.17-150400.8.43.1
* systemd-32bit-249.17-150400.8.43.1
* systemd-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-debuginfo-249.17-150400.8.43.1
* nss-myhostname-32bit-249.17-150400.8.43.1
* openSUSE Leap 15.5 (noarch)
* systemd-lang-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-journal-remote-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-journal-remote-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-container-debuginfo-249.17-150400.8.43.1
* udev-249.17-150400.8.43.1
* systemd-devel-249.17-150400.8.43.1
* udev-debuginfo-249.17-150400.8.43.1
* libsystemd0-249.17-150400.8.43.1
* libudev1-249.17-150400.8.43.1
* systemd-doc-249.17-150400.8.43.1
* systemd-sysvinit-249.17-150400.8.43.1
* systemd-249.17-150400.8.43.1
* systemd-coredump-debuginfo-249.17-150400.8.43.1
* libsystemd0-debuginfo-249.17-150400.8.43.1
* systemd-container-249.17-150400.8.43.1
* libudev1-debuginfo-249.17-150400.8.43.1
* systemd-coredump-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* Basesystem Module 15-SP5 (noarch)
* systemd-lang-249.17-150400.8.43.1
* Basesystem Module 15-SP5 (x86_64)
* systemd-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-249.17-150400.8.43.1
* libudev1-32bit-249.17-150400.8.43.1
* libsystemd0-32bit-debuginfo-249.17-150400.8.43.1
* libudev1-32bit-debuginfo-249.17-150400.8.43.1
* systemd-32bit-debuginfo-249.17-150400.8.43.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* systemd-debugsource-249.17-150400.8.43.1
* systemd-network-249.17-150400.8.43.1
* systemd-debuginfo-249.17-150400.8.43.1
* systemd-network-debuginfo-249.17-150400.8.43.1
## References:
* https://www.suse.com/security/cve/CVE-2023-7008.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218297
* https://bugzilla.suse.com/show_bug.cgi?id=1221479
* https://bugzilla.suse.com/show_bug.cgi?id=1226414
* https://bugzilla.suse.com/show_bug.cgi?id=1228091
1
0
openSUSE-SU-2024:0278-1: important: Security update for chromium
by opensuse-security@opensuse.org 05 Sep '24
by opensuse-security@opensuse.org 05 Sep '24
05 Sep '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0278-1
Rating: important
References: #1230108
Cross-References: CVE-2024-7970 CVE-2024-8362
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 128.0.6613.119 (released 2024-09-02) (boo#1230108)
* CVE-2024-8362: Use after free in WebAudio
* CVE-2024-7970: Out of bounds write in V8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-278=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-128.0.6613.119-bp156.2.23.1
chromium-128.0.6613.119-bp156.2.23.1
References:
https://www.suse.com/security/cve/CVE-2024-7970.html
https://www.suse.com/security/cve/CVE-2024-8362.html
https://bugzilla.suse.com/1230108
1
0
SUSE-SU-2024:3144-1: important: Security update for hdf5, netcdf, trilinos
by OPENSUSE-UPDATES 05 Sep '24
by OPENSUSE-UPDATES 05 Sep '24
05 Sep '24
# Security update for hdf5, netcdf, trilinos
Announcement ID: SUSE-SU-2024:3144-1
Rating: important
References:
* bsc#1011205
* bsc#1093641
* bsc#1125882
* bsc#1133222
* bsc#1167400
* bsc#1207973
* bsc#1209548
* bsc#1210049
* bsc#1224158
Cross-References:
* CVE-2016-4332
* CVE-2017-17507
* CVE-2018-11202
* CVE-2018-11205
* CVE-2019-8396
* CVE-2020-10812
* CVE-2021-37501
* CVE-2024-29158
* CVE-2024-29161
* CVE-2024-29166
* CVE-2024-32608
* CVE-2024-32610
* CVE-2024-32614
* CVE-2024-32619
* CVE-2024-32620
* CVE-2024-33873
* CVE-2024-33874
* CVE-2024-33875
CVSS scores:
* CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2017-17507 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2017-17507 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-11205 ( SUSE ): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2018-11205 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
* CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-29158 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29161 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-29166 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32608 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32610 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32614 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32619 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-32620 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33873 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33874 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-33875 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
An update that solves 18 vulnerabilities can now be installed.
## Description:
This update for hdf5, netcdf, trilinos fixes the following issues:
hdf5 was updated from version 1.10.8 to 1.10.11:
* Security issues fixed:
* CVE-2019-8396: Fixed problems with malformed HDF5 files where content does
not match expected size. (bsc#1125882)
* CVE-2018-11202: Fixed that a malformed file could result in chunk index
memory leaks. (bsc#1093641)
* CVE-2016-4332: Fixed an assertion in a previous fix for this issue
(bsc#1011205).
* CVE-2020-10812: Fixed a segfault on file close in h5debug which fails with a
core dump on a file that has an illegal file size in its cache image.Fixes
HDFFV-11052, (bsc#1167400).
* CVE-2021-37501: Fixed buffer overflow in hdf5-h5dump (bsc#1207973)
* Other security issues fixed (bsc#1224158):
* CVE-2024-29158, CVE-2024-29161, CVE-2024-29166, CVE-2024-32608,
* CVE-2024-32610, CVE-2024-32614, CVE-2024-32619, CVE-2024-32620,
* CVE-2024-33873, CVE-2024-33874, CVE-2024-33875
* Additionally, these fixes resolve crashes triggered by the reproducers for CVE-2017-17507, CVE-2018-11205. These crashes appear to be unrelated to the original problems
* Other issues fixed:
* Remove timestamp/buildhost/kernel version from libhdf5.settings
(bsc#1209548)
* Changed the error handling for a not found path in the find plugin process.
* Fixed a file space allocation bug in the parallel library for chunked
datasets.
* Fixed an assertion failure in Parallel HDF5 when a file can't be created due
to an invalid library version bounds setting.
* Fixed memory leaks that could occur when reading a dataset from a malformed
file.
* Fixed a bug in H5Ocopy that could generate invalid HDF5 files
* Fixed potential heap buffer overflow in decoding of link info message.
* Fixed potential buffer overrun issues in some object header decode routines.
* Fixed a heap buffer overflow that occurs when reading from a dataset with a
compact layout within a malformed HDF5 file.
* Fixed memory leak when running h5dump with proof of vulnerability file.
* Added option --no-compact-subset to h5diff
* Several improvements to parallel compression feature, including:
* Improved support for collective I/O (for both writes and reads).
* Reduction of copying of application data buffers passed to H5Dwrite.
* Addition of support for incremental file space allocation for filtered datasets created in parallel.
* Addition of support for HDF5's "don't filter partial edge chunks" flag
* Addition of proper support for HDF5 fill values with the feature.
* Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro toH5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available.
* Addition of simple examples
* h5repack added an optional verbose value for reporting R/W timing.
* Fixed a metadata cache bug when resizing a pinned/protected cache entry.
* Fixed a problem with the H5_VERS_RELEASE check in the H5check_version
function.
* Unified handling of collective metadata reads to correctly fix old bugs.
* Fixed several potential MPI deadlocks in library failure conditions.
* Fixed an issue with collective metadata reads being permanently disabled
after a dataset chunk lookup operation.
netcdf was updated to fix:
* rebuild against new hdf5 library version.
trilinos was updated to fix:
* Rebuild against new hdf5 library version.
* Fix dependency in module file for MPI version of Trilinos to depend on the
correct version of netcdf (bsc#1210049). This prevents the error message:
"Lmod has detected the following error: These module(s) or extension(s)
exist but cannot be loaded as requested: "trilinos"
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3144=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3144=1
## Package List:
* openSUSE Leap 15.3 (noarch)
* hdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5-gnu-hpc-1.10.11-150300.4.16.15
* netcdf-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* hdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* netcdf-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* netcdf-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* hdf5-hpc-examples-1.10.11-150300.4.16.15
* adios-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* netcdf-gnu-hpc-4.7.4-150300.4.7.19
* netcdf-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* trilinos-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-hpc-devel-4.7.4-150300.4.7.19
* netcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* adios-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* hdf5-gnu-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* adios-gnu-openmpi2-hpc-devel-static-1.13.1-150300.12.4.1
* adios-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* adios-gnu-openmpi2-hpc-1.13.1-150300.12.4.1
* petsc-doc-3.14.5-150300.3.4.3
* trilinos-gnu-openmpi2-hpc-devel-13.2.0-150300.3.12.9
* adios-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* netcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* trilinos-hpc-doc-13.2.0-150300.3.12.9
* trilinos-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-1.13.1-150300.12.4.2
* trilinos-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* netcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* adios-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-openmpi2-hpc-devel-1.13.1-150300.12.4.1
* netcdf-gnu-openmpi2-hpc-devel-4.7.4-150300.4.7.10
* trilinos-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* adios-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* trilinos_13_2_0-hpc-doc-13.2.0-150300.3.12.9
* hdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* adios-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* openSUSE Leap 15.3 (aarch64 ppc64le x86_64 i586)
* petsc_3_14_5-gnu-mpich-hpc-debugsource-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-debuginfo-1.13.1-150300.12.4.1
* adios_1_13_1-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi4-hpc-debugsource-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi2-hpc-debuginfo-3.14.5-150300.3.4.4
* petsc-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* petsc-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* petsc-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debugsource-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi2-hpc-devel-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi3-hpc-debugsource-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* libpetsc-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi3-hpc-debuginfo-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi3-hpc-saws-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-debugsource-1.13.1-150300.12.4.2
* libpetsc-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* petsc-gnu-openmpi2-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-debugsource-1.13.1-150300.12.4.1
* petsc_3_14_5-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-mvapich2-hpc-debugsource-3.14.5-150300.3.4.4
* libpetsc-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-mvapich2-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi2-hpc-saws-3.14.5-150300.3.4.4
* petsc-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-mpich-hpc-debuginfo-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi2-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-devel-1.13.1-150300.12.4.1
* adios_1_13_1-gnu-mpich-hpc-debuginfo-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-mvapich2-hpc-debuginfo-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-openmpi3-hpc-debugsource-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-mvapich2-hpc-saws-3.14.5-150300.3.4.4
* libpetsc-gnu-openmpi2-hpc-3.14.5-150300.3.4.4
* libpetsc-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-devel-static-1.13.1-150300.12.4.1
* adios_1_13_1-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-debugsource-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-openmpi4-hpc-saws-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-openmpi4-hpc-debuginfo-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi2-hpc-1.13.1-150300.12.4.1
* petsc_3_14_5-gnu-mpich-hpc-saws-3.14.5-150300.3.4.4
* petsc_3_14_5-gnu-openmpi2-hpc-debugsource-3.14.5-150300.3.4.4
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libnetcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* netcdf-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-4.7.4-150300.4.7.9
* netcdf-openmpi3-devel-static-4.7.4-150300.4.7.9
* libnetcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-openmpi3-hpc-debugsource-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi4-hpc-debugsource-4.7.4-150300.4.7.21
* netcdf-openmpi4-4.7.4-150300.4.7.9
* netcdf-openmpi2-4.7.4-150300.4.7.9
* netcdf-devel-data-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* netcdf-openmpi4-debuginfo-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* libnetcdf-gnu-hpc-4.7.4-150300.4.7.19
* netcdf-openmpi3-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* netcdf-openmpi3-devel-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-devel-static-4.7.4-150300.4.7.10
* libnetcdf18-openmpi4-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-debugsource-4.7.4-150300.4.7.10
* libnetcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-static-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-mpich-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-debuginfo-4.7.4-150300.4.7.21
* libnetcdf18-openmpi3-4.7.4-150300.4.7.9
* libnetcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* libnetcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-static-4.7.4-150300.4.7.20
* netcdf-openmpi2-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* netcdf-openmpi4-devel-debuginfo-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* libnetcdf_4_7_4-gnu-openmpi2-hpc-debuginfo-4.7.4-150300.4.7.10
* netcdf_4_7_4-gnu-openmpi2-hpc-devel-4.7.4-150300.4.7.10
* netcdf_4_7_4-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi2-hpc-debuginfo-4.7.4-150300.4.7.10
* netcdf_4_7_4-gnu-mpich-hpc-devel-static-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf-openmpi4-devel-static-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-mpich-hpc-debugsource-4.7.4-150300.4.7.19
* netcdf-openmpi3-4.7.4-150300.4.7.9
* netcdf-openmpi3-devel-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-debuginfo-4.7.4-150300.4.7.9
* netcdf-openmpi2-devel-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-hpc-devel-static-4.7.4-150300.4.7.19
* libnetcdf18-openmpi2-debuginfo-4.7.4-150300.4.7.9
* netcdf-openmpi3-debugsource-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-debuginfo-4.7.4-150300.4.7.17
* netcdf-devel-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* netcdf-devel-debuginfo-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-hpc-devel-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* netcdf-openmpi2-debugsource-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-debuginfo-4.7.4-150300.4.7.20
* libnetcdf-gnu-openmpi2-hpc-4.7.4-150300.4.7.10
* netcdf-openmpi4-devel-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* libnetcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* libnetcdf18-openmpi2-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-static-4.7.4-150300.4.7.17
* netcdf-devel-static-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi2-hpc-devel-debuginfo-4.7.4-150300.4.7.10
* libnetcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* netcdf-openmpi2-devel-4.7.4-150300.4.7.9
* netcdf-openmpi2-devel-static-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-hpc-debugsource-4.7.4-150300.4.7.19
* netcdf-4.7.4-150300.4.7.9
* netcdf-debugsource-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-mvapich2-hpc-debugsource-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* netcdf-openmpi4-debugsource-4.7.4-150300.4.7.9
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* libnetcdf18-debuginfo-4.7.4-150300.4.7.9
* libnetcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
* openSUSE Leap 15.3 (x86_64)
* libnetcdf18-openmpi3-32bit-4.7.4-150300.4.7.9
* libnetcdf18-32bit-4.7.4-150300.4.7.9
* libnetcdf18-32bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-32bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-32bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-32bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-32bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-32bit-debuginfo-4.7.4-150300.4.7.9
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64)
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-hpc-examples-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* openSUSE Leap 15.3 (aarch64 ppc64le x86_64)
* libtrilinos-gnu-openmpi2-hpc-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-openmpi3-hpc-debuginfo-13.2.0-150300.3.12.16
* libtrilinos_13_2_0-gnu-mpich-hpc-debuginfo-13.2.0-150300.3.12.18
* libtrilinos_13_2_0-gnu-mpich-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mvapich2-hpc-debugsource-13.2.0-150300.3.12.18
* libtrilinos_13_2_0-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-openmpi3-hpc-debugsource-13.2.0-150300.3.12.16
* libtrilinos_13_2_0-gnu-openmpi2-hpc-debuginfo-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* libtrilinos_13_2_0-gnu-openmpi2-hpc-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* libtrilinos-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mpich-hpc-debugsource-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-openmpi2-hpc-debugsource-13.2.0-150300.3.12.9
* libtrilinos_13_2_0-gnu-openmpi4-hpc-debuginfo-13.2.0-150300.3.12.18
* libtrilinos_13_2_0-gnu-mvapich2-hpc-debuginfo-13.2.0-150300.3.12.18
* libtrilinos-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* libtrilinos-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* trilinos_13_2_0-gnu-openmpi4-hpc-debugsource-13.2.0-150300.3.12.18
* libtrilinos-gnu-mpich-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-openmpi2-hpc-devel-13.2.0-150300.3.12.9
* trilinos_13_2_0-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* trilinos_13_2_0-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* trilinos_13_2_0-hpc-debugsource-13.2.0-150300.3.12.9
* openSUSE Leap 15.3 (aarch64_ilp32)
* libnetcdf18-64bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-64bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi2-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-64bit-debuginfo-4.7.4-150300.4.7.9
* libnetcdf18-openmpi3-64bit-4.7.4-150300.4.7.9
* libnetcdf18-openmpi4-64bit-4.7.4-150300.4.7.9
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* hdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5-gnu-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* netcdf-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* hdf5-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* netcdf-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* hdf5-hpc-examples-1.10.11-150300.4.16.15
* hdf5-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-hpc-4.7.4-150300.4.7.19
* netcdf-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* trilinos-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-hpc-devel-4.7.4-150300.4.7.19
* netcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* adios-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* hdf5-gnu-hpc-devel-1.10.11-150300.4.16.15
* adios-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* adios-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* petsc-doc-3.14.5-150300.3.4.3
* adios-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* netcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* trilinos-hpc-doc-13.2.0-150300.3.12.9
* trilinos-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* adios-gnu-mpich-hpc-1.13.1-150300.12.4.2
* trilinos-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* netcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* adios-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* hdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* hdf5-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* trilinos-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* adios-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* netcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* trilinos_13_2_0-hpc-doc-13.2.0-150300.3.12.9
* hdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* adios-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi4-hpc-debugsource-3.14.5-150300.3.4.4
* libtrilinos_13_2_0-gnu-mpich-hpc-13.2.0-150300.3.12.18
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libpetsc_3_14_5-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libnetcdf-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi4-hpc-devel-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi3-hpc-debugsource-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-debugsource-4.7.4-150300.4.7.21
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150300.4.16.15
* libnetcdf-gnu-hpc-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi4-hpc-debuginfo-4.7.4-150300.4.7.21
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-openmpi4-hpc-debuginfo-13.2.0-150300.3.12.18
* libpetsc_3_14_5-gnu-mvapich2-hpc-debuginfo-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debuginfo-1.13.1-150300.12.4.2
* libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-4.7.4-150300.4.7.17
* adios_1_13_1-gnu-openmpi3-hpc-devel-static-1.13.1-150300.12.4.2
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mvapich2-hpc-debugsource-1.13.1-150300.12.4.2
* petsc_3_14_5-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* libhdf5_hl-gnu-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-static-4.7.4-150300.4.7.21
* netcdf_4_7_4-gnu-mpich-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-debuginfo-4.7.4-150300.4.7.21
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libnetcdf-gnu-mpich-hpc-4.7.4-150300.4.7.19
* libnetcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* libtrilinos_13_2_0-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* libhdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* trilinos_13_2_0-gnu-openmpi3-hpc-debugsource-13.2.0-150300.3.12.16
* libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* netcdf_4_7_4-gnu-hpc-debuginfo-4.7.4-150300.4.7.19
* libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libnetcdf-gnu-openmpi3-hpc-4.7.4-150300.4.7.17
* libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi4-hpc-devel-static-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mvapich2-hpc-devel-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-static-4.7.4-150300.4.7.20
* hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150300.4.16.15
* libpetsc-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libpetsc_3_14_5-gnu-mpich-hpc-3.14.5-150300.3.4.4
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* netcdf_4_7_4-gnu-mpich-hpc-devel-4.7.4-150300.4.7.19
* trilinos_13_2_0-gnu-mvapich2-hpc-devel-13.2.0-150300.3.12.18
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libpetsc-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* libpetsc_3_14_5-gnu-mpich-hpc-debuginfo-3.14.5-150300.3.4.4
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mpich-hpc-devel-static-4.7.4-150300.4.7.19
* netcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-mvapich2-hpc-debuginfo-13.2.0-150300.3.12.18
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mpich-hpc-debugsource-4.7.4-150300.4.7.19
* libhdf5-gnu-hpc-1.10.11-150300.4.16.15
* libtrilinos-gnu-mpich-hpc-13.2.0-150300.3.12.18
* libhdf5-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-hpc-devel-static-4.7.4-150300.4.7.19
* petsc_3_14_5-gnu-mpich-hpc-debugsource-3.14.5-150300.3.4.4
* libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi3-hpc-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-openmpi4-hpc-3.14.5-150300.3.4.4
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-openmpi3-hpc-debuginfo-13.2.0-150300.3.12.16
* petsc-gnu-openmpi4-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-devel-1.13.1-150300.12.4.2
* trilinos_13_2_0-gnu-mpich-hpc-devel-13.2.0-150300.3.12.18
* hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-debuginfo-4.7.4-150300.4.7.17
* petsc-gnu-mvapich2-hpc-devel-3.14.5-150300.3.4.4
* trilinos_13_2_0-gnu-mvapich2-hpc-debugsource-13.2.0-150300.3.12.18
* libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mvapich2-hpc-debuginfo-4.7.4-150300.4.7.20
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi3-hpc-debugsource-3.14.5-150300.3.4.4
* libhdf5_cpp-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libpetsc_3_14_5-gnu-openmpi3-hpc-debuginfo-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi3-hpc-debuginfo-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-devel-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-hpc-devel-4.7.4-150300.4.7.19
* hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mpich-hpc-debugsource-1.13.1-150300.12.4.2
* netcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libpetsc-gnu-openmpi3-hpc-3.14.5-150300.3.4.4
* libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-hpc-4.7.4-150300.4.7.19
* adios_1_13_1-gnu-mvapich2-hpc-debuginfo-1.13.1-150300.12.4.2
* hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150300.4.16.15
* hdf5_1_10_11-hpc-examples-1.10.11-150300.4.16.15
* libtrilinos-gnu-mvapich2-hpc-13.2.0-150300.3.12.18
* trilinos_13_2_0-gnu-mpich-hpc-debugsource-13.2.0-150300.3.12.18
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-debuginfo-4.7.4-150300.4.7.20
* hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* petsc-gnu-openmpi3-hpc-devel-3.14.5-150300.3.4.4
* netcdf_4_7_4-gnu-mpich-hpc-debuginfo-4.7.4-150300.4.7.19
* libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mpich-hpc-debuginfo-1.13.1-150300.12.4.2
* libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150300.4.16.15
* libnetcdf-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* netcdf_4_7_4-gnu-openmpi3-hpc-devel-static-4.7.4-150300.4.7.17
* trilinos_13_2_0-gnu-openmpi3-hpc-devel-13.2.0-150300.3.12.16
* libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* trilinos_13_2_0-gnu-openmpi4-hpc-devel-13.2.0-150300.3.12.18
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150300.4.16.15
* libhdf5_fortran-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libtrilinos_13_2_0-gnu-mpich-hpc-debuginfo-13.2.0-150300.3.12.18
* libhdf5-gnu-mvapich2-hpc-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-mvapich2-hpc-4.7.4-150300.4.7.20
* petsc-gnu-mpich-hpc-devel-3.14.5-150300.3.4.4
* adios_1_13_1-gnu-openmpi4-hpc-debugsource-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-hpc-devel-debuginfo-4.7.4-150300.4.7.19
* hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5_hl_fortran-gnu-hpc-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi4-hpc-1.13.1-150300.12.4.2
* hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mvapich2-hpc-1.13.1-150300.12.4.2
* libpetsc_3_14_5-gnu-openmpi4-hpc-debuginfo-3.14.5-150300.3.4.4
* libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mpich-hpc-4.7.4-150300.4.7.19
* libhdf5_hl-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-module-1.10.11-150300.4.16.15
* petsc_3_14_5-gnu-mvapich2-hpc-debugsource-3.14.5-150300.3.4.4
* libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-mpich-hpc-devel-static-1.13.1-150300.12.4.2
* libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-hpc-debugsource-4.7.4-150300.4.7.19
* libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-hpc-devel-1.10.11-150300.4.16.15
* libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_cpp-gnu-mpich-hpc-1.10.11-150300.4.16.15
* hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150300.4.16.15
* libnetcdf_4_7_4-gnu-openmpi4-hpc-4.7.4-150300.4.7.21
* hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150300.4.16.15
* adios_1_13_1-gnu-openmpi3-hpc-debugsource-1.13.1-150300.12.4.2
* adios_1_13_1-gnu-mpich-hpc-1.13.1-150300.12.4.2
* libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-mvapich2-hpc-debugsource-4.7.4-150300.4.7.20
* libpetsc-gnu-mvapich2-hpc-3.14.5-150300.3.4.4
* libtrilinos-gnu-openmpi4-hpc-13.2.0-150300.3.12.18
* libtrilinos-gnu-openmpi3-hpc-13.2.0-150300.3.12.16
* netcdf_4_7_4-gnu-mvapich2-hpc-devel-4.7.4-150300.4.7.20
* adios_1_13_1-gnu-mvapich2-hpc-devel-static-1.13.1-150300.12.4.2
* libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150300.4.16.15
* netcdf_4_7_4-gnu-openmpi4-hpc-devel-4.7.4-150300.4.7.21
* trilinos_13_2_0-gnu-openmpi4-hpc-debugsource-13.2.0-150300.3.12.18
* libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150300.4.16.15
* libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150300.4.16.15
* trilinos_13_2_0-hpc-debugsource-13.2.0-150300.3.12.9
* libnetcdf_4_7_4-gnu-openmpi3-hpc-debuginfo-4.7.4-150300.4.7.17
## References:
* https://www.suse.com/security/cve/CVE-2016-4332.html
* https://www.suse.com/security/cve/CVE-2017-17507.html
* https://www.suse.com/security/cve/CVE-2018-11202.html
* https://www.suse.com/security/cve/CVE-2018-11205.html
* https://www.suse.com/security/cve/CVE-2019-8396.html
* https://www.suse.com/security/cve/CVE-2020-10812.html
* https://www.suse.com/security/cve/CVE-2021-37501.html
* https://www.suse.com/security/cve/CVE-2024-29158.html
* https://www.suse.com/security/cve/CVE-2024-29161.html
* https://www.suse.com/security/cve/CVE-2024-29166.html
* https://www.suse.com/security/cve/CVE-2024-32608.html
* https://www.suse.com/security/cve/CVE-2024-32610.html
* https://www.suse.com/security/cve/CVE-2024-32614.html
* https://www.suse.com/security/cve/CVE-2024-32619.html
* https://www.suse.com/security/cve/CVE-2024-32620.html
* https://www.suse.com/security/cve/CVE-2024-33873.html
* https://www.suse.com/security/cve/CVE-2024-33874.html
* https://www.suse.com/security/cve/CVE-2024-33875.html
* https://bugzilla.suse.com/show_bug.cgi?id=1011205
* https://bugzilla.suse.com/show_bug.cgi?id=1093641
* https://bugzilla.suse.com/show_bug.cgi?id=1125882
* https://bugzilla.suse.com/show_bug.cgi?id=1133222
* https://bugzilla.suse.com/show_bug.cgi?id=1167400
* https://bugzilla.suse.com/show_bug.cgi?id=1207973
* https://bugzilla.suse.com/show_bug.cgi?id=1209548
* https://bugzilla.suse.com/show_bug.cgi?id=1210049
* https://bugzilla.suse.com/show_bug.cgi?id=1224158
1
0
05 Sep '24
# Recommended update for dracut
Announcement ID: SUSE-RU-2024:3145-1
Rating: moderate
References:
* bsc#1228847
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for dracut fixes the following issue:
* Version update
* fix(convertfs): error in conditional expressions (bsc#1228847).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3145=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3145=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3145=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3145=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3145=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3145=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3145=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3145=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3145=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3145=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3145=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3145=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3145=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Manager Proxy 4.3 (x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-extra-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-tools-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* dracut-mkinitrd-deprecated-055+suse.359.geb85610b-150400.3.37.2
* dracut-fips-055+suse.359.geb85610b-150400.3.37.2
* dracut-055+suse.359.geb85610b-150400.3.37.2
* dracut-debugsource-055+suse.359.geb85610b-150400.3.37.2
* dracut-ima-055+suse.359.geb85610b-150400.3.37.2
* dracut-debuginfo-055+suse.359.geb85610b-150400.3.37.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228847
1
0
05 Sep '24
# Recommended update for dracut
Announcement ID: SUSE-RU-2024:3146-1
Rating: moderate
References:
* bsc#1228398
* bsc#1228847
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for dracut fixes the following issues:
* Version update with:
* feat(systemd*) include systemd config files from /usr/lib/systemd
(bsc#1228398).
* fix(convertfs) error in conditional expressions (bsc#1228847).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3146=1 openSUSE-SLE-15.5-2024-3146=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3146=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3146=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3146=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* dracut-debugsource-055+suse.392.g7930ab23-150500.3.24.2
* dracut-fips-055+suse.392.g7930ab23-150500.3.24.2
* dracut-mkinitrd-deprecated-055+suse.392.g7930ab23-150500.3.24.2
* dracut-tools-055+suse.392.g7930ab23-150500.3.24.2
* dracut-ima-055+suse.392.g7930ab23-150500.3.24.2
* dracut-extra-055+suse.392.g7930ab23-150500.3.24.2
* dracut-debuginfo-055+suse.392.g7930ab23-150500.3.24.2
* dracut-055+suse.392.g7930ab23-150500.3.24.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* dracut-debuginfo-055+suse.392.g7930ab23-150500.3.24.2
* dracut-debugsource-055+suse.392.g7930ab23-150500.3.24.2
* dracut-055+suse.392.g7930ab23-150500.3.24.2
* dracut-fips-055+suse.392.g7930ab23-150500.3.24.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* dracut-debuginfo-055+suse.392.g7930ab23-150500.3.24.2
* dracut-debugsource-055+suse.392.g7930ab23-150500.3.24.2
* dracut-055+suse.392.g7930ab23-150500.3.24.2
* dracut-fips-055+suse.392.g7930ab23-150500.3.24.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* dracut-debugsource-055+suse.392.g7930ab23-150500.3.24.2
* dracut-fips-055+suse.392.g7930ab23-150500.3.24.2
* dracut-mkinitrd-deprecated-055+suse.392.g7930ab23-150500.3.24.2
* dracut-055+suse.392.g7930ab23-150500.3.24.2
* dracut-debuginfo-055+suse.392.g7930ab23-150500.3.24.2
* dracut-ima-055+suse.392.g7930ab23-150500.3.24.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228398
* https://bugzilla.suse.com/show_bug.cgi?id=1228847
1
0
05 Sep '24
# Recommended update for dracut
Announcement ID: SUSE-RU-2024:3147-1
Rating: moderate
References:
* bsc#1228398
* bsc#1228847
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has two fixes can now be installed.
## Description:
This update for dracut fixes the following issues:
* Version update with:
* feat(systemd*) include systemd config files from /usr/lib/systemd
(bsc#1228398)
* fix(convertfs) error in conditional expressions (bsc#1228847)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3147=1 openSUSE-SLE-15.6-2024-3147=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3147=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3147=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* dracut-debugsource-059+suse.531.g48487c31-150600.3.6.2
* dracut-ima-059+suse.531.g48487c31-150600.3.6.2
* dracut-mkinitrd-deprecated-059+suse.531.g48487c31-150600.3.6.2
* dracut-059+suse.531.g48487c31-150600.3.6.2
* dracut-debuginfo-059+suse.531.g48487c31-150600.3.6.2
* dracut-extra-059+suse.531.g48487c31-150600.3.6.2
* dracut-fips-059+suse.531.g48487c31-150600.3.6.2
* dracut-tools-059+suse.531.g48487c31-150600.3.6.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* dracut-debugsource-059+suse.531.g48487c31-150600.3.6.2
* dracut-ima-059+suse.531.g48487c31-150600.3.6.2
* dracut-059+suse.531.g48487c31-150600.3.6.2
* dracut-debuginfo-059+suse.531.g48487c31-150600.3.6.2
* dracut-fips-059+suse.531.g48487c31-150600.3.6.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (ppc64le x86_64)
* dracut-debuginfo-059+suse.531.g48487c31-150600.3.6.2
* dracut-debugsource-059+suse.531.g48487c31-150600.3.6.2
* dracut-mkinitrd-deprecated-059+suse.531.g48487c31-150600.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228398
* https://bugzilla.suse.com/show_bug.cgi?id=1228847
1
0
04 Sep '24
# Recommended update for crmsh
Announcement ID: SUSE-RU-2024:3138-1
Rating: moderate
References:
* bsc#1228713
* bsc#1228899
* bsc#1229030
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has three fixes can now be installed.
## Description:
This update for crmsh fixes the following issues:
* Version update:
* Fix: utils: group check failure when os.getgroups() returns empty
(bsc#1229030).
* Fix: report: When 'core.no_ssh' set to 'yes', crm report works in local mode
(bsc#1228899).
* Fix: report: Find trace_ra directory in local while crm report is in local
mode (bsc#1228899).
* Fix: upgradeutil: Immdiately return if config.core.no_ssh is set
(bsc#1228899).
* Fix: ui_cluster: Handle 'crm cluster start --all' command (bsc#1228899).
* Fix: ui_cluster: Handle 'crm cluster stop --all' command (bsc#1228899).
* Fix: utils: Define utils.NoSSHError exception and ssh wrapper function
(bsc#1228899).
* Fix: config: Add 'core.no_ssh' option (bsc#1228899).
* Revert "Dev: doc: Add deprecated note for 'crm configure erase'".
* Revert "Dev: ui_configure: Deprecate configure erase sub-command"
(bsc#1228713).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3138=1 openSUSE-SLE-15.5-2024-3138=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3138=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* crmsh-test-4.5.1+20240822.fb5e2f2-150500.3.34.2
* crmsh-scripts-4.5.1+20240822.fb5e2f2-150500.3.34.2
* crmsh-4.5.1+20240822.fb5e2f2-150500.3.34.2
* SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch)
* crmsh-scripts-4.5.1+20240822.fb5e2f2-150500.3.34.2
* crmsh-4.5.1+20240822.fb5e2f2-150500.3.34.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228713
* https://bugzilla.suse.com/show_bug.cgi?id=1228899
* https://bugzilla.suse.com/show_bug.cgi?id=1229030
1
0
04 Sep '24
# Security update for python-Django
Announcement ID: SUSE-SU-2024:3139-1
Rating: important
References:
* bsc#1229823
* bsc#1229824
Cross-References:
* CVE-2024-45230
* CVE-2024-45231
CVSS scores:
* CVE-2024-45230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45231 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for python-Django fixes the following issues:
* CVE-2024-45230: Fixed potential denial-of-service vulnerability in
django.utils.html.urlize(). (bsc#1229823)
* CVE-2024-45231: Fixed potential user email enumeration via response status
on password reset. (bsc#1229824)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3139=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* python3-Django-2.0.7-150000.1.33.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45230.html
* https://www.suse.com/security/cve/CVE-2024-45231.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229823
* https://bugzilla.suse.com/show_bug.cgi?id=1229824
1
0
SUSE-SU-2024:3140-1: important: Security update for java-1_8_0-openj9
by OPENSUSE-UPDATES 04 Sep '24
by OPENSUSE-UPDATES 04 Sep '24
04 Sep '24
# Security update for java-1_8_0-openj9
Announcement ID: SUSE-SU-2024:3140-1
Rating: important
References:
* bsc#1228046
* bsc#1228047
* bsc#1228048
* bsc#1228050
* bsc#1228051
* bsc#1228052
Cross-References:
* CVE-2024-21131
* CVE-2024-21138
* CVE-2024-21140
* CVE-2024-21144
* CVE-2024-21145
* CVE-2024-21147
CVSS scores:
* CVE-2024-21131 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-21138 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21140 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21144 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-21145 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-21147 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves six vulnerabilities can now be installed.
## Description:
This update for java-1_8_0-openj9 fixes the following issues:
* Update to OpenJDK 8u422 build 05 with OpenJ9 0.46.0 virtual machine
* CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination.
(bsc#1228052)
* CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling.
(bsc#1228051)
* CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow.
(bsc#1228048)
* CVE-2024-21144: Pack200 increase loading time due to improper header
validation. (bsc#1228050)
* CVE-2024-21138: Fixed an issue where excessive symbol length can lead to
infinite loop. (bsc#1228047)
* CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3140=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3140=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3140=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3140=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.422-150200.3.48.2
* SUSE Package Hub 15 15-SP5 (ppc64le s390x)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* SUSE Package Hub 15 15-SP6 (ppc64le s390x)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-headless-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-devel-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-debugsource-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-demo-debuginfo-1.8.0.422-150200.3.48.2
* java-1_8_0-openj9-1.8.0.422-150200.3.48.2
* openSUSE Leap 15.5 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.422-150200.3.48.2
## References:
* https://www.suse.com/security/cve/CVE-2024-21131.html
* https://www.suse.com/security/cve/CVE-2024-21138.html
* https://www.suse.com/security/cve/CVE-2024-21140.html
* https://www.suse.com/security/cve/CVE-2024-21144.html
* https://www.suse.com/security/cve/CVE-2024-21145.html
* https://www.suse.com/security/cve/CVE-2024-21147.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228046
* https://bugzilla.suse.com/show_bug.cgi?id=1228047
* https://bugzilla.suse.com/show_bug.cgi?id=1228048
* https://bugzilla.suse.com/show_bug.cgi?id=1228050
* https://bugzilla.suse.com/show_bug.cgi?id=1228051
* https://bugzilla.suse.com/show_bug.cgi?id=1228052
1
0
04 Sep '24
# Recommended update for python-kiwi
Announcement ID: SUSE-RU-2024:3141-1
Rating: important
References:
* bsc#1228808
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for python-kiwi fixes the following issues:
* Update virtualenv setup
* types-pkg_resources got dropped from PyPI
* Fixed regression in GRUB_SERIAL_COMMAND setup (bsc#1228808)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3141=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3141=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3141=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3141=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3141=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3141=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3141=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3141=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3141=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3141=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3141=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3141=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3141=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3141=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3141=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3141=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3141=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3141=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3141=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3141=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3141=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3141=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3141=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3141=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3141=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* Development Tools Module 15-SP5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* Development Tools Module 15-SP6 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* kiwi-pxeboot-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Enterprise Storage 7.1 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* openSUSE Leap 15.5 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kiwi-systemdeps-bootloaders-9.24.43-150100.3.84.1
* kiwi-systemdeps-iso-media-9.24.43-150100.3.84.1
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* kiwi-systemdeps-containers-9.24.43-150100.3.84.1
* kiwi-systemdeps-core-9.24.43-150100.3.84.1
* kiwi-systemdeps-disk-images-9.24.43-150100.3.84.1
* dracut-kiwi-live-9.24.43-150100.3.84.1
* dracut-kiwi-overlay-9.24.43-150100.3.84.1
* kiwi-systemdeps-filesystems-9.24.43-150100.3.84.1
* kiwi-tools-9.24.43-150100.3.84.1
* kiwi-systemdeps-image-validation-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* python3-kiwi-9.24.43-150100.3.84.1
* kiwi-tools-debuginfo-9.24.43-150100.3.84.1
* kiwi-man-pages-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* kiwi-systemdeps-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* openSUSE Leap 15.6 (x86_64)
* kiwi-pxeboot-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* dracut-kiwi-oem-repart-9.24.43-150100.3.84.1
* python-kiwi-debugsource-9.24.43-150100.3.84.1
* dracut-kiwi-lib-9.24.43-150100.3.84.1
* dracut-kiwi-oem-dump-9.24.43-150100.3.84.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228808
1
0
SUSE-RU-2024:3142-1: moderate: Recommended update for cargo-auditable
by OPENSUSE-UPDATES 04 Sep '24
by OPENSUSE-UPDATES 04 Sep '24
04 Sep '24
# Recommended update for cargo-auditable
Announcement ID: SUSE-RU-2024:3142-1
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for cargo-auditable fixes the following issues:
* Allow cargo-packaging to use alternate rust versions (bsc#1224122)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3142=1 openSUSE-SLE-15.5-2024-3142=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3142=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3142=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3142=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* cargo-auditable-debuginfo-0.6.4~0-150500.12.3.1
* cargo-auditable-0.6.4~0-150500.12.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cargo-auditable-debuginfo-0.6.4~0-150500.12.3.1
* cargo-auditable-0.6.4~0-150500.12.3.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cargo-auditable-debuginfo-0.6.4~0-150500.12.3.1
* cargo-auditable-0.6.4~0-150500.12.3.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cargo-auditable-debuginfo-0.6.4~0-150500.12.3.1
* cargo-auditable-0.6.4~0-150500.12.3.1
1
0
04 Sep '24
# Recommended update for sles-release
Announcement ID: SUSE-RU-2024:3143-1
Rating: moderate
References:
* bsc#1227114
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Server 15 SP5
An update that has one fix can now be installed.
## Description:
This update for sles-release fixes the following issue:
* Increment Codestream lifecycle by 3 years.
* Set Product EOL date.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3143=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-2024-3143=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* sles-release-15.5-150500.61.4.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* sles-release-15.5-150500.61.4.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1227114
1
0
04 Sep '24
# Recommended update for rsyslog
Announcement ID: SUSE-RU-2024:3135-1
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for rsyslog fixes the following issues:
* Version upgrade
* patches replaced by upgrade (details in upgrade logs)
* Revert "Update omlibdbi.c"
* imkmsg: add params "readMode" and "expectedBootCompleteSeconds"
* testbench: fix "typo" in test case
* omazureeventhubs: Corrected handling of transport closed failures
* imkmsg: add module param parseKernelTimestamp
* imfile: remove state file on file delete fix
* imklog bugfix: keepKernelTimestamp=off config param did not work
* Netstreamdriver: deallocate certificate related resources
* TLS subsystem: add remote hostname to error reporting
* Fix forking issue do to close_range call
* replace debian sample systemd service file by readme
* testbench: bump zookeeper version to match current offering
* Update rsyslog.service sample unit to the latest version used in Debian
Trixie
* Only keep a single rsyslog.service for Debian
* Remove no longer used --with-systemdsystemunitdir configure switch
* use logind instead of utmp for wall messages with systemd
* Typo fixes
* Drop CAP_IPC_LOCK capability
* Add CAP_NET_RAW capability due to the omudpspoof module
* Add new global config option "libcapng.enable"
* tcp net subsystem: handle data race gracefully
* Avoid crash on restart in imrelp SIGTTIN handler
* patches replaced by upgrade
* fix startup issue on modern systemd systems
* Fix misspeling in message.
* tcpflood bugfix: plain tcp send error not properly reported
* omprog bugfix: Add CAP_DAC_OVERRIDE to the bounding set
* testbench: cleanup and improve some more imfile tests
* lookup tables: fix static analyzer issue
* lookup tables bugfix: reload on HUP did not work when backgrounded
* CI: fix and cleaup github workflow
* imjournal: Support input module
* testbench: make test more reliable
* tcpflood: add -A option to NOT abort when sending fails
* tcpflood: fix today's programming error
* openssl: Replaced depreceated method SSLv23_method with TLS_method
* testbench improvement: define state file directories for imfile tests
* testbench: cleanup a test and some nitfixes to it
* tcpflood bugfix: TCP sending was not implemented properly
* testbench: make waiting for HUP processing more reliable
* build system: make rsyslogd execute when --disable-inet is configured
* CI: update zookeper download to newer version
* ossl driver: Using newer INIT API for OpenSSL 1.1+ Versions
* ossl: Fix CRL File Expire from 1 day to 100 years.
* PR5175: Add TLS CRL Support for GnuTLS driver and OpenSSL 1.0.2+
* omazureeventhubs: Initial implementation of new output module
* TLS CRL Support Issue 5081
* action.resumeintervalmax: the parameter was not respected
* IMHIREDIS::FIXED:: Restore compatiblity with hiredis < v1.0.0
* Add the 'batchsize' parameter to imhiredis
* Clear undefined behavior in libgcry.c (GH #5167)
* Do not try to drop capabilities when we don't have any
* testbench: use newer zookeeper version in tests
* build system: more precise error message on too-old lib
* Fix quoting for omprog, improg, mmexternal
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3135=1 openSUSE-SLE-15.6-2024-3135=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3135=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3135=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* rsyslog-module-kafka-8.2406.0-150600.12.3.2
* rsyslog-module-gssapi-8.2406.0-150600.12.3.2
* rsyslog-module-gcrypt-8.2406.0-150600.12.3.2
* rsyslog-module-gtls-8.2406.0-150600.12.3.2
* rsyslog-module-mmnormalize-8.2406.0-150600.12.3.2
* rsyslog-module-pgsql-8.2406.0-150600.12.3.2
* rsyslog-module-kafka-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-omamqp1-8.2406.0-150600.12.3.2
* rsyslog-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-dbi-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-omamqp1-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-omhttpfs-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-snmp-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-relp-8.2406.0-150600.12.3.2
* rsyslog-module-relp-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-snmp-8.2406.0-150600.12.3.2
* rsyslog-module-omtcl-8.2406.0-150600.12.3.2
* rsyslog-module-gtls-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-diag-tools-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-mmnormalize-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-mysql-8.2406.0-150600.12.3.2
* rsyslog-module-elasticsearch-8.2406.0-150600.12.3.2
* rsyslog-module-mysql-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-ossl-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-gcrypt-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-pgsql-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-udpspoof-8.2406.0-150600.12.3.2
* rsyslog-module-udpspoof-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-omtcl-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-omhttpfs-8.2406.0-150600.12.3.2
* rsyslog-module-elasticsearch-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-ossl-8.2406.0-150600.12.3.2
* rsyslog-debugsource-8.2406.0-150600.12.3.2
* rsyslog-doc-8.2406.0-150600.12.3.2
* rsyslog-module-gssapi-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-dbi-8.2406.0-150600.12.3.2
* rsyslog-8.2406.0-150600.12.3.2
* rsyslog-diag-tools-8.2406.0-150600.12.3.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rsyslog-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-8.2406.0-150600.12.3.2
* rsyslog-debugsource-8.2406.0-150600.12.3.2
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rsyslog-module-mmnormalize-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-mysql-8.2406.0-150600.12.3.2
* rsyslog-module-snmp-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-debugsource-8.2406.0-150600.12.3.2
* rsyslog-module-mysql-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-gssapi-8.2406.0-150600.12.3.2
* rsyslog-module-pgsql-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-udpspoof-8.2406.0-150600.12.3.2
* rsyslog-module-gtls-8.2406.0-150600.12.3.2
* rsyslog-module-mmnormalize-8.2406.0-150600.12.3.2
* rsyslog-module-udpspoof-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-gtls-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-relp-8.2406.0-150600.12.3.2
* rsyslog-module-pgsql-8.2406.0-150600.12.3.2
* rsyslog-module-relp-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-snmp-8.2406.0-150600.12.3.2
* rsyslog-debuginfo-8.2406.0-150600.12.3.2
* rsyslog-module-gssapi-debuginfo-8.2406.0-150600.12.3.2
1
0
openSUSE-RU-2024:0277-1: moderate: Recommended update for abcde
by maintenance@opensuse.org 03 Sep '24
by maintenance@opensuse.org 03 Sep '24
03 Sep '24
openSUSE Recommended Update: Recommended update for abcde
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0277-1
Rating: moderate
References: #1219527
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for abcde fixes the following issues:
- Fix arithmetic on non-octal track numbers (boo#1219527)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-277=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
abcde-2.9.3-bp156.5.3.1
References:
https://bugzilla.suse.com/1219527
1
0
03 Sep '24
# Security update for go1.21-openssl
Announcement ID: SUSE-SU-2024:3089-1
Rating: important
References:
* bsc#1212475
* bsc#1219988
* bsc#1220999
* bsc#1221000
* bsc#1221001
* bsc#1221002
* bsc#1221003
* bsc#1221400
* bsc#1224017
* bsc#1225973
* bsc#1225974
* bsc#1227314
* jsc#PED-1962
* jsc#SLE-18320
Cross-References:
* CVE-2023-45288
* CVE-2023-45289
* CVE-2023-45290
* CVE-2024-24783
* CVE-2024-24784
* CVE-2024-24785
* CVE-2024-24787
* CVE-2024-24789
* CVE-2024-24790
* CVE-2024-24791
CVSS scores:
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45289 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-45290 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24783 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24784 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24787 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-24789 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-24790 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L
* CVE-2024-24790 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-24791 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 10 vulnerabilities, contains two features and has two
security fixes can now be installed.
## Description:
This update for go1.21-openssl fixes the following issues:
* CVE-2024-24791: Fixed denial of service due to improper 100-continue
handling (bsc#1227314)
* CVE-2024-24789: Fixed mishandling of corrupt central directory record in
archive/zip (bsc#1225973)
* CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped
IPv6 addresses in net/netip (bsc#1225974)
* CVE-2024-24787: Fixed arbitrary code execution during build on darwin in
cmd/go (bsc#1224017)
* CVE-2023-45288: Fixed denial of service due to close connections when
receiving too many headers in net/http and x/net/http2 (bsc#1221400)
* CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies
on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000)
* CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in
net/http (bsc#1221001)
* CVE-2024-24783: Fixed denial of service on certificates with an unknown
public key algorithm in crypto/x509 (bsc#1220999)
* CVE-2024-24784: Fixed comments in display names are incorrectly handled in
net/mail (bsc#1221002)
* CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break
template escaping in html/template (bsc#1221003)
Other fixes: \- Update to version 1.21.13.1 cut from the go1.21-fips-release
(jsc#SLE-18320) \- Update to version 1.21.13 (bsc#1212475) \- Remove subpackage
go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962) \-
Ensure VERSION file is present in GOROOT as required by go tool dist and go tool
distpack (bsc#1219988)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3089=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3089=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3089=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3089=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3089=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3089=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3089=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* go1.21-openssl-1.21.13.1-150000.1.11.1
* go1.21-openssl-race-1.21.13.1-150000.1.11.1
* go1.21-openssl-doc-1.21.13.1-150000.1.11.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2023-45289.html
* https://www.suse.com/security/cve/CVE-2023-45290.html
* https://www.suse.com/security/cve/CVE-2024-24783.html
* https://www.suse.com/security/cve/CVE-2024-24784.html
* https://www.suse.com/security/cve/CVE-2024-24785.html
* https://www.suse.com/security/cve/CVE-2024-24787.html
* https://www.suse.com/security/cve/CVE-2024-24789.html
* https://www.suse.com/security/cve/CVE-2024-24790.html
* https://www.suse.com/security/cve/CVE-2024-24791.html
* https://bugzilla.suse.com/show_bug.cgi?id=1212475
* https://bugzilla.suse.com/show_bug.cgi?id=1219988
* https://bugzilla.suse.com/show_bug.cgi?id=1220999
* https://bugzilla.suse.com/show_bug.cgi?id=1221000
* https://bugzilla.suse.com/show_bug.cgi?id=1221001
* https://bugzilla.suse.com/show_bug.cgi?id=1221002
* https://bugzilla.suse.com/show_bug.cgi?id=1221003
* https://bugzilla.suse.com/show_bug.cgi?id=1221400
* https://bugzilla.suse.com/show_bug.cgi?id=1224017
* https://bugzilla.suse.com/show_bug.cgi?id=1225973
* https://bugzilla.suse.com/show_bug.cgi?id=1225974
* https://bugzilla.suse.com/show_bug.cgi?id=1227314
* https://jira.suse.com/browse/PED-1962
* https://jira.suse.com/browse/SLE-18320
1
0
# Security update for frr
Announcement ID: SUSE-SU-2024:3090-1
Rating: important
References:
* bsc#1229438
Cross-References:
* CVE-2024-44070
CVSS scores:
* CVE-2024-44070 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44070 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44070 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for frr fixes the following issues:
* CVE-2024-44070: Fixed missing stream length check before TLV value is taken
in bgp_attr_encap (bsc#1229438)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3090=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3090=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3090=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3090=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3090=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3090=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3090=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3090=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3090=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3090=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3090=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3090=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfrr0-7.4-150300.4.29.1
* libfrrospfapiclient0-7.4-150300.4.29.1
* frr-devel-7.4-150300.4.29.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.29.1
* libfrrsnmp0-debuginfo-7.4-150300.4.29.1
* libfrrzmq0-7.4-150300.4.29.1
* libfrrsnmp0-7.4-150300.4.29.1
* libmlag_pb0-7.4-150300.4.29.1
* libfrr_pb0-debuginfo-7.4-150300.4.29.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-7.4-150300.4.29.1
* libfrr_pb0-7.4-150300.4.29.1
* frr-debugsource-7.4-150300.4.29.1
* libfrrzmq0-debuginfo-7.4-150300.4.29.1
* libfrrcares0-debuginfo-7.4-150300.4.29.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.29.1
* libfrr0-debuginfo-7.4-150300.4.29.1
* frr-debuginfo-7.4-150300.4.29.1
* frr-7.4-150300.4.29.1
* libmlag_pb0-debuginfo-7.4-150300.4.29.1
* libfrrfpm_pb0-7.4-150300.4.29.1
* libfrrgrpc_pb0-7.4-150300.4.29.1
## References:
* https://www.suse.com/security/cve/CVE-2024-44070.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229438
1
0
03 Sep '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:3091-1
Rating: important
References:
* bsc#1228613
* bsc#1228693
* bsc#1228694
* bsc#1228695
* bsc#1228696
* bsc#1228697
* bsc#1228698
Cross-References:
* CVE-2024-40776
* CVE-2024-40779
* CVE-2024-40780
* CVE-2024-40782
* CVE-2024-40785
* CVE-2024-40789
* CVE-2024-40794
* CVE-2024-4558
CVSS scores:
* CVE-2024-40776 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-40776 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-40776 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-40779 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40780 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40782 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40785 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-40789 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40789 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
Update to version 2.44.3 (bsc#1228696 bsc#1228697 bsc#1228698):
* Fix web process cache suspend/resume when sandbox is enabled.
* Fix accelerated images dissapearing after scrolling.
* Fix video flickering with DMA-BUF sink.
* Fix pointer lock on X11.
* Fix movement delta on mouse events in GTK3.
* Undeprecate console message API and make it available in 2022 API.
* Fix several crashes and rendering issues.
* Security fixes: CVE-2024-40776, CVE-2024-40779, CVE-2024-40780,
CVE-2024-40782, CVE-2024-40785, CVE-2024-40789, CVE-2024-40794,
CVE-2024-4558.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3091=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3091=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3091=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3091=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3091=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3091=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3091=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3091=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3091=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3091=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3091=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3091=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3091=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* webkit-jsc-4-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-6_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-6.0-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-4.1-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-4.1-2.44.3-150400.4.88.1
* webkit-jsc-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-2.44.3-150400.4.88.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit-jsc-6.0-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-devel-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* openSUSE Leap 15.4 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-2.44.3-150400.4.88.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-64bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-64bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-64bit-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-64bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.3-150400.4.88.1
* openSUSE Leap 15.5 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-JavaScriptCore-6_0-2.44.3-150400.4.88.1
* webkit-jsc-4-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-6.0-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit-jsc-4.1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-2.44.3-150400.4.88.1
* webkit-jsc-4.1-2.44.3-150400.4.88.1
* webkit-jsc-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* webkit2gtk4-minibrowser-2.44.3-150400.4.88.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkit-jsc-6.0-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-devel-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* openSUSE Leap 15.5 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-32bit-2.44.3-150400.4.88.1
* Basesystem Module 15-SP5 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* Desktop Applications Module 15-SP5 (noarch)
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* Development Tools Module 15-SP5 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.1-lang-2.44.3-150400.4.88.1
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150400.4.88.1
* libwebkitgtk-6_0-4-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1
* webkit2gtk3-debugsource-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1
* webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk4-debugsource-2.44.3-150400.4.88.1
* SUSE Manager Proxy 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Manager Proxy 4.3 (x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
* SUSE Manager Server 4.3 (noarch)
* WebKitGTK-4.0-lang-2.44.3-150400.4.88.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150400.4.88.1
* webkit2gtk3-soup2-debugsource-2.44.3-150400.4.88.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150400.4.88.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150400.4.88.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40776.html
* https://www.suse.com/security/cve/CVE-2024-40779.html
* https://www.suse.com/security/cve/CVE-2024-40780.html
* https://www.suse.com/security/cve/CVE-2024-40782.html
* https://www.suse.com/security/cve/CVE-2024-40785.html
* https://www.suse.com/security/cve/CVE-2024-40789.html
* https://www.suse.com/security/cve/CVE-2024-40794.html
* https://www.suse.com/security/cve/CVE-2024-4558.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228613
* https://bugzilla.suse.com/show_bug.cgi?id=1228693
* https://bugzilla.suse.com/show_bug.cgi?id=1228694
* https://bugzilla.suse.com/show_bug.cgi?id=1228695
* https://bugzilla.suse.com/show_bug.cgi?id=1228696
* https://bugzilla.suse.com/show_bug.cgi?id=1228697
* https://bugzilla.suse.com/show_bug.cgi?id=1228698
1
0
03 Sep '24
# Recommended update for dpdk
Announcement ID: SUSE-RU-2024:3092-1
Rating: moderate
References:
* bsc#1214724
* jsc#PED-8431
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that contains one feature and has one fix can now be installed.
## Description:
This update for dpdk fixes the following issue:
* Provided DPDK modules taint the kernel as unsupported (bsc#1214724,
jsc#PED-8431)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3092=1 openSUSE-SLE-15.5-2024-3092=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3092=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* libdpdk-20_0-19.11.10-150500.5.14.3
* libdpdk-20_0-debuginfo-19.11.10-150500.5.14.3
* dpdk-devel-19.11.10-150500.5.14.3
* dpdk-examples-19.11.10-150500.5.14.3
* dpdk-tools-19.11.10-150500.5.14.3
* dpdk-tools-debuginfo-19.11.10-150500.5.14.3
* dpdk-19.11.10-150500.5.14.3
* dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-examples-debuginfo-19.11.10-150500.5.14.3
* dpdk-debugsource-19.11.10-150500.5.14.3
* dpdk-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-debuginfo-19.11.10-150500.5.14.3
* dpdk-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* openSUSE Leap 15.5 (noarch)
* dpdk-thunderx-doc-19.11.10-150500.5.14.3
* dpdk-doc-19.11.10-150500.5.14.3
* openSUSE Leap 15.5 (aarch64)
* dpdk-thunderx-devel-19.11.10-150500.5.14.3
* dpdk-thunderx-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-tools-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-examples-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-tools-19.11.10-150500.5.14.3
* dpdk-thunderx-debugsource-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-19.11.10-150500.5.14.3
* dpdk-thunderx-examples-19.11.10-150500.5.14.3
* Legacy Module 15-SP5 (aarch64 ppc64le x86_64)
* libdpdk-20_0-19.11.10-150500.5.14.3
* libdpdk-20_0-debuginfo-19.11.10-150500.5.14.3
* dpdk-devel-19.11.10-150500.5.14.3
* dpdk-tools-19.11.10-150500.5.14.3
* dpdk-tools-debuginfo-19.11.10-150500.5.14.3
* dpdk-19.11.10-150500.5.14.3
* dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-debugsource-19.11.10-150500.5.14.3
* dpdk-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-debuginfo-19.11.10-150500.5.14.3
* dpdk-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* Legacy Module 15-SP5 (aarch64)
* dpdk-thunderx-devel-19.11.10-150500.5.14.3
* dpdk-thunderx-devel-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-debuginfo-19.11.10-150500.5.14.3
* dpdk-thunderx-debugsource-19.11.10-150500.5.14.3
* dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.68-150500.5.14.3
* dpdk-thunderx-19.11.10-150500.5.14.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1214724
* https://jira.suse.com/browse/PED-8431
1
0
03 Sep '24
# Recommended update for rust1.80
Announcement ID: SUSE-RU-2024:3093-1
Rating: moderate
References:
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for rust1.80 fixes the following issues:
# Version 1.80.1 (2024-08-08)
* Fix miscompilation in the jump threading MIR optimization when comparing
floats
* Revert changes to the `dead_code` lint from 1.80.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3093=1 openSUSE-SLE-15.5-2024-3093=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3093=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3093=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3093=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* openSUSE Leap 15.5 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
* openSUSE Leap 15.5 (nosrc)
* rust1.80-test-1.80.1-150500.11.6.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* openSUSE Leap 15.6 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* Development Tools Module 15-SP5 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rust1.80-debuginfo-1.80.1-150500.11.6.1
* cargo1.80-1.80.1-150500.11.6.1
* cargo1.80-debuginfo-1.80.1-150500.11.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* rust1.80-1.80.1-150500.11.6.1
* Development Tools Module 15-SP6 (noarch)
* rust1.80-src-1.80.1-150500.11.6.1
1
0
03 Sep '24
# Security update for kubernetes1.26
Announcement ID: SUSE-SU-2024:3094-1
Rating: important
References:
* bsc#1062303
* bsc#1229008
* bsc#1229858
* bsc#1229867
* bsc#1229869
Cross-References:
* CVE-2023-39325
* CVE-2023-44487
* CVE-2024-24786
CVSS scores:
* CVE-2023-39325 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-39325 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities and has two security fixes can now
be installed.
## Description:
This update for kubernetes1.26 fixes the following issues:
Update kubernetes to version 1.26.15: \- CVE-2024-24786: Fixed infinite loop in
protojson.Unmarshal in golang-protobuf (bsc#1229867) \- CVE-2023-39325: Fixed a
flaw that can lead to a DoS due to a rapid stream resets causing excessive work.
This is also known as CVE-2023-44487. (bsc#1229869) \- CVE-2023-44487: Fixed
HTTP/2 Rapid Reset attack in net/http (bsc#1229869)
Other fixes:
\- Fixed packages required by kubernetes1.26-client installation (bsc#1229008)
\- Update go to version v1.22.5 (bsc#1229858) \- Add upstream patch for
reproducible builds (bsc#1062303)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3094=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3094=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3094=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3094=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3094=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3094=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3094=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3094=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3094=1
## Package List:
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-kubelet-1.26.15-150400.9.11.1
* kubernetes1.26-kubeadm-1.26.15-150400.9.11.1
* kubernetes1.26-apiserver-1.26.15-150400.9.11.1
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* kubernetes1.26-controller-manager-1.26.15-150400.9.11.1
* kubernetes1.26-proxy-1.26.15-150400.9.11.1
* kubernetes1.26-kubelet-common-1.26.15-150400.9.11.1
* kubernetes1.26-scheduler-1.26.15-150400.9.11.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.26-client-bash-completion-1.26.15-150400.9.11.1
* kubernetes1.26-client-fish-completion-1.26.15-150400.9.11.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.26-kubelet-1.26.15-150400.9.11.1
* kubernetes1.26-kubeadm-1.26.15-150400.9.11.1
* kubernetes1.26-apiserver-1.26.15-150400.9.11.1
* kubernetes1.26-client-1.26.15-150400.9.11.1
* kubernetes1.26-client-common-1.26.15-150400.9.11.1
* kubernetes1.26-controller-manager-1.26.15-150400.9.11.1
* kubernetes1.26-proxy-1.26.15-150400.9.11.1
* kubernetes1.26-kubelet-common-1.26.15-150400.9.11.1
* kubernetes1.26-scheduler-1.26.15-150400.9.11.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.26-client-bash-completion-1.26.15-150400.9.11.1
* kubernetes1.26-client-fish-completion-1.26.15-150400.9.11.1
## References:
* https://www.suse.com/security/cve/CVE-2023-39325.html
* https://www.suse.com/security/cve/CVE-2023-44487.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://bugzilla.suse.com/show_bug.cgi?id=1062303
* https://bugzilla.suse.com/show_bug.cgi?id=1229008
* https://bugzilla.suse.com/show_bug.cgi?id=1229858
* https://bugzilla.suse.com/show_bug.cgi?id=1229867
* https://bugzilla.suse.com/show_bug.cgi?id=1229869
1
0
03 Sep '24
# Security update for ucode-intel
Announcement ID: SUSE-SU-2024:3095-1
Rating: important
References:
* bsc#1229129
Cross-References:
* CVE-2023-42667
* CVE-2023-49141
* CVE-2024-24853
* CVE-2024-24980
* CVE-2024-25939
CVSS scores:
* CVE-2023-42667 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-42667 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-49141 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-49141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-24853 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-24853 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-24980 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N
* CVE-2024-24980 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N
* CVE-2024-25939 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-25939 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves five vulnerabilities can now be installed.
## Description:
This update for ucode-intel fixes the following issues:
* Intel CPU Microcode was updated to the 20240813 release (bsc#1229129)
* CVE-2024-24853: Security updates for INTEL-SA-01083
* CVE-2024-25939: Security updates for INTEL-SA-01118
* CVE-2024-24980: Security updates for INTEL-SA-01100
* CVE-2023-42667: Security updates for INTEL-SA-01038
* CVE-2023-49141: Security updates for INTEL-SA-01046 Other issues fixed:
* Update for functional issues. Refer to Intel Core Ultra Processor for
details.
* Update for functional issues. Refer to 3rd Generation Intel Xeon Processor
Scalable Family Specification Update for details.
* Update for functional issues. Refer to 3rd Generation Intel Xeon Scalable
Processors Specification Update for details.
* Update for functional issues. Refer to 2nd Generation Intel Xeon Processor
Scalable Family Specification Update for details
* Update for functional issues. Refer to Intel Xeon D-2700 Processor
Specification Update for details.
* Update for functional issues. Refer to Intel Xeon E-2300 Processor
Specification Update for details.
* Update for functional issues. Refer to 13th Generation Intel Core Processor
Specification Update for details.
* Update for functional issues. Refer to 12th Generation Intel Core Processor
Family for details.
* Update for functional issues. Refer to 11th Gen Intel Core Processor
Specification Update for details.
* Update for functional issues. Refer to 10th Gen Intel Core Processor
Families Specification Update for details.
* Update for functional issues. Refer to 10th Generation Intel Core Processor
Specification Update for details.
* Update for functional issues. Refer to 8th and 9th Generation Intel Core
Processor Family Spec Update for details.
* Update for functional issues. Refer to 8th Generation Intel Core Processor
Families Specification Update for details.
* Update for functional issues. Refer to 7th and 8th Generation Intel Core
Processor Specification Update for details.
* Update for functional issues. Refer to Intel Processors and Intel Core i3
N-Series for details.
* Update for functional issues. Refer to Intel Atom x6000E Series, and Intel
Pentium and Celeron N and J Series Processors for Internet of Things (IoT)
Applications for details. Updated Platforms: | Processor | Stepping |
F-M-S/PI | Old Ver | New Ver | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| AML-Y22 | H0 | 06-8e-09/10 | 000000f4 | 000000f6 | Core Gen8 Mobile |
AML-Y42 | V0 | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile | CFL-H
| R0 | 06-9e-0d/22 | 000000fc | 00000100 | Core Gen9 Mobile | CFL-H/S | P0 |
06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 | CFL-H/S/E3 | U0 |
06-9e-0a/22 | 000000f6 | 000000f8 | Core Gen8 Desktop, Mobile, Xeon E |
CFL-S | B0 | 06-9e-0b/02 | 000000f4 | 000000f6 | Core Gen8 | CFL-S | P0 |
06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 Desktop | CFL-U43e | D0 |
06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile | CLX-SP | B1 |
06-55-07/bf | 05003605 | 05003707 | Xeon Scalable Gen2 | CML-H | R1 |
06-a5-02/20 | 000000fa | 000000fc | Core Gen10 Mobile | CML-S102 | Q0 |
06-a5-05/22 | 000000fa | 000000fc | Core Gen10 | CML-S62 | G1 | 06-a5-03/22
| 000000fa | 000000fc | Core Gen10 | CML-U42 | V0 | 06-8e-0c/94 | 000000fa |
000000fc | Core Gen10 Mobile | CML-U62 V1 | A0 | 06-a6-00/80 | 000000fa |
000000fe | Core Gen10 Mobile | CML-U62 V2 | K1 | 06-a6-01/80 | 000000fa |
000000fc | Core Gen10 Mobile | CML-Y42 | V0 | 06-8e-0c/94 | 000000fa |
000000fc | Core Gen10 Mobile | CPX-SP | A1 | 06-55-0b/bf | 07002802 |
07002904 | Xeon Scalable Gen3 | EHL | B1 | 06-96-01/01 | 00000019 | 0000001a
| Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E | ICL-D
| B0 | 06-6c-01/10 | 01000290 | 010002b0 | Xeon D-17xx, D-27xx | ICL-U/Y |
D1 | 06-7e-05/80 | 000000c4 | 000000c6 | Core Gen10 Mobile | ICX-SP | Dx/M1
| 06-6a-06/87 | 0d0003d1 | 0d0003e7 | Xeon Scalable Gen3 | KBL-R U | Y0 |
06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile | KBL-U23e | J1 |
06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile | KBL-U/Y | H0 |
06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile | MTL | C-0 |
06-aa-04/e6 | 0000001c | 0000001e | Core Ultra Processor | RKL-S | B0 |
06-a7-01/02 | 0000005e | 00000062 | Core Gen11 | TGL | B0/B1 | 06-8c-01/80 |
000000b6 | 000000b8 | Core Gen11 Mobile | TGL-H | R0 | 06-8d-01/c2 |
00000050 | 00000052 | Core Gen11 Mobile | TGL-R | C0 | 06-8c-02/c2 |
00000036 | 00000038 | Core Gen11 Mobile | WHL-U | V0 | 06-8e-0c/94 |
000000fa | 000000fc | Core Gen8 Mobile | WHL-U | W0 | 06-8e-0b/d0 | 000000f4
| 000000f6 | Core Gen8 Mobile
* update to 20240531:
* Update for functional issues. Refer to Intel Pentium Silver and Intel
Celeron Processor Specification Update
* Updated Platforms: | Processor | Stepping | F-M-S/PI | Old Ver | New Ver |
Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| GLK | B0 | 06-7a-01/01 | 00000040 | 00000042 | Pentium Silver N/J5xxx,
Celeron N/J4xxx
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3095=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3095=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3095=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3095=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3095=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3095=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3095=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3095=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3095=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3095=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3095=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3095=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3095=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3095=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3095=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3095=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3095=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3095=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3095=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3095=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3095=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3095=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3095=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3095=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3095=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3095=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3095=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3095=1
## Package List:
* openSUSE Leap Micro 5.5 (x86_64)
* ucode-intel-20240813-150200.44.1
* openSUSE Leap 15.5 (x86_64)
* ucode-intel-20240813-150200.44.1
* openSUSE Leap 15.6 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* ucode-intel-20240813-150200.44.1
* Basesystem Module 15-SP5 (x86_64)
* ucode-intel-20240813-150200.44.1
* Basesystem Module 15-SP6 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Manager Proxy 4.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Manager Server 4.3 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Enterprise Storage 7.1 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.1 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* ucode-intel-20240813-150200.44.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* ucode-intel-20240813-150200.44.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42667.html
* https://www.suse.com/security/cve/CVE-2023-49141.html
* https://www.suse.com/security/cve/CVE-2024-24853.html
* https://www.suse.com/security/cve/CVE-2024-24980.html
* https://www.suse.com/security/cve/CVE-2024-25939.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229129
1
0
03 Sep '24
# Recommended update for kubernetes1.25
Announcement ID: SUSE-RU-2024:3096-1
Rating: moderate
References:
* bsc#1229008
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for kubernetes1.25 fixes the following issues:
* Fix dependencies installation (bsc#1229008)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3096=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3096=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3096=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3096=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3096=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-kubeadm-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-1.25.16-150400.9.13.1
* kubernetes1.25-scheduler-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-common-1.25.16-150400.9.13.1
* kubernetes1.25-apiserver-1.25.16-150400.9.13.1
* kubernetes1.25-proxy-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-controller-manager-1.25.16-150400.9.13.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.25-client-bash-completion-1.25.16-150400.9.13.1
* kubernetes1.25-client-fish-completion-1.25.16-150400.9.13.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.25-kubeadm-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-1.25.16-150400.9.13.1
* kubernetes1.25-scheduler-1.25.16-150400.9.13.1
* kubernetes1.25-kubelet-common-1.25.16-150400.9.13.1
* kubernetes1.25-apiserver-1.25.16-150400.9.13.1
* kubernetes1.25-proxy-1.25.16-150400.9.13.1
* kubernetes1.25-client-common-1.25.16-150400.9.13.1
* kubernetes1.25-client-1.25.16-150400.9.13.1
* kubernetes1.25-controller-manager-1.25.16-150400.9.13.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.25-client-bash-completion-1.25.16-150400.9.13.1
* kubernetes1.25-client-fish-completion-1.25.16-150400.9.13.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229008
1
0
03 Sep '24
# Security update for kubernetes1.28
Announcement ID: SUSE-SU-2024:3097-1
Rating: important
References:
* bsc#1229858
* bsc#1229867
* bsc#1229869
Cross-References:
* CVE-2023-39325
* CVE-2023-44487
* CVE-2023-45288
* CVE-2024-24786
CVSS scores:
* CVE-2023-39325 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-39325 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for kubernetes1.28 fixes the following issues:
Update kubernetes to version 1.28.13: \- CVE-2024-24786: Fixed infinite loop in
protojson.Unmarshal in golang-protobuf (bsc#1229867) \- CVE-2023-39325: Fixed a
flaw that can lead to a DoS due to a rapid stream resets causing excessive work.
This is also known as CVE-2023-44487. (bsc#1229869) \- CVE-2023-45288: Fixed
denial of service due to close connections when receiving too many headers in
net/http and x/net/http2 (bsc#1229869) \- CVE-2023-44487: Fixed HTTP/2 Rapid
Reset attack in net/http (bsc#1229869)
Other fixes: \- Update go to version v1.22.5 (bsc#1229858)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3097=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3097=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3097=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3097=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3097=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3097=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3097=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3097=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3097=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-proxy-1.28.13-150400.9.8.1
* kubernetes1.28-controller-manager-1.28.13-150400.9.8.1
* kubernetes1.28-scheduler-1.28.13-150400.9.8.1
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-common-1.28.13-150400.9.8.1
* kubernetes1.28-apiserver-1.28.13-150400.9.8.1
* kubernetes1.28-kubeadm-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-1.28.13-150400.9.8.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.28-client-bash-completion-1.28.13-150400.9.8.1
* kubernetes1.28-client-fish-completion-1.28.13-150400.9.8.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-proxy-1.28.13-150400.9.8.1
* kubernetes1.28-controller-manager-1.28.13-150400.9.8.1
* kubernetes1.28-scheduler-1.28.13-150400.9.8.1
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-common-1.28.13-150400.9.8.1
* kubernetes1.28-apiserver-1.28.13-150400.9.8.1
* kubernetes1.28-kubeadm-1.28.13-150400.9.8.1
* kubernetes1.28-kubelet-1.28.13-150400.9.8.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.28-client-bash-completion-1.28.13-150400.9.8.1
* kubernetes1.28-client-fish-completion-1.28.13-150400.9.8.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kubernetes1.28-client-common-1.28.13-150400.9.8.1
* kubernetes1.28-client-1.28.13-150400.9.8.1
## References:
* https://www.suse.com/security/cve/CVE-2023-39325.html
* https://www.suse.com/security/cve/CVE-2023-44487.html
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229858
* https://bugzilla.suse.com/show_bug.cgi?id=1229867
* https://bugzilla.suse.com/show_bug.cgi?id=1229869
1
0
03 Sep '24
# Security update for kubernetes1.27
Announcement ID: SUSE-SU-2024:3098-1
Rating: important
References:
* bsc#1229858
* bsc#1229867
* bsc#1229869
Cross-References:
* CVE-2023-39325
* CVE-2023-44487
* CVE-2023-45288
* CVE-2024-24786
CVSS scores:
* CVE-2023-39325 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-39325 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-45288 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities can now be installed.
## Description:
This update for kubernetes1.27 fixes the following issues:
Update kubernetes to version 1.27.16 \- CVE-2024-24786: Fixed infinite loop in
protojson.Unmarshal in golang-protobuf (bsc#1229867) \- CVE-2023-39325: Fixed a
flaw that can lead to a DoS due to a rapid stream resets causing excessive work.
This is also known as CVE-2023-44487. (bsc#1229869) \- CVE-2023-45288: Fixed
denial of service due to close connections when receiving too many headers in
net/http and x/net/http2 (bsc#1229869) \- CVE-2023-44487: Fixed HTTP/2 Rapid
Reset attack in net/http (bsc#1229869)
Other fixes: \- Update go to version v1.22.5 (bsc#1229858)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3098=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3098=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3098=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3098=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3098=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3098=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3098=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3098=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3098=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kubernetes1.27-kubelet-1.27.16-150400.9.10.1
* kubernetes1.27-apiserver-1.27.16-150400.9.10.1
* kubernetes1.27-kubeadm-1.27.16-150400.9.10.1
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-scheduler-1.27.16-150400.9.10.1
* kubernetes1.27-kubelet-common-1.27.16-150400.9.10.1
* kubernetes1.27-controller-manager-1.27.16-150400.9.10.1
* kubernetes1.27-proxy-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* openSUSE Leap 15.4 (noarch)
* kubernetes1.27-client-fish-completion-1.27.16-150400.9.10.1
* kubernetes1.27-client-bash-completion-1.27.16-150400.9.10.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.27-kubelet-1.27.16-150400.9.10.1
* kubernetes1.27-apiserver-1.27.16-150400.9.10.1
* kubernetes1.27-kubeadm-1.27.16-150400.9.10.1
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-scheduler-1.27.16-150400.9.10.1
* kubernetes1.27-kubelet-common-1.27.16-150400.9.10.1
* kubernetes1.27-controller-manager-1.27.16-150400.9.10.1
* kubernetes1.27-proxy-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.27-client-fish-completion-1.27.16-150400.9.10.1
* kubernetes1.27-client-bash-completion-1.27.16-150400.9.10.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kubernetes1.27-client-1.27.16-150400.9.10.1
* kubernetes1.27-client-common-1.27.16-150400.9.10.1
## References:
* https://www.suse.com/security/cve/CVE-2023-39325.html
* https://www.suse.com/security/cve/CVE-2023-44487.html
* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229858
* https://bugzilla.suse.com/show_bug.cgi?id=1229867
* https://bugzilla.suse.com/show_bug.cgi?id=1229869
1
0
SUSE-RU-2024:3100-1: important: Recommended update for cloud-regionsrv-client
by OPENSUSE-UPDATES 03 Sep '24
by OPENSUSE-UPDATES 03 Sep '24
03 Sep '24
# Recommended update for cloud-regionsrv-client
Announcement ID: SUSE-RU-2024:3100-1
Rating: important
References:
* bsc#1229472
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for cloud-regionsrv-client contains the following fixes:
* Update to 10.3.4:
* Modify the message when network access over a specific IP version does not
work. This is an informational message and should not look like an error
* Inform the user that LTSS registration takes a little longer
* Add fix for sles12 no transactional update patch:
* SLE 12 family has no products with transactional-update we do not need to look for this condition
* From 10.3.3: (bsc#1229472)
* Handle changes in process structure to properly identify the running zypper
parent process and only check for 1 PID
* From 10.3.2:
* Remove rgnsrv-clnt-fix-docker-setup patch included upstream
* From 10.3.1: (jsc#PCT-400)
* Add support for LTSS registration
* Add fix for sles12 disable registry: ~ No container support in SLE 12
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3100=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3100=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3100=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3100=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3100=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3100=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3100=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3100=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3100=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3100=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3100=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3100=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3100=1
## Package List:
* Public Cloud Module 15-SP5 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* Public Cloud Module 15-SP6 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* openSUSE Leap 15.3 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* openSUSE Leap Micro 5.5 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* openSUSE Leap 15.5 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* openSUSE Leap 15.6 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* Public Cloud Module 15-SP3 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
* Public Cloud Module 15-SP4 (noarch)
* cloud-regionsrv-client-addon-azure-1.0.5-150300.13.9.1
* cloud-regionsrv-client-plugin-azure-2.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-gce-1.0.0-150300.13.9.1
* cloud-regionsrv-client-10.3.4-150300.13.9.1
* cloud-regionsrv-client-generic-config-1.0.0-150300.13.9.1
* cloud-regionsrv-client-plugin-ec2-1.0.4-150300.13.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229472
1
0
SUSE-RU-2024:3101-1: moderate: Recommended update for python-azure-agent
by OPENSUSE-UPDATES 03 Sep '24
by OPENSUSE-UPDATES 03 Sep '24
03 Sep '24
# Recommended update for python-azure-agent
Announcement ID: SUSE-RU-2024:3101-1
Rating: moderate
References:
* bsc#1227600
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP2
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for python-azure-agent fixes the following issue:
* The agent service gets restarted in post but may fail due to a missing
config file. config files were split into their own package previously. When
we detect that we have to restore a config file we also need to restart the
agent again (bsc#1227600).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3101=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3101=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3101=1
* Public Cloud Module 15-SP2
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-3101=1
* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-3101=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3101=1
* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-3101=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3101=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3101=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3101=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-test-2.9.1.1-150100.3.44.2
* openSUSE Leap 15.6 (noarch)
* python-azure-agent-config-micro-2.9.1.1-150100.3.44.2
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-config-server-2.9.1.1-150100.3.44.2
* python-azure-agent-config-default-2.9.1.1-150100.3.44.2
* python-azure-agent-test-2.9.1.1-150100.3.44.2
* python-azure-agent-config-hpc-2.9.1.1-150100.3.44.2
* SUSE Linux Enterprise Micro 5.5 (noarch)
* python-azure-agent-2.9.1.1-150100.3.44.2
* Public Cloud Module 15-SP2 (noarch)
* python-azure-agent-config-micro-2.9.1.1-150100.3.44.2
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-config-server-2.9.1.1-150100.3.44.2
* python-azure-agent-config-default-2.9.1.1-150100.3.44.2
* python-azure-agent-config-hpc-2.9.1.1-150100.3.44.2
* Public Cloud Module 15-SP3 (noarch)
* python-azure-agent-config-micro-2.9.1.1-150100.3.44.2
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-config-server-2.9.1.1-150100.3.44.2
* python-azure-agent-config-default-2.9.1.1-150100.3.44.2
* python-azure-agent-config-hpc-2.9.1.1-150100.3.44.2
* Public Cloud Module 15-SP4 (noarch)
* python-azure-agent-config-micro-2.9.1.1-150100.3.44.2
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-config-server-2.9.1.1-150100.3.44.2
* python-azure-agent-config-default-2.9.1.1-150100.3.44.2
* python-azure-agent-config-hpc-2.9.1.1-150100.3.44.2
* Public Cloud Module 15-SP5 (noarch)
* python-azure-agent-config-micro-2.9.1.1-150100.3.44.2
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-config-server-2.9.1.1-150100.3.44.2
* python-azure-agent-config-default-2.9.1.1-150100.3.44.2
* python-azure-agent-config-hpc-2.9.1.1-150100.3.44.2
* Public Cloud Module 15-SP6 (noarch)
* python-azure-agent-config-micro-2.9.1.1-150100.3.44.2
* python-azure-agent-2.9.1.1-150100.3.44.2
* python-azure-agent-config-server-2.9.1.1-150100.3.44.2
* python-azure-agent-config-default-2.9.1.1-150100.3.44.2
* python-azure-agent-config-hpc-2.9.1.1-150100.3.44.2
* SUSE Linux Enterprise Micro 5.2 (noarch)
* python-azure-agent-2.9.1.1-150100.3.44.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* python-azure-agent-2.9.1.1-150100.3.44.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1227600
1
0
03 Sep '24
# Recommended update for xfsprogs
Announcement ID: SUSE-RU-2024:3103-1
Rating: moderate
References:
* bsc#1229160
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for xfsprogs fixes the following issue:
* xfs_repair: allow symlinks with short remote targets (bsc#1229160)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3103=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3103=1 openSUSE-SLE-15.6-2024-3103=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3103=1
## Package List:
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* xfsprogs-debugsource-6.7.0-150600.3.6.2
* xfsprogs-debuginfo-6.7.0-150600.3.6.2
* xfsprogs-scrub-6.7.0-150600.3.6.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libhandle1-debuginfo-6.7.0-150600.3.6.2
* xfsprogs-debugsource-6.7.0-150600.3.6.2
* xfsprogs-scrub-6.7.0-150600.3.6.2
* xfsprogs-debuginfo-6.7.0-150600.3.6.2
* xfsprogs-6.7.0-150600.3.6.2
* libhandle1-6.7.0-150600.3.6.2
* xfsprogs-devel-6.7.0-150600.3.6.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libhandle1-debuginfo-6.7.0-150600.3.6.2
* xfsprogs-debugsource-6.7.0-150600.3.6.2
* xfsprogs-debuginfo-6.7.0-150600.3.6.2
* xfsprogs-6.7.0-150600.3.6.2
* libhandle1-6.7.0-150600.3.6.2
* xfsprogs-devel-6.7.0-150600.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229160
1
0
SUSE-SU-2024:3104-1: important: Security update for bubblewrap and flatpak
by OPENSUSE-UPDATES 03 Sep '24
by OPENSUSE-UPDATES 03 Sep '24
03 Sep '24
# Security update for bubblewrap and flatpak
Announcement ID: SUSE-SU-2024:3104-1
Rating: important
References:
* bsc#1229157
Cross-References:
* CVE-2024-42472
CVSS scores:
* CVE-2024-42472 ( SUSE ): 9.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
* CVE-2024-42472 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for bubblewrap and flatpak fixes the following issues:
* CVE-2024-42472: Fixed access to files outside sandbox for apps using
persistent (bsc#1229157)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3104=1 openSUSE-SLE-15.5-2024-3104=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3104=1 openSUSE-SLE-15.6-2024-3104=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3104=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3104=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3104=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3104=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* flatpak-1.14.5-150500.3.12.1
* flatpak-debuginfo-1.14.5-150500.3.12.1
* bubblewrap-0.8.0-150500.3.6.1
* bubblewrap-zsh-completion-0.8.0-150500.3.6.1
* flatpak-debugsource-1.14.5-150500.3.12.1
* bubblewrap-debugsource-0.8.0-150500.3.6.1
* libflatpak0-debuginfo-1.14.5-150500.3.12.1
* flatpak-devel-1.14.5-150500.3.12.1
* typelib-1_0-Flatpak-1_0-1.14.5-150500.3.12.1
* bubblewrap-debuginfo-0.8.0-150500.3.6.1
* libflatpak0-1.14.5-150500.3.12.1
* openSUSE Leap 15.5 (noarch)
* system-user-flatpak-1.14.5-150500.3.12.1
* flatpak-remote-flathub-1.14.5-150500.3.12.1
* flatpak-zsh-completion-1.14.5-150500.3.12.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* flatpak-devel-1.14.6-150600.3.3.1
* typelib-1_0-Flatpak-1_0-1.14.6-150600.3.3.1
* flatpak-1.14.6-150600.3.3.1
* libflatpak0-debuginfo-1.14.6-150600.3.3.1
* flatpak-debuginfo-1.14.6-150600.3.3.1
* libflatpak0-1.14.6-150600.3.3.1
* flatpak-debugsource-1.14.6-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* flatpak-zsh-completion-1.14.6-150600.3.3.1
* flatpak-remote-flathub-1.14.6-150600.3.3.1
* system-user-flatpak-1.14.6-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* bubblewrap-debugsource-0.8.0-150500.3.6.1
* bubblewrap-0.8.0-150500.3.6.1
* bubblewrap-debuginfo-0.8.0-150500.3.6.1
* bubblewrap-zsh-completion-0.8.0-150500.3.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* bubblewrap-debugsource-0.8.0-150500.3.6.1
* bubblewrap-0.8.0-150500.3.6.1
* bubblewrap-debuginfo-0.8.0-150500.3.6.1
* bubblewrap-zsh-completion-0.8.0-150500.3.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* bubblewrap-debugsource-0.8.0-150500.3.6.1
* bubblewrap-0.8.0-150500.3.6.1
* bubblewrap-debuginfo-0.8.0-150500.3.6.1
* bubblewrap-zsh-completion-0.8.0-150500.3.6.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* flatpak-1.14.5-150500.3.12.1
* flatpak-debuginfo-1.14.5-150500.3.12.1
* flatpak-debugsource-1.14.5-150500.3.12.1
* libflatpak0-debuginfo-1.14.5-150500.3.12.1
* flatpak-devel-1.14.5-150500.3.12.1
* typelib-1_0-Flatpak-1_0-1.14.5-150500.3.12.1
* libflatpak0-1.14.5-150500.3.12.1
* Desktop Applications Module 15-SP5 (noarch)
* system-user-flatpak-1.14.5-150500.3.12.1
* flatpak-remote-flathub-1.14.5-150500.3.12.1
* flatpak-zsh-completion-1.14.5-150500.3.12.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* flatpak-devel-1.14.6-150600.3.3.1
* typelib-1_0-Flatpak-1_0-1.14.6-150600.3.3.1
* flatpak-1.14.6-150600.3.3.1
* libflatpak0-debuginfo-1.14.6-150600.3.3.1
* flatpak-debuginfo-1.14.6-150600.3.3.1
* libflatpak0-1.14.6-150600.3.3.1
* flatpak-debugsource-1.14.6-150600.3.3.1
* Desktop Applications Module 15-SP6 (noarch)
* flatpak-zsh-completion-1.14.6-150600.3.3.1
* flatpak-remote-flathub-1.14.6-150600.3.3.1
* system-user-flatpak-1.14.6-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-42472.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229157
1
0
03 Sep '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:3105-1
Rating: moderate
References:
* bsc#1229465
Cross-References:
* CVE-2024-6119
CVSS scores:
* CVE-2024-6119 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3105=1 openSUSE-SLE-15.5-2024-3105=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3105=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-3-devel-3.0.8-150500.5.42.1
* openssl-3-3.0.8-150500.5.42.1
* openssl-3-debugsource-3.0.8-150500.5.42.1
* openssl-3-debuginfo-3.0.8-150500.5.42.1
* libopenssl3-debuginfo-3.0.8-150500.5.42.1
* libopenssl3-3.0.8-150500.5.42.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl3-32bit-3.0.8-150500.5.42.1
* libopenssl3-32bit-debuginfo-3.0.8-150500.5.42.1
* libopenssl-3-devel-32bit-3.0.8-150500.5.42.1
* openSUSE Leap 15.5 (noarch)
* openssl-3-doc-3.0.8-150500.5.42.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150500.5.42.1
* libopenssl-3-devel-64bit-3.0.8-150500.5.42.1
* libopenssl3-64bit-debuginfo-3.0.8-150500.5.42.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libopenssl-3-devel-3.0.8-150500.5.42.1
* openssl-3-3.0.8-150500.5.42.1
* openssl-3-debugsource-3.0.8-150500.5.42.1
* openssl-3-debuginfo-3.0.8-150500.5.42.1
* libopenssl3-debuginfo-3.0.8-150500.5.42.1
* libopenssl3-3.0.8-150500.5.42.1
## References:
* https://www.suse.com/security/cve/CVE-2024-6119.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229465
1
0
03 Sep '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:3106-1
Rating: moderate
References:
* bsc#1220523
* bsc#1220690
* bsc#1220693
* bsc#1220696
* bsc#1221365
* bsc#1221751
* bsc#1221752
* bsc#1221753
* bsc#1221760
* bsc#1221786
* bsc#1221787
* bsc#1221821
* bsc#1221822
* bsc#1221824
* bsc#1221827
* bsc#1229465
Cross-References:
* CVE-2024-6119
CVSS scores:
* CVE-2024-6119 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has 15 security fixes can now be
installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465)
Other fixes:
* FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365).
* FIPS: RSA keygen PCT requirements.
* FIPS: Check that the fips provider is available before setting it as the
default provider in FIPS mode (bsc#1220523).
* FIPS: Port openssl to use jitterentropy (bsc#1220523).
* FIPS: Block non-Approved Elliptic Curves (bsc#1221786).
* FIPS: Service Level Indicator (bsc#1221365).
* FIPS: Output the FIPS-validation name and module version which uniquely
identify the FIPS validated module (bsc#1221751).
* FIPS: Add required selftests: (bsc#1221760).
* FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821).
* FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827).
* FIPS: Zero initialization required (bsc#1221752).
* FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696).
* FIPS: NIST SP 800-56Brev2 (bsc#1221824).
* FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4
(bsc#1221787).
* FIPS: Port openssl to use jitterentropy (bsc#1220523).
* FIPS: NIST SP 800-56Arev3 (bsc#1221822).
* FIPS: Error state has to be enforced (bsc#1221753).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3106=1 openSUSE-SLE-15.6-2024-3106=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3106=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-3-devel-3.1.4-150600.5.15.1
* libopenssl3-debuginfo-3.1.4-150600.5.15.1
* openssl-3-debugsource-3.1.4-150600.5.15.1
* openssl-3-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.15.1
* libopenssl3-3.1.4-150600.5.15.1
* openssl-3-3.1.4-150600.5.15.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.15.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-devel-32bit-3.1.4-150600.5.15.1
* libopenssl3-32bit-3.1.4-150600.5.15.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.15.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.15.1
* libopenssl3-64bit-3.1.4-150600.5.15.1
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-devel-64bit-3.1.4-150600.5.15.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libopenssl-3-devel-3.1.4-150600.5.15.1
* libopenssl3-debuginfo-3.1.4-150600.5.15.1
* openssl-3-debugsource-3.1.4-150600.5.15.1
* openssl-3-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.15.1
* libopenssl3-3.1.4-150600.5.15.1
* openssl-3-3.1.4-150600.5.15.1
* Basesystem Module 15-SP6 (x86_64)
* libopenssl3-32bit-3.1.4-150600.5.15.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.15.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-6119.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220523
* https://bugzilla.suse.com/show_bug.cgi?id=1220690
* https://bugzilla.suse.com/show_bug.cgi?id=1220693
* https://bugzilla.suse.com/show_bug.cgi?id=1220696
* https://bugzilla.suse.com/show_bug.cgi?id=1221365
* https://bugzilla.suse.com/show_bug.cgi?id=1221751
* https://bugzilla.suse.com/show_bug.cgi?id=1221752
* https://bugzilla.suse.com/show_bug.cgi?id=1221753
* https://bugzilla.suse.com/show_bug.cgi?id=1221760
* https://bugzilla.suse.com/show_bug.cgi?id=1221786
* https://bugzilla.suse.com/show_bug.cgi?id=1221787
* https://bugzilla.suse.com/show_bug.cgi?id=1221821
* https://bugzilla.suse.com/show_bug.cgi?id=1221822
* https://bugzilla.suse.com/show_bug.cgi?id=1221824
* https://bugzilla.suse.com/show_bug.cgi?id=1221827
* https://bugzilla.suse.com/show_bug.cgi?id=1229465
1
0
03 Sep '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:3107-1
Rating: moderate
References:
* bsc#1229465
Cross-References:
* CVE-2024-6119
CVSS scores:
* CVE-2024-6119 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3107=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3107=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3107=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3107=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3107=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3107=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3107=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3107=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3107=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3107=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3107=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3107=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3107=1
## Package List:
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Manager Proxy 4.3 (x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-3.0.8-150400.4.63.1
* libopenssl-3-devel-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* openssl-3-debugsource-3.0.8-150400.4.63.1
* openssl-3-debuginfo-3.0.8-150400.4.63.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl-3-devel-32bit-3.0.8-150400.4.63.1
* libopenssl3-32bit-3.0.8-150400.4.63.1
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.63.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.63.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150400.4.63.1
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.63.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.63.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.63.1
* libopenssl3-debuginfo-3.0.8-150400.4.63.1
* libopenssl3-3.0.8-150400.4.63.1
## References:
* https://www.suse.com/security/cve/CVE-2024-6119.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229465
1
0
# Security update for frr
Announcement ID: SUSE-SU-2024:3108-1
Rating: important
References:
* bsc#1229438
Cross-References:
* CVE-2024-44070
CVSS scores:
* CVE-2024-44070 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44070 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44070 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for frr fixes the following issues:
* CVE-2024-44070: Fixed missing stream length check before TLV value is taken
in bgp_attr_encap (bsc#1229438)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3108=1 openSUSE-SLE-15.5-2024-3108=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3108=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3108=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3108=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libfrrfpm_pb0-debuginfo-8.4-150500.4.26.1
* libfrrzmq0-8.4-150500.4.26.1
* libfrrfpm_pb0-8.4-150500.4.26.1
* libmlag_pb0-8.4-150500.4.26.1
* frr-8.4-150500.4.26.1
* libfrrospfapiclient0-debuginfo-8.4-150500.4.26.1
* libfrr0-debuginfo-8.4-150500.4.26.1
* frr-devel-8.4-150500.4.26.1
* libfrrzmq0-debuginfo-8.4-150500.4.26.1
* libfrr_pb0-debuginfo-8.4-150500.4.26.1
* libfrrcares0-debuginfo-8.4-150500.4.26.1
* libmlag_pb0-debuginfo-8.4-150500.4.26.1
* libfrrsnmp0-debuginfo-8.4-150500.4.26.1
* libfrr0-8.4-150500.4.26.1
* libfrrsnmp0-8.4-150500.4.26.1
* libfrr_pb0-8.4-150500.4.26.1
* libfrrcares0-8.4-150500.4.26.1
* frr-debuginfo-8.4-150500.4.26.1
* libfrrospfapiclient0-8.4-150500.4.26.1
* frr-debugsource-8.4-150500.4.26.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libfrrfpm_pb0-debuginfo-8.4-150500.4.26.1
* libfrrzmq0-8.4-150500.4.26.1
* libfrrfpm_pb0-8.4-150500.4.26.1
* libmlag_pb0-8.4-150500.4.26.1
* frr-8.4-150500.4.26.1
* libfrrospfapiclient0-debuginfo-8.4-150500.4.26.1
* libfrr0-debuginfo-8.4-150500.4.26.1
* frr-devel-8.4-150500.4.26.1
* libfrrzmq0-debuginfo-8.4-150500.4.26.1
* libfrr_pb0-debuginfo-8.4-150500.4.26.1
* libfrrcares0-debuginfo-8.4-150500.4.26.1
* libmlag_pb0-debuginfo-8.4-150500.4.26.1
* libfrrsnmp0-debuginfo-8.4-150500.4.26.1
* libfrr0-8.4-150500.4.26.1
* libfrrsnmp0-8.4-150500.4.26.1
* libfrr_pb0-8.4-150500.4.26.1
* libfrrcares0-8.4-150500.4.26.1
* frr-debuginfo-8.4-150500.4.26.1
* libfrrospfapiclient0-8.4-150500.4.26.1
* frr-debugsource-8.4-150500.4.26.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libfrrfpm_pb0-debuginfo-8.4-150500.4.26.1
* libfrrzmq0-8.4-150500.4.26.1
* libfrrfpm_pb0-8.4-150500.4.26.1
* libmlag_pb0-8.4-150500.4.26.1
* frr-8.4-150500.4.26.1
* libfrrospfapiclient0-debuginfo-8.4-150500.4.26.1
* libfrr0-debuginfo-8.4-150500.4.26.1
* frr-devel-8.4-150500.4.26.1
* libfrrzmq0-debuginfo-8.4-150500.4.26.1
* libfrr_pb0-debuginfo-8.4-150500.4.26.1
* libfrrcares0-debuginfo-8.4-150500.4.26.1
* libmlag_pb0-debuginfo-8.4-150500.4.26.1
* libfrrsnmp0-debuginfo-8.4-150500.4.26.1
* libfrr0-8.4-150500.4.26.1
* libfrrsnmp0-8.4-150500.4.26.1
* libfrr_pb0-8.4-150500.4.26.1
* libfrrcares0-8.4-150500.4.26.1
* frr-debuginfo-8.4-150500.4.26.1
* libfrrospfapiclient0-8.4-150500.4.26.1
* frr-debugsource-8.4-150500.4.26.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libfrrfpm_pb0-debuginfo-8.4-150500.4.26.1
* libfrrzmq0-8.4-150500.4.26.1
* libfrrfpm_pb0-8.4-150500.4.26.1
* libmlag_pb0-8.4-150500.4.26.1
* frr-8.4-150500.4.26.1
* libfrrospfapiclient0-debuginfo-8.4-150500.4.26.1
* libfrr0-debuginfo-8.4-150500.4.26.1
* frr-devel-8.4-150500.4.26.1
* libfrrzmq0-debuginfo-8.4-150500.4.26.1
* libfrr_pb0-debuginfo-8.4-150500.4.26.1
* libfrrcares0-debuginfo-8.4-150500.4.26.1
* libmlag_pb0-debuginfo-8.4-150500.4.26.1
* libfrrsnmp0-debuginfo-8.4-150500.4.26.1
* libfrr0-8.4-150500.4.26.1
* libfrrsnmp0-8.4-150500.4.26.1
* libfrr_pb0-8.4-150500.4.26.1
* libfrrcares0-8.4-150500.4.26.1
* frr-debuginfo-8.4-150500.4.26.1
* libfrrospfapiclient0-8.4-150500.4.26.1
* frr-debugsource-8.4-150500.4.26.1
## References:
* https://www.suse.com/security/cve/CVE-2024-44070.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229438
1
0
03 Sep '24
# Security update for webkit2gtk3
Announcement ID: SUSE-SU-2024:3109-1
Rating: important
References:
* bsc#1228696
* bsc#1228697
* bsc#1228698
Cross-References:
* CVE-2024-40776
* CVE-2024-40779
* CVE-2024-40780
* CVE-2024-40782
* CVE-2024-40785
* CVE-2024-40789
* CVE-2024-40794
* CVE-2024-4558
CVSS scores:
* CVE-2024-40776 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-40776 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
* CVE-2024-40776 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-40779 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40780 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40780 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40782 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40785 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-40789 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40789 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-40794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40794 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for webkit2gtk3 fixes the following issues:
Update to version 2.44.3 (bsc#1228696 bsc#1228697 bsc#1228698):
* Fix web process cache suspend/resume when sandbox is enabled.
* Fix accelerated images dissapearing after scrolling.
* Fix video flickering with DMA-BUF sink.
* Fix pointer lock on X11.
* Fix movement delta on mouse events in GTK3.
* Undeprecate console message API and make it available in 2022 API.
* Fix several crashes and rendering issues.
* Security fixes: CVE-2024-40776, CVE-2024-40779, CVE-2024-40780,
CVE-2024-40782, CVE-2024-40785, CVE-2024-40789, CVE-2024-40794,
CVE-2024-4558.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3109=1 openSUSE-SLE-15.6-2024-3109=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3109=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3109=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3109=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150600.12.9.1
* WebKitGTK-4.0-lang-2.44.3-150600.12.9.1
* WebKitGTK-4.1-lang-2.44.3-150600.12.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-WebKit2-4_0-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_1-0-2.44.3-150600.12.9.1
* webkit2gtk4-minibrowser-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-2.44.3-150600.12.9.1
* webkit2gtk3-soup2-devel-2.44.3-150600.12.9.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150600.12.9.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk3-soup2-minibrowser-debuginfo-2.44.3-150600.12.9.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk3-soup2-debugsource-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150600.12.9.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150600.12.9.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk4-devel-2.44.3-150600.12.9.1
* webkitgtk-6_0-injected-bundles-2.44.3-150600.12.9.1
* webkit2gtk3-soup2-minibrowser-2.44.3-150600.12.9.1
* typelib-1_0-WebKit-6_0-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150600.12.9.1
* webkit-jsc-6.0-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk4-debugsource-2.44.3-150600.12.9.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk3-debugsource-2.44.3-150600.12.9.1
* webkit2gtk3-minibrowser-2.44.3-150600.12.9.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150600.12.9.1
* webkit2gtk3-devel-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-2.44.3-150600.12.9.1
* webkit2gtk4-minibrowser-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150600.12.9.1
* webkit-jsc-4-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2-4_1-2.44.3-150600.12.9.1
* libwebkitgtk-6_0-4-2.44.3-150600.12.9.1
* libjavascriptcoregtk-6_0-1-2.44.3-150600.12.9.1
* webkit-jsc-4.1-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150600.12.9.1
* typelib-1_0-JavaScriptCore-6_0-2.44.3-150600.12.9.1
* webkit-jsc-6.0-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150600.12.9.1
* webkit-jsc-4.1-2.44.3-150600.12.9.1
* webkit2gtk3-minibrowser-debuginfo-2.44.3-150600.12.9.1
* webkit-jsc-4-2.44.3-150600.12.9.1
* openSUSE Leap 15.6 (x86_64)
* libjavascriptcoregtk-4_1-0-32bit-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-32bit-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-32bit-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-32bit-2.44.3-150600.12.9.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_1-0-64bit-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-64bit-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-64bit-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-64bit-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.44.3-150600.12.9.1
* Basesystem Module 15-SP6 (noarch)
* WebKitGTK-6.0-lang-2.44.3-150600.12.9.1
* WebKitGTK-4.0-lang-2.44.3-150600.12.9.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libjavascriptcoregtk-6_0-1-2.44.3-150600.12.9.1
* libjavascriptcoregtk-6_0-1-debuginfo-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2-4_0-2.44.3-150600.12.9.1
* webkit2gtk4-debugsource-2.44.3-150600.12.9.1
* libwebkitgtk-6_0-4-debuginfo-2.44.3-150600.12.9.1
* webkitgtk-6_0-injected-bundles-debuginfo-2.44.3-150600.12.9.1
* libwebkitgtk-6_0-4-2.44.3-150600.12.9.1
* webkit2gtk-4_0-injected-bundles-2.44.3-150600.12.9.1
* webkit2gtk3-soup2-debugsource-2.44.3-150600.12.9.1
* libwebkit2gtk-4_0-37-2.44.3-150600.12.9.1
* webkit2gtk3-soup2-devel-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150600.12.9.1
* typelib-1_0-JavaScriptCore-4_0-2.44.3-150600.12.9.1
* webkit2gtk-4_0-injected-bundles-debuginfo-2.44.3-150600.12.9.1
* webkitgtk-6_0-injected-bundles-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_0-18-2.44.3-150600.12.9.1
* Desktop Applications Module 15-SP6 (noarch)
* WebKitGTK-4.1-lang-2.44.3-150600.12.9.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libjavascriptcoregtk-4_1-0-2.44.3-150600.12.9.1
* webkit2gtk-4_1-injected-bundles-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk3-debugsource-2.44.3-150600.12.9.1
* typelib-1_0-JavaScriptCore-4_1-2.44.3-150600.12.9.1
* libjavascriptcoregtk-4_1-0-debuginfo-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-2.44.3-150600.12.9.1
* webkit2gtk3-devel-2.44.3-150600.12.9.1
* libwebkit2gtk-4_1-0-debuginfo-2.44.3-150600.12.9.1
* webkit2gtk-4_1-injected-bundles-2.44.3-150600.12.9.1
* typelib-1_0-WebKit2-4_1-2.44.3-150600.12.9.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* typelib-1_0-WebKit-6_0-2.44.3-150600.12.9.1
* webkit2gtk4-debugsource-2.44.3-150600.12.9.1
* typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150600.12.9.1
* typelib-1_0-JavaScriptCore-6_0-2.44.3-150600.12.9.1
* webkit2gtk4-devel-2.44.3-150600.12.9.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40776.html
* https://www.suse.com/security/cve/CVE-2024-40779.html
* https://www.suse.com/security/cve/CVE-2024-40780.html
* https://www.suse.com/security/cve/CVE-2024-40782.html
* https://www.suse.com/security/cve/CVE-2024-40785.html
* https://www.suse.com/security/cve/CVE-2024-40789.html
* https://www.suse.com/security/cve/CVE-2024-40794.html
* https://www.suse.com/security/cve/CVE-2024-4558.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228696
* https://bugzilla.suse.com/show_bug.cgi?id=1228697
* https://bugzilla.suse.com/show_bug.cgi?id=1228698
1
0
03 Sep '24
# Security update for python-aiohttp
Announcement ID: SUSE-SU-2024:3110-1
Rating: moderate
References:
* bsc#1229226
Cross-References:
* CVE-2024-42367
CVSS scores:
* CVE-2024-42367 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42367 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP5
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for python-aiohttp fixes the following issues:
* CVE-2024-42367: Fixed path traversal outside the root directory when
requests involve compressed files as symbolic links (bsc#1229226)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3110=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3110=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3110=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3110=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-3110=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3110=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python-aiohttp-debugsource-3.9.3-150400.10.24.1
* python311-aiohttp-3.9.3-150400.10.24.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.24.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.24.1
* python311-aiohttp-3.9.3-150400.10.24.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.24.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.24.1
* python311-aiohttp-3.9.3-150400.10.24.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.24.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-aiohttp-3.9.3-150400.10.24.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.24.1
* python311-aiohttp-3.9.3-150400.10.24.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.24.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python-aiohttp-debugsource-3.9.3-150400.10.24.1
* python311-aiohttp-3.9.3-150400.10.24.1
* python311-aiohttp-debuginfo-3.9.3-150400.10.24.1
## References:
* https://www.suse.com/security/cve/CVE-2024-42367.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229226
1
0
# Security update for unbound
Announcement ID: SUSE-SU-2024:3111-1
Rating: low
References:
* bsc#1229068
Cross-References:
* CVE-2024-43167
CVSS scores:
* CVE-2024-43167 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43167 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for unbound fixes the following issues:
* CVE-2024-43167: Fix null pointer dereference issue in function
ub_ctx_set_fwd (bsc#1229068)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3111=1 openSUSE-SLE-15.6-2024-3111=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3111=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3111=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libunbound8-debuginfo-1.20.0-150600.23.6.1
* libunbound-devel-mini-debugsource-1.20.0-150600.23.6.1
* unbound-python-debuginfo-1.20.0-150600.23.6.1
* libunbound8-1.20.0-150600.23.6.1
* unbound-anchor-debuginfo-1.20.0-150600.23.6.1
* unbound-python-1.20.0-150600.23.6.1
* libunbound-devel-mini-debuginfo-1.20.0-150600.23.6.1
* unbound-debuginfo-1.20.0-150600.23.6.1
* unbound-devel-1.20.0-150600.23.6.1
* unbound-anchor-1.20.0-150600.23.6.1
* unbound-1.20.0-150600.23.6.1
* libunbound-devel-mini-1.20.0-150600.23.6.1
* unbound-debugsource-1.20.0-150600.23.6.1
* openSUSE Leap 15.6 (noarch)
* unbound-munin-1.20.0-150600.23.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libunbound8-debuginfo-1.20.0-150600.23.6.1
* unbound-anchor-debuginfo-1.20.0-150600.23.6.1
* libunbound8-1.20.0-150600.23.6.1
* unbound-debuginfo-1.20.0-150600.23.6.1
* unbound-devel-1.20.0-150600.23.6.1
* unbound-anchor-1.20.0-150600.23.6.1
* unbound-debugsource-1.20.0-150600.23.6.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* unbound-python-debuginfo-1.20.0-150600.23.6.1
* unbound-python-1.20.0-150600.23.6.1
* unbound-debuginfo-1.20.0-150600.23.6.1
* unbound-1.20.0-150600.23.6.1
* unbound-debugsource-1.20.0-150600.23.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-43167.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229068
1
0
SUSE-SU-2024:3112-1: important: Security update for MozillaThunderbird
by OPENSUSE-UPDATES 03 Sep '24
by OPENSUSE-UPDATES 03 Sep '24
03 Sep '24
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2024:3112-1
Rating: important
References:
* bsc#1228648
Cross-References:
* CVE-2024-7519
* CVE-2024-7521
* CVE-2024-7522
* CVE-2024-7525
* CVE-2024-7526
* CVE-2024-7527
* CVE-2024-7529
CVSS scores:
* CVE-2024-7519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7519 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-7521 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7521 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7522 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2024-7522 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7525 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7525 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-7526 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2024-7526 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2024-7527 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7527 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7529 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-7529 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
* Mozilla Thunderbird 115.14
* fixed: When using an external installation of GnuPG, Thunderbird
occassionally sent/received corrupted messages
* fixed: Users of external GnuPG were unable to decrypt incorrectly encoded
messages (bmo#1906903)
* fixed: Flatpak install of 128.0esr was incorrectly downgraded to 115.13.0esr
(bmo#1908299)
* fixed: Security fixes MFSA 2024-38 (bsc#1228648)
* CVE-2024-7519: Out of bounds memory access in graphics shared memory
handling
* CVE-2024-7521: Incomplete WebAssembly exception handing
* CVE-2024-7522: Out of bounds read in editor component
* CVE-2024-7525: Missing permission check when creating a StreamFilter
* CVE-2024-7526: Uninitialized memory used by WebGL
* CVE-2024-7527: Use-after-free in JavaScript garbage collection
* CVE-2024-7529: Document content could partially obscure security prompts
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3112=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3112=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3112=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3112=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3112=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3112=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3112=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-other-115.14.0-150200.8.174.1
* MozillaThunderbird-translations-common-115.14.0-150200.8.174.1
* MozillaThunderbird-debugsource-115.14.0-150200.8.174.1
* MozillaThunderbird-debuginfo-115.14.0-150200.8.174.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7519.html
* https://www.suse.com/security/cve/CVE-2024-7521.html
* https://www.suse.com/security/cve/CVE-2024-7522.html
* https://www.suse.com/security/cve/CVE-2024-7525.html
* https://www.suse.com/security/cve/CVE-2024-7526.html
* https://www.suse.com/security/cve/CVE-2024-7527.html
* https://www.suse.com/security/cve/CVE-2024-7529.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228648
1
0
# Security update for xen
Announcement ID: SUSE-SU-2024:3113-1
Rating: important
References:
* bsc#1027519
* bsc#1228574
* bsc#1228575
Cross-References:
* CVE-2024-31145
* CVE-2024-31146
CVSS scores:
* CVE-2024-31145 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-31146 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xen fixes the following issues:
* CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460,
bsc#1228574)
* CVE-2024-31146: Fixed PCI device pass-through with shared resources
(XSA-461, bsc#1228575)
Other fixes: \- Update to Xen 4.18.3 security bug fix release (bsc#1027519)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3113=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3113=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3113=1 openSUSE-SLE-15.6-2024-3113=1
## Package List:
* Basesystem Module 15-SP6 (x86_64)
* xen-tools-domU-4.18.3_02-150600.3.6.1
* xen-libs-debuginfo-4.18.3_02-150600.3.6.1
* xen-libs-4.18.3_02-150600.3.6.1
* xen-tools-domU-debuginfo-4.18.3_02-150600.3.6.1
* xen-debugsource-4.18.3_02-150600.3.6.1
* Server Applications Module 15-SP6 (x86_64)
* xen-4.18.3_02-150600.3.6.1
* xen-tools-debuginfo-4.18.3_02-150600.3.6.1
* xen-tools-4.18.3_02-150600.3.6.1
* xen-devel-4.18.3_02-150600.3.6.1
* xen-debugsource-4.18.3_02-150600.3.6.1
* Server Applications Module 15-SP6 (noarch)
* xen-tools-xendomains-wait-disk-4.18.3_02-150600.3.6.1
* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* xen-tools-domU-4.18.3_02-150600.3.6.1
* xen-libs-debuginfo-4.18.3_02-150600.3.6.1
* xen-libs-4.18.3_02-150600.3.6.1
* xen-tools-domU-debuginfo-4.18.3_02-150600.3.6.1
* xen-devel-4.18.3_02-150600.3.6.1
* xen-debugsource-4.18.3_02-150600.3.6.1
* openSUSE Leap 15.6 (x86_64)
* xen-libs-32bit-debuginfo-4.18.3_02-150600.3.6.1
* xen-libs-32bit-4.18.3_02-150600.3.6.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* xen-4.18.3_02-150600.3.6.1
* xen-tools-debuginfo-4.18.3_02-150600.3.6.1
* xen-tools-4.18.3_02-150600.3.6.1
* xen-doc-html-4.18.3_02-150600.3.6.1
* openSUSE Leap 15.6 (noarch)
* xen-tools-xendomains-wait-disk-4.18.3_02-150600.3.6.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* xen-libs-64bit-4.18.3_02-150600.3.6.1
* xen-libs-64bit-debuginfo-4.18.3_02-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31145.html
* https://www.suse.com/security/cve/CVE-2024-31146.html
* https://bugzilla.suse.com/show_bug.cgi?id=1027519
* https://bugzilla.suse.com/show_bug.cgi?id=1228574
* https://bugzilla.suse.com/show_bug.cgi?id=1228575
1
0
# Security update for ffmpeg
Announcement ID: SUSE-SU-2024:3114-1
Rating: moderate
References:
* bsc#1186607
* bsc#1189428
* bsc#1223304
Cross-References:
* CVE-2020-22027
* CVE-2021-38291
* CVE-2023-51798
CVSS scores:
* CVE-2020-22027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2020-22027 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2021-38291 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2021-38291 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-51798 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for ffmpeg fixes the following issues:
* CVE-2020-22027: Fixed heap-based Buffer Overflow vulnerability exits in
deflate16 at libavfilter/vf_neighbor.c (bsc#1186607)
* CVE-2021-38291: Fixed an assertion failure at src/libavutil/mathematics.c
(bsc#1189428)
* CVE-2023-51798: Fixed floating point exception(FPE) via the interpolate
function (bsc#1223304)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3114=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3114=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3114=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3114=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3114=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3114=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3114=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3114=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libavcodec57-3.4.2-150200.11.57.1
* libswscale-devel-3.4.2-150200.11.57.1
* libavformat-devel-3.4.2-150200.11.57.1
* libavcodec-devel-3.4.2-150200.11.57.1
* ffmpeg-private-devel-3.4.2-150200.11.57.1
* libswresample2-debuginfo-3.4.2-150200.11.57.1
* libpostproc54-3.4.2-150200.11.57.1
* libavresample3-3.4.2-150200.11.57.1
* libavformat57-debuginfo-3.4.2-150200.11.57.1
* libavformat57-3.4.2-150200.11.57.1
* libavfilter6-3.4.2-150200.11.57.1
* libswresample2-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* libavutil-devel-3.4.2-150200.11.57.1
* libavcodec57-debuginfo-3.4.2-150200.11.57.1
* libavdevice57-debuginfo-3.4.2-150200.11.57.1
* libavresample-devel-3.4.2-150200.11.57.1
* libpostproc54-debuginfo-3.4.2-150200.11.57.1
* libavdevice57-3.4.2-150200.11.57.1
* libavresample3-debuginfo-3.4.2-150200.11.57.1
* libpostproc-devel-3.4.2-150200.11.57.1
* libswresample-devel-3.4.2-150200.11.57.1
* libavdevice-devel-3.4.2-150200.11.57.1
* libavutil55-debuginfo-3.4.2-150200.11.57.1
* libswscale4-3.4.2-150200.11.57.1
* libavfilter-devel-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-3.4.2-150200.11.57.1
* libavfilter6-debuginfo-3.4.2-150200.11.57.1
* libavutil55-3.4.2-150200.11.57.1
* libswscale4-debuginfo-3.4.2-150200.11.57.1
* openSUSE Leap 15.5 (x86_64)
* libavformat57-32bit-debuginfo-3.4.2-150200.11.57.1
* libavresample3-32bit-debuginfo-3.4.2-150200.11.57.1
* libswscale4-32bit-3.4.2-150200.11.57.1
* libpostproc54-32bit-3.4.2-150200.11.57.1
* libavcodec57-32bit-debuginfo-3.4.2-150200.11.57.1
* libavfilter6-32bit-debuginfo-3.4.2-150200.11.57.1
* libswresample2-32bit-debuginfo-3.4.2-150200.11.57.1
* libavutil55-32bit-debuginfo-3.4.2-150200.11.57.1
* libswresample2-32bit-3.4.2-150200.11.57.1
* libpostproc54-32bit-debuginfo-3.4.2-150200.11.57.1
* libavdevice57-32bit-3.4.2-150200.11.57.1
* libavutil55-32bit-3.4.2-150200.11.57.1
* libavcodec57-32bit-3.4.2-150200.11.57.1
* libavresample3-32bit-3.4.2-150200.11.57.1
* libavfilter6-32bit-3.4.2-150200.11.57.1
* libavdevice57-32bit-debuginfo-3.4.2-150200.11.57.1
* libavformat57-32bit-3.4.2-150200.11.57.1
* libswscale4-32bit-debuginfo-3.4.2-150200.11.57.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libavcodec57-3.4.2-150200.11.57.1
* libswscale-devel-3.4.2-150200.11.57.1
* libavformat-devel-3.4.2-150200.11.57.1
* libavcodec-devel-3.4.2-150200.11.57.1
* ffmpeg-private-devel-3.4.2-150200.11.57.1
* libswresample2-debuginfo-3.4.2-150200.11.57.1
* libpostproc54-3.4.2-150200.11.57.1
* libavresample3-3.4.2-150200.11.57.1
* libavformat57-debuginfo-3.4.2-150200.11.57.1
* libavformat57-3.4.2-150200.11.57.1
* libavfilter6-3.4.2-150200.11.57.1
* libswresample2-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* libavutil-devel-3.4.2-150200.11.57.1
* libavcodec57-debuginfo-3.4.2-150200.11.57.1
* libavdevice57-debuginfo-3.4.2-150200.11.57.1
* libavresample-devel-3.4.2-150200.11.57.1
* libpostproc54-debuginfo-3.4.2-150200.11.57.1
* libavdevice57-3.4.2-150200.11.57.1
* libavresample3-debuginfo-3.4.2-150200.11.57.1
* libpostproc-devel-3.4.2-150200.11.57.1
* libswresample-devel-3.4.2-150200.11.57.1
* libavdevice-devel-3.4.2-150200.11.57.1
* libavutil55-debuginfo-3.4.2-150200.11.57.1
* libswscale4-3.4.2-150200.11.57.1
* libavfilter-devel-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-3.4.2-150200.11.57.1
* libavfilter6-debuginfo-3.4.2-150200.11.57.1
* libavutil55-3.4.2-150200.11.57.1
* libswscale4-debuginfo-3.4.2-150200.11.57.1
* openSUSE Leap 15.6 (x86_64)
* libavformat57-32bit-debuginfo-3.4.2-150200.11.57.1
* libavresample3-32bit-debuginfo-3.4.2-150200.11.57.1
* libswscale4-32bit-3.4.2-150200.11.57.1
* libpostproc54-32bit-3.4.2-150200.11.57.1
* libavcodec57-32bit-debuginfo-3.4.2-150200.11.57.1
* libavfilter6-32bit-debuginfo-3.4.2-150200.11.57.1
* libswresample2-32bit-debuginfo-3.4.2-150200.11.57.1
* libavutil55-32bit-debuginfo-3.4.2-150200.11.57.1
* libswresample2-32bit-3.4.2-150200.11.57.1
* libpostproc54-32bit-debuginfo-3.4.2-150200.11.57.1
* libavdevice57-32bit-3.4.2-150200.11.57.1
* libavutil55-32bit-3.4.2-150200.11.57.1
* libavcodec57-32bit-3.4.2-150200.11.57.1
* libavresample3-32bit-3.4.2-150200.11.57.1
* libavfilter6-32bit-3.4.2-150200.11.57.1
* libavdevice57-32bit-debuginfo-3.4.2-150200.11.57.1
* libavformat57-32bit-3.4.2-150200.11.57.1
* libswscale4-32bit-debuginfo-3.4.2-150200.11.57.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libavcodec57-3.4.2-150200.11.57.1
* libavcodec57-debuginfo-3.4.2-150200.11.57.1
* libswscale-devel-3.4.2-150200.11.57.1
* libavutil55-debuginfo-3.4.2-150200.11.57.1
* libswscale4-debuginfo-3.4.2-150200.11.57.1
* libswresample2-3.4.2-150200.11.57.1
* libswscale4-3.4.2-150200.11.57.1
* libpostproc54-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* libswresample2-debuginfo-3.4.2-150200.11.57.1
* libpostproc-devel-3.4.2-150200.11.57.1
* libpostproc54-3.4.2-150200.11.57.1
* libavutil55-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* libavutil-devel-3.4.2-150200.11.57.1
* libswresample-devel-3.4.2-150200.11.57.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libavcodec57-3.4.2-150200.11.57.1
* libavcodec57-debuginfo-3.4.2-150200.11.57.1
* libswscale-devel-3.4.2-150200.11.57.1
* libavutil55-debuginfo-3.4.2-150200.11.57.1
* libswscale4-debuginfo-3.4.2-150200.11.57.1
* libswresample2-3.4.2-150200.11.57.1
* libswscale4-3.4.2-150200.11.57.1
* libpostproc54-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* libswresample2-debuginfo-3.4.2-150200.11.57.1
* libpostproc-devel-3.4.2-150200.11.57.1
* libpostproc54-3.4.2-150200.11.57.1
* libavutil55-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* libavutil-devel-3.4.2-150200.11.57.1
* libswresample-devel-3.4.2-150200.11.57.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libavformat57-debuginfo-3.4.2-150200.11.57.1
* libavformat57-3.4.2-150200.11.57.1
* libavfilter6-3.4.2-150200.11.57.1
* libavdevice57-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-3.4.2-150200.11.57.1
* libavdevice57-3.4.2-150200.11.57.1
* libavresample3-debuginfo-3.4.2-150200.11.57.1
* libavfilter6-debuginfo-3.4.2-150200.11.57.1
* libavresample3-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libavformat57-debuginfo-3.4.2-150200.11.57.1
* libavformat57-3.4.2-150200.11.57.1
* libavfilter6-3.4.2-150200.11.57.1
* libavdevice57-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* ffmpeg-3.4.2-150200.11.57.1
* libavdevice57-3.4.2-150200.11.57.1
* libavresample3-debuginfo-3.4.2-150200.11.57.1
* libavfilter6-debuginfo-3.4.2-150200.11.57.1
* libavresample3-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* libavformat57-debuginfo-3.4.2-150200.11.57.1
* libavformat57-3.4.2-150200.11.57.1
* libavformat-devel-3.4.2-150200.11.57.1
* libavresample-devel-3.4.2-150200.11.57.1
* libavcodec-devel-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* libavresample3-debuginfo-3.4.2-150200.11.57.1
* libavresample3-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* libavformat57-debuginfo-3.4.2-150200.11.57.1
* libavformat57-3.4.2-150200.11.57.1
* libavformat-devel-3.4.2-150200.11.57.1
* libavresample-devel-3.4.2-150200.11.57.1
* libavcodec-devel-3.4.2-150200.11.57.1
* ffmpeg-debuginfo-3.4.2-150200.11.57.1
* libavresample3-debuginfo-3.4.2-150200.11.57.1
* libavresample3-3.4.2-150200.11.57.1
* ffmpeg-debugsource-3.4.2-150200.11.57.1
## References:
* https://www.suse.com/security/cve/CVE-2020-22027.html
* https://www.suse.com/security/cve/CVE-2021-38291.html
* https://www.suse.com/security/cve/CVE-2023-51798.html
* https://bugzilla.suse.com/show_bug.cgi?id=1186607
* https://bugzilla.suse.com/show_bug.cgi?id=1189428
* https://bugzilla.suse.com/show_bug.cgi?id=1223304
1
0
# Security update for tiff
Announcement ID: SUSE-SU-2024:3115-1
Rating: moderate
References:
* bsc#1228924
Cross-References:
* CVE-2024-7006
CVSS scores:
* CVE-2024-7006 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for tiff fixes the following issues:
* CVE-2024-7006: Fixed null pointer dereference in tif_dirinfo.c (bsc#1228924)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3115=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3115=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3115=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3115=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3115=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3115=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3115=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3115=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3115=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3115=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3115=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3115=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* openSUSE Leap 15.5 (x86_64)
* libtiff-devel-32bit-4.0.9-150000.45.47.1
* libtiff5-32bit-debuginfo-4.0.9-150000.45.47.1
* libtiff5-32bit-4.0.9-150000.45.47.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* tiff-debuginfo-4.0.9-150000.45.47.1
* libtiff-devel-4.0.9-150000.45.47.1
* tiff-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* tiff-debuginfo-4.0.9-150000.45.47.1
* libtiff-devel-4.0.9-150000.45.47.1
* Basesystem Module 15-SP5 (x86_64)
* libtiff5-32bit-debuginfo-4.0.9-150000.45.47.1
* libtiff5-32bit-4.0.9-150000.45.47.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* Basesystem Module 15-SP6 (x86_64)
* libtiff5-32bit-debuginfo-4.0.9-150000.45.47.1
* libtiff5-32bit-4.0.9-150000.45.47.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* tiff-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* tiff-debuginfo-4.0.9-150000.45.47.1
* tiff-debugsource-4.0.9-150000.45.47.1
* libtiff5-debuginfo-4.0.9-150000.45.47.1
* libtiff5-4.0.9-150000.45.47.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7006.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228924
1
0
03 Sep '24
# Security update for python-WebOb
Announcement ID: SUSE-SU-2024:3116-1
Rating: moderate
References:
* bsc#1229221
Cross-References:
* CVE-2024-42353
CVSS scores:
* CVE-2024-42353 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-42353 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-WebOb fixes the following issues:
* CVE-2024-42353: Fixed open redirect via WebOb's Response object in Location
header (bsc#1229221)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3116=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3116=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3116=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3116=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3116=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* python-WebOb-doc-1.7.4-150000.3.3.1
* python3-WebOb-1.7.4-150000.3.3.1
* Basesystem Module 15-SP5 (noarch)
* python3-WebOb-1.7.4-150000.3.3.1
* Basesystem Module 15-SP6 (noarch)
* python3-WebOb-1.7.4-150000.3.3.1
* SUSE Package Hub 15 15-SP5 (noarch)
* python2-WebOb-1.7.4-150000.3.3.1
* SUSE Package Hub 15 15-SP6 (noarch)
* python2-WebOb-1.7.4-150000.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-42353.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229221
1
0
# Security update for tiff
Announcement ID: SUSE-SU-2024:3117-1
Rating: moderate
References:
* bsc#1228924
Cross-References:
* CVE-2024-7006
CVSS scores:
* CVE-2024-7006 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-7006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for tiff fixes the following issues:
* CVE-2024-7006: Fixed null pointer dereference in tif_dirinfo.c (bsc#1228924)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3117=1 openSUSE-SLE-15.6-2024-3117=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3117=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3117=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* libtiff-devel-32bit-4.6.0-150600.3.3.1
* libtiff6-32bit-4.6.0-150600.3.3.1
* libtiff6-32bit-debuginfo-4.6.0-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libtiff-devel-4.6.0-150600.3.3.1
* libtiff6-4.6.0-150600.3.3.1
* tiff-4.6.0-150600.3.3.1
* tiff-debuginfo-4.6.0-150600.3.3.1
* libtiff6-debuginfo-4.6.0-150600.3.3.1
* tiff-debugsource-4.6.0-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libtiff-devel-64bit-4.6.0-150600.3.3.1
* libtiff6-64bit-4.6.0-150600.3.3.1
* libtiff6-64bit-debuginfo-4.6.0-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libtiff-devel-4.6.0-150600.3.3.1
* libtiff6-4.6.0-150600.3.3.1
* tiff-debuginfo-4.6.0-150600.3.3.1
* libtiff6-debuginfo-4.6.0-150600.3.3.1
* tiff-debugsource-4.6.0-150600.3.3.1
* Basesystem Module 15-SP6 (x86_64)
* libtiff6-32bit-4.6.0-150600.3.3.1
* libtiff6-32bit-debuginfo-4.6.0-150600.3.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* tiff-debugsource-4.6.0-150600.3.3.1
* tiff-4.6.0-150600.3.3.1
* tiff-debuginfo-4.6.0-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7006.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228924
1
0
03 Sep '24
# Security update for dovecot23
Announcement ID: SUSE-SU-2024:3118-1
Rating: important
References:
* bsc#1229183
* bsc#1229184
Cross-References:
* CVE-2024-23184
* CVE-2024-23185
CVSS scores:
* CVE-2024-23184 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L
* CVE-2024-23184 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
* CVE-2024-23185 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-23185 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for dovecot23 fixes the following issues:
* CVE-2024-23185: Fixed a denial of service with large headers (bsc#1229183)
* CVE-2024-23184: Fixed a denial of service parsing messages containing many
address headers (bsc#1229184)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3118=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3118=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3118=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3118=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3118=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3118=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3118=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3118=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3118=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3118=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3118=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3118=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3118=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3118=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3118=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3118=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3118=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3118=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Manager Proxy 4.3 (x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* dovecot23-fts-squat-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-solr-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-pgsql-debuginfo-2.3.15-150200.65.1
* dovecot23-fts-lucene-2.3.15-150200.65.1
* dovecot23-backend-mysql-debuginfo-2.3.15-150200.65.1
* dovecot23-devel-2.3.15-150200.65.1
* dovecot23-debuginfo-2.3.15-150200.65.1
* dovecot23-debugsource-2.3.15-150200.65.1
* dovecot23-backend-mysql-2.3.15-150200.65.1
* dovecot23-fts-squat-2.3.15-150200.65.1
* dovecot23-fts-solr-2.3.15-150200.65.1
* dovecot23-backend-sqlite-debuginfo-2.3.15-150200.65.1
* dovecot23-2.3.15-150200.65.1
* dovecot23-fts-debuginfo-2.3.15-150200.65.1
* dovecot23-backend-sqlite-2.3.15-150200.65.1
* dovecot23-backend-pgsql-2.3.15-150200.65.1
* dovecot23-fts-2.3.15-150200.65.1
## References:
* https://www.suse.com/security/cve/CVE-2024-23184.html
* https://www.suse.com/security/cve/CVE-2024-23185.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229183
* https://bugzilla.suse.com/show_bug.cgi?id=1229184
1
0
03 Sep '24
# Security update for openssl-1_0_0
Announcement ID: SUSE-SU-2024:3119-1
Rating: moderate
References:
* bsc#1227138
* bsc#1227227
Cross-References:
* CVE-2024-5535
CVSS scores:
* CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Legacy Module 15-SP5
* Legacy Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for openssl-1_0_0 fixes the following issues:
* CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto()
with an empty supported client protocols buffer (bsc#1227138, bsc#1227227)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3119=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3119=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3119=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3119=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3119=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3119=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3119=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3119=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3119=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3119=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3119=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3119=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3119=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3119=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* libopenssl1_0_0-steam-1.0.2p-150000.3.94.1
* openssl-1_0_0-cavs-1.0.2p-150000.3.94.1
* openssl-1_0_0-cavs-debuginfo-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl1_0_0-steam-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1
* libopenssl1_0_0-steam-32bit-debuginfo-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1
* libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1
* libopenssl1_0_0-32bit-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1
* openSUSE Leap 15.5 (noarch)
* openssl-1_0_0-doc-1.0.2p-150000.3.94.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* libopenssl1_0_0-steam-1.0.2p-150000.3.94.1
* openssl-1_0_0-cavs-1.0.2p-150000.3.94.1
* openssl-1_0_0-cavs-debuginfo-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl1_0_0-steam-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1
* libopenssl1_0_0-steam-32bit-debuginfo-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1
* libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1
* libopenssl1_0_0-32bit-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1
* openSUSE Leap 15.6 (noarch)
* openssl-1_0_0-doc-1.0.2p-150000.3.94.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* openssl-1_0_0-1.0.2p-150000.3.94.1
* openssl-1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1
* libopenssl1_0_0-debuginfo-1.0.2p-150000.3.94.1
* libopenssl10-1.0.2p-150000.3.94.1
* openssl-1_0_0-debugsource-1.0.2p-150000.3.94.1
* libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1
* libopenssl10-debuginfo-1.0.2p-150000.3.94.1
* libopenssl1_0_0-1.0.2p-150000.3.94.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5535.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227138
* https://bugzilla.suse.com/show_bug.cgi?id=1227227
1
0
03 Sep '24
# Security update for buildah, docker
Announcement ID: SUSE-SU-2024:3120-1
Rating: critical
References:
* bsc#1214855
* bsc#1219267
* bsc#1219268
* bsc#1219438
* bsc#1221243
* bsc#1221677
* bsc#1221916
* bsc#1223409
* bsc#1224117
* bsc#1228324
Cross-References:
* CVE-2024-1753
* CVE-2024-23651
* CVE-2024-23652
* CVE-2024-23653
* CVE-2024-24786
* CVE-2024-28180
* CVE-2024-3727
* CVE-2024-41110
CVSS scores:
* CVE-2024-1753 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-24786 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3727 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves eight vulnerabilities and has two security fixes can now
be installed.
## Description:
This update for buildah, docker fixes the following issues:
Changes in docker: \- CVE-2024-23651: Fixed arbitrary files write due to race
condition on mounts (bsc#1219267) \- CVE-2024-23652: Fixed insufficient
validation of parent directory on mount (bsc#1219268) \- CVE-2024-23653: Fixed
insufficient validation on entitlement on container creation via buildkit
(bsc#1219438) \- CVE-2024-41110: A Authz zero length regression that could lead
to authentication bypass was fixed (bsc#1228324)
Other fixes:
* Update to Docker 25.0.6-ce. See upstream changelog online at
<https://docs.docker.com/engine/release-notes/25.0/#2506>
* Update to Docker 25.0.5-ce (bsc#1223409)
* Fix BuildKit's symlink resolution logic to correctly handle non-lexical
symlinks. (bsc#1221916)
* Write volume options atomically so sudden system crashes won't result in
future Docker starts failing due to empty files. (bsc#1214855)
Changes in buildah: \- Update to version 1.35.4: * [release-1.35] Bump to
Buildah v1.35.4 * [release-1.35] CVE-2024-3727 updates (bsc#1224117) *
integration test: handle new labels in "bud and test --unsetlabel" *
[release-1.35] Bump go-jose CVE-2024-28180 * [release-1.35] Bump ocicrypt and
go-jose CVE-2024-28180
* Update to version 1.35.3:
* [release-1.35] Bump to Buildah v1.35.3
* [release-1.35] correctly configure /etc/hosts and resolv.conf
* [release-1.35] buildah: refactor resolv/hosts setup.
* [release-1.35] rename the hostFile var to reflect
* [release-1.35] Bump c/common to v0.58.1
* [release-1.35] Bump Buildah to v1.35.2
* [release-1.35] CVE-2024-24786 protobuf to 1.33
* [release-1.35] Bump to v1.35.2-dev
* Update to version 1.35.1:
* [release-1.35] Bump to v1.35.1
* [release-1.35] CVE-2024-1753 container escape fix (bsc#1221677)
* Buildah dropped cni support, require netavark instead (bsc#1221243)
* Remove obsolete requires libcontainers-image & libcontainers-storage
* Require passt for rootless networking (poo#156955) Buildah moved to
passt/pasta for rootless networking from slirp4netns
(https://github.com/containers/common/pull/1846)
* Update to version 1.35.0:
* Bump v1.35.0
* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* fix(deps): update module github.com/stretchr/testify to v1.9.0
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* fix(deps): update github.com/containers/storage digest to eadc620
* fix(deps): update github.com/containers/luksy digest to ceb12d4
* fix(deps): update github.com/containers/image/v5 digest to cdc6802
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
* Update module go.etcd.io/bbolt to v1.3.9
* Revert "Reduce official image size"
* Update module github.com/opencontainers/image-spec to v1.1.0
* Reduce official image size
* Build with CNI support on FreeBSD
* build --all-platforms: skip some base "image" platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Disable loong64 again
* Fix a couple of typos in one-line comments
* egrep is obsolescent; use grep -E
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* fix(deps): update module github.com/containerd/containerd to v1.7.13
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* fix(deps): update github.com/openshift/imagebuilder digest to b767bc3
* imagebuildah: fix crash with empty RUN
* fix(deps): update github.com/containers/luksy digest to b62d551
* fix(deps): update module github.com/opencontainers/runc to v1.1.12
[security]
* fix(deps): update module github.com/moby/buildkit to v0.12.5 [security]
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* Run codespell on code
* Fix FreeBSD version parsing
* Fix a build break on FreeBSD
* Remove a bad FROM line
* fix(deps): update module github.com/onsi/gomega to v1.31.1
* fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc6
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* fix(deps): update module golang.org/x/crypto to v0.18.0
* Replace map[K]bool with map[K]struct{} where it makes sense
* fix(deps): update module golang.org/x/sync to v0.6.0
* fix(deps): update module golang.org/x/term to v0.16.0
* Bump CI VMs
* Replace strings.SplitN with strings.Cut
* fix(deps): update github.com/containers/storage digest to ef81e9b
* fix(deps): update github.com/containers/image/v5 digest to 1b221d4
* fix(deps): update module github.com/fsouza/go-dockerclient to v1.10.1
* Document use of containers-transports values in buildah
* fix(deps): update module golang.org/x/crypto to v0.17.0 [security]
* chore(deps): update dependency containers/automation_images to v20231208
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* chore(deps): update dependency containers/automation_images to v20230517
* [skip-ci] Update actions/stale action to v9
* fix(deps): update module github.com/containernetworking/plugins to v1.4.0
* fix(deps): update github.com/containers/image/v5 digest to 7a40fee
* Bump to v1.34.1-dev
* Ignore errors if label.Relabel returns ENOSUP
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3120=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3120=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3120=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3120=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3120=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3120=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3120=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3120=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3120=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3120=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3120=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3120=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3120=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3120=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3120=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3120=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3120=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3120=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3120=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3120=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3120=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3120=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3120=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3120=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3120=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150300.8.25.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* openSUSE Leap 15.5 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-zsh-completion-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* docker-fish-completion-25.0.6_ce-150000.207.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* openSUSE Leap 15.6 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-zsh-completion-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* docker-fish-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* Containers Module 15-SP5 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* Containers Module 15-SP6 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* docker-25.0.6_ce-150000.207.1
* buildah-1.35.4-150300.8.25.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* docker-fish-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* docker-25.0.6_ce-150000.207.1
* buildah-1.35.4-150300.8.25.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* docker-fish-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* docker-25.0.6_ce-150000.207.1
* buildah-1.35.4-150300.8.25.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* docker-fish-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* docker-rootless-extras-25.0.6_ce-150000.207.1
* docker-bash-completion-25.0.6_ce-150000.207.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* docker-25.0.6_ce-150000.207.1
* buildah-1.35.4-150300.8.25.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Enterprise Storage 7.1 (noarch)
* docker-bash-completion-25.0.6_ce-150000.207.1
* docker-fish-completion-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* docker-25.0.6_ce-150000.207.1
* docker-debuginfo-25.0.6_ce-150000.207.1
## References:
* https://www.suse.com/security/cve/CVE-2024-1753.html
* https://www.suse.com/security/cve/CVE-2024-23651.html
* https://www.suse.com/security/cve/CVE-2024-23652.html
* https://www.suse.com/security/cve/CVE-2024-23653.html
* https://www.suse.com/security/cve/CVE-2024-24786.html
* https://www.suse.com/security/cve/CVE-2024-28180.html
* https://www.suse.com/security/cve/CVE-2024-3727.html
* https://www.suse.com/security/cve/CVE-2024-41110.html
* https://bugzilla.suse.com/show_bug.cgi?id=1214855
* https://bugzilla.suse.com/show_bug.cgi?id=1219267
* https://bugzilla.suse.com/show_bug.cgi?id=1219268
* https://bugzilla.suse.com/show_bug.cgi?id=1219438
* https://bugzilla.suse.com/show_bug.cgi?id=1221243
* https://bugzilla.suse.com/show_bug.cgi?id=1221677
* https://bugzilla.suse.com/show_bug.cgi?id=1221916
* https://bugzilla.suse.com/show_bug.cgi?id=1223409
* https://bugzilla.suse.com/show_bug.cgi?id=1224117
* https://bugzilla.suse.com/show_bug.cgi?id=1228324
1
0
03 Sep '24
# Recommended update for yast2-users
Announcement ID: SUSE-RU-2024:3121-1
Rating: moderate
References:
* bsc#1206627
* bsc#1208913
* bsc#1209377
* bsc#1211583
* bsc#1211753
* bsc#1228149
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has six fixes can now be installed.
## Description:
This update for yast2-users fixes the following issues:
* Relax check in GECOS field, allow any data except colons (bsc#1228149).
* Backport changes to avoid namespace collisions.
* Branch package for SP6 (bsc#1208913).
* YaST can no longer modify NIS users and groups (bnc#1206627).
* YaST2: Adding several users via yast fails sometimes (bnc#1209377).
* Importing user during installation can lead to password malformation
(bnc#1211583).
* YaST2 ayast_setup setup broken on SLES15-SP4 (bnc#1211753).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3121=1 openSUSE-SLE-15.6-2024-3121=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3121=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* yast2-users-debuginfo-4.6.6-150600.3.3.5
* yast2-users-4.6.6-150600.3.3.5
* yast2-users-debugsource-4.6.6-150600.3.3.5
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* yast2-users-debuginfo-4.6.6-150600.3.3.5
* yast2-users-4.6.6-150600.3.3.5
* yast2-users-debugsource-4.6.6-150600.3.3.5
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1206627
* https://bugzilla.suse.com/show_bug.cgi?id=1208913
* https://bugzilla.suse.com/show_bug.cgi?id=1209377
* https://bugzilla.suse.com/show_bug.cgi?id=1211583
* https://bugzilla.suse.com/show_bug.cgi?id=1211753
* https://bugzilla.suse.com/show_bug.cgi?id=1228149
1
0
# Recommended update for go
Announcement ID: SUSE-RU-2024:3122-1
Rating: moderate
References:
* bsc#1218424
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go fixes the following issue:
* Update to current stable go1.22 (bsc#1218424).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3122=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3122=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3122=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3122=1
## Package List:
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go-1.22-150000.3.35.4
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go-doc-1.22-150000.3.35.4
* go-race-1.22-150000.3.35.4
* go-1.22-150000.3.35.4
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go-doc-1.22-150000.3.35.4
* go-race-1.22-150000.3.35.4
* go-1.22-150000.3.35.4
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go-1.22-150000.3.35.4
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218424
1
0
03 Sep '24
# Recommended update for deltarpm
Announcement ID: SUSE-RU-2024:3123-1
Rating: moderate
References:
* bsc#1228948
* jsc#PM-3
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains one feature and has one fix can now be installed.
## Description:
This update for deltarpm fixes the following issues:
* Support for threaded zstd compression.
* use a tmp file instead of memory to hold the data (bsc#1228948).
* fixed C related bugs (incorrect sized memset(), memcpy instead of strcpy,
unsigned int).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3123=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3123=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3123=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3123=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3123=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3123=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3123=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3123=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3123=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3123=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3123=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3123=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3123=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3123=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3123=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3123=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3123=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3123=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3123=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-deltarpm-debuginfo-3.6.4-150000.5.3.2
* python3-deltarpm-3.6.4-150000.5.3.2
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-deltarpm-debuginfo-3.6.4-150000.5.3.2
* python3-deltarpm-3.6.4-150000.5.3.2
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* python2-deltarpm-3.6.4-150000.5.3.2
* deltarpm-debugsource-3.6.4-150000.5.3.2
* python2-deltarpm-debuginfo-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* python2-deltarpm-3.6.4-150000.5.3.2
* deltarpm-debugsource-3.6.4-150000.5.3.2
* python2-deltarpm-debuginfo-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* python2-deltarpm-3.6.4-150000.5.3.2
* deltarpm-debugsource-3.6.4-150000.5.3.2
* python2-deltarpm-debuginfo-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Manager Proxy 4.3 (x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* deltarpm-debugsource-3.6.4-150000.5.3.2
* deltarpm-3.6.4-150000.5.3.2
* deltarpm-debuginfo-3.6.4-150000.5.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228948
* https://jira.suse.com/browse/PM-3
1
0
03 Sep '24
# Recommended update for cryptsetup
Announcement ID: SUSE-RU-2024:3124-1
Rating: moderate
References:
* bsc#1229975
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for cryptsetup fixes the following issues:
* FIPS: Extend the password for PBKDF2 benchmarking to be more than 20 chars
to meet FIPS 140-3 requirements (bsc#1229975)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3124=1 openSUSE-SLE-15.6-2024-3124=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3124=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* cryptsetup-debuginfo-2.7.0-150600.3.3.1
* cryptsetup-ssh-debuginfo-2.7.0-150600.3.3.1
* cryptsetup-2.7.0-150600.3.3.1
* cryptsetup-ssh-2.7.0-150600.3.3.1
* libcryptsetup12-2.7.0-150600.3.3.1
* libcryptsetup-devel-2.7.0-150600.3.3.1
* cryptsetup-debugsource-2.7.0-150600.3.3.1
* libcryptsetup12-debuginfo-2.7.0-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* cryptsetup-doc-2.7.0-150600.3.3.1
* cryptsetup-lang-2.7.0-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libcryptsetup12-32bit-2.7.0-150600.3.3.1
* libcryptsetup12-32bit-debuginfo-2.7.0-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcryptsetup12-64bit-debuginfo-2.7.0-150600.3.3.1
* libcryptsetup12-64bit-2.7.0-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cryptsetup-debuginfo-2.7.0-150600.3.3.1
* cryptsetup-ssh-debuginfo-2.7.0-150600.3.3.1
* cryptsetup-2.7.0-150600.3.3.1
* cryptsetup-ssh-2.7.0-150600.3.3.1
* libcryptsetup12-2.7.0-150600.3.3.1
* libcryptsetup-devel-2.7.0-150600.3.3.1
* cryptsetup-debugsource-2.7.0-150600.3.3.1
* libcryptsetup12-debuginfo-2.7.0-150600.3.3.1
* Basesystem Module 15-SP6 (noarch)
* cryptsetup-doc-2.7.0-150600.3.3.1
* cryptsetup-lang-2.7.0-150600.3.3.1
* Basesystem Module 15-SP6 (x86_64)
* libcryptsetup12-32bit-2.7.0-150600.3.3.1
* libcryptsetup12-32bit-debuginfo-2.7.0-150600.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229975
1
0
03 Sep '24
# Recommended update for stunnel
Announcement ID: SUSE-RU-2024:3125-1
Rating: moderate
References:
* bsc#1229826
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for stunnel fixes the following issues:
* Disable use of the X25519 and X448 elliptic curves in ECDH for now, as they
are not valid in FIPS 140-3 currently (bsc#1229826)
To use them in non-FIPS mode, you can specify curves in the stunnel
configuration file.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3125=1 SUSE-2024-3125=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3125=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* stunnel-debugsource-5.70-150600.3.3.1
* stunnel-debuginfo-5.70-150600.3.3.1
* stunnel-5.70-150600.3.3.1
* openSUSE Leap 15.6 (noarch)
* stunnel-doc-5.70-150600.3.3.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* stunnel-debugsource-5.70-150600.3.3.1
* stunnel-debuginfo-5.70-150600.3.3.1
* stunnel-5.70-150600.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229826
1
0
03 Sep '24
# Recommended update for llvm17
Announcement ID: SUSE-RU-2024:3126-1
Rating: moderate
References:
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for llvm17 fixes the following issue:
* lld17 and llldb17 are shipped to PackageHub 15 SP6.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3126=1 openSUSE-SLE-15.6-2024-3126=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3126=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3126=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3126=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* llvm17-polly-17.0.6-150600.3.2.1
* libLTO17-debuginfo-17.0.6-150600.3.2.1
* clang17-17.0.6-150600.3.2.1
* libclang-cpp17-debuginfo-17.0.6-150600.3.2.1
* llvm17-gold-debuginfo-17.0.6-150600.3.2.1
* llvm17-polly-debuginfo-17.0.6-150600.3.2.1
* libLLVM17-debuginfo-17.0.6-150600.3.2.1
* clang-tools-debuginfo-17.0.6-150600.3.2.1
* libclang-cpp17-17.0.6-150600.3.2.1
* lld17-debuginfo-17.0.6-150600.3.2.1
* llvm17-polly-devel-17.0.6-150600.3.2.1
* libLLVM17-17.0.6-150600.3.2.1
* llvm17-devel-debuginfo-17.0.6-150600.3.2.1
* llvm17-gold-17.0.6-150600.3.2.1
* clang17-debuginfo-17.0.6-150600.3.2.1
* libLTO17-17.0.6-150600.3.2.1
* llvm17-devel-17.0.6-150600.3.2.1
* lld17-17.0.6-150600.3.2.1
* libclang13-debuginfo-17.0.6-150600.3.2.1
* libclang13-17.0.6-150600.3.2.1
* llvm17-17.0.6-150600.3.2.1
* clang17-devel-17.0.6-150600.3.2.1
* clang-tools-17.0.6-150600.3.2.1
* llvm17-debuginfo-17.0.6-150600.3.2.1
* openSUSE Leap 15.6 (noarch)
* python3-clang17-17.0.6-150600.3.2.1
* llvm17-doc-17.0.6-150600.3.2.1
* llvm17-vim-plugins-17.0.6-150600.3.2.1
* clang17-doc-17.0.6-150600.3.2.1
* llvm17-opt-viewer-17.0.6-150600.3.2.1
* openSUSE Leap 15.6 (x86_64)
* libLLVM17-32bit-debuginfo-17.0.6-150600.3.2.1
* libclang-cpp17-32bit-17.0.6-150600.3.2.1
* libclang-cpp17-32bit-debuginfo-17.0.6-150600.3.2.1
* libLLVM17-32bit-17.0.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64 i586)
* libomp17-devel-debuginfo-17.0.6-150600.3.2.1
* libomp17-devel-17.0.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* libc++abi1-17.0.6-150600.3.2.1
* liblldb17-17.0.6-150600.3.2.1
* libc++abi-devel-17.0.6-150600.3.2.1
* libc++abi1-debuginfo-17.0.6-150600.3.2.1
* libc++1-17.0.6-150600.3.2.1
* lldb17-devel-17.0.6-150600.3.2.1
* libc++-devel-17.0.6-150600.3.2.1
* libc++1-debuginfo-17.0.6-150600.3.2.1
* lldb17-17.0.6-150600.3.2.1
* python3-lldb17-17.0.6-150600.3.2.1
* liblldb17-debuginfo-17.0.6-150600.3.2.1
* lldb17-debuginfo-17.0.6-150600.3.2.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libclang-cpp17-64bit-17.0.6-150600.3.2.1
* libLLVM17-64bit-17.0.6-150600.3.2.1
* libLLVM17-64bit-debuginfo-17.0.6-150600.3.2.1
* libclang-cpp17-64bit-debuginfo-17.0.6-150600.3.2.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libLLVM17-debuginfo-17.0.6-150600.3.2.1
* libLLVM17-17.0.6-150600.3.2.1
* llvm17-debuginfo-17.0.6-150600.3.2.1
* Basesystem Module 15-SP6 (aarch64 x86_64)
* libc++abi1-17.0.6-150600.3.2.1
* libc++abi-devel-17.0.6-150600.3.2.1
* libc++abi1-debuginfo-17.0.6-150600.3.2.1
* libc++1-17.0.6-150600.3.2.1
* libc++-devel-17.0.6-150600.3.2.1
* libc++1-debuginfo-17.0.6-150600.3.2.1
* Basesystem Module 15-SP6 (x86_64)
* libLLVM17-32bit-debuginfo-17.0.6-150600.3.2.1
* libLLVM17-32bit-17.0.6-150600.3.2.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libclang13-debuginfo-17.0.6-150600.3.2.1
* libclang13-17.0.6-150600.3.2.1
* llvm17-17.0.6-150600.3.2.1
* llvm17-polly-17.0.6-150600.3.2.1
* libLTO17-debuginfo-17.0.6-150600.3.2.1
* llvm17-devel-debuginfo-17.0.6-150600.3.2.1
* llvm17-gold-17.0.6-150600.3.2.1
* libclang-cpp17-debuginfo-17.0.6-150600.3.2.1
* llvm17-polly-devel-17.0.6-150600.3.2.1
* libclang-cpp17-17.0.6-150600.3.2.1
* libLTO17-17.0.6-150600.3.2.1
* llvm17-debuginfo-17.0.6-150600.3.2.1
* llvm17-gold-debuginfo-17.0.6-150600.3.2.1
* llvm17-polly-debuginfo-17.0.6-150600.3.2.1
* llvm17-devel-17.0.6-150600.3.2.1
* Development Tools Module 15-SP6 (aarch64 ppc64le x86_64)
* libomp17-devel-debuginfo-17.0.6-150600.3.2.1
* libomp17-devel-17.0.6-150600.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* llvm17-polly-17.0.6-150600.3.2.1
* libLTO17-debuginfo-17.0.6-150600.3.2.1
* clang17-17.0.6-150600.3.2.1
* libclang-cpp17-debuginfo-17.0.6-150600.3.2.1
* llvm17-gold-debuginfo-17.0.6-150600.3.2.1
* llvm17-polly-debuginfo-17.0.6-150600.3.2.1
* clang-tools-debuginfo-17.0.6-150600.3.2.1
* libclang-cpp17-17.0.6-150600.3.2.1
* lld17-debuginfo-17.0.6-150600.3.2.1
* llvm17-polly-devel-17.0.6-150600.3.2.1
* llvm17-devel-debuginfo-17.0.6-150600.3.2.1
* llvm17-gold-17.0.6-150600.3.2.1
* clang17-debuginfo-17.0.6-150600.3.2.1
* libLTO17-17.0.6-150600.3.2.1
* llvm17-devel-17.0.6-150600.3.2.1
* lld17-17.0.6-150600.3.2.1
* libclang13-debuginfo-17.0.6-150600.3.2.1
* libclang13-17.0.6-150600.3.2.1
* llvm17-17.0.6-150600.3.2.1
* clang17-devel-17.0.6-150600.3.2.1
* clang-tools-17.0.6-150600.3.2.1
* llvm17-debuginfo-17.0.6-150600.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 x86_64)
* liblldb17-debuginfo-17.0.6-150600.3.2.1
* lldb17-17.0.6-150600.3.2.1
* liblldb17-17.0.6-150600.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le x86_64)
* libomp17-devel-debuginfo-17.0.6-150600.3.2.1
* libomp17-devel-17.0.6-150600.3.2.1
* SUSE Package Hub 15 15-SP6 (noarch)
* llvm17-vim-plugins-17.0.6-150600.3.2.1
1
0
SUSE-RU-2024:3127-1: moderate: Recommended update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestf
by OPENSUSE-UPDATES 03 Sep '24
by OPENSUSE-UPDATES 03 Sep '24
03 Sep '24
# Recommended update for kubevirt, virt-api-container, virt-controller-
container, virt-exportproxy-container, virt-exportserver-container, virt-
handler-container, virt-launcher-container, virt-libguestf
Announcement ID: SUSE-RU-2024:3127-1
Rating: moderate
References:
Affected Products:
* Containers Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for kubevirt, virt-api-container, virt-controller-container, virt-
exportproxy-container, virt-exportserver-container, virt-handler-container,
virt-launcher-container, virt-libguestfs-tools-container, virt-operator-
container, virt-pr-helper-container fixes the following issues:
Update to version 1.3.1
* Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.3.1
* Fix DV error report via VM printable status
* Fix permission error in storage migration tests
Update to version 1.3.0
* Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.3.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3127=1 SUSE-2024-3127=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3127=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* kubevirt-manifests-1.3.1-150600.5.9.1
* kubevirt-virt-controller-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virt-exportserver-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virt-exportserver-1.3.1-150600.5.9.1
* obs-service-kubevirt_containers_meta-1.3.1-150600.5.9.1
* kubevirt-pr-helper-conf-1.3.1-150600.5.9.1
* kubevirt-virt-exportproxy-debuginfo-1.3.1-150600.5.9.1
* kubevirt-tests-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virt-controller-1.3.1-150600.5.9.1
* kubevirt-virtctl-1.3.1-150600.5.9.1
* kubevirt-virt-operator-debuginfo-1.3.1-150600.5.9.1
* kubevirt-container-disk-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virt-api-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virtctl-debuginfo-1.3.1-150600.5.9.1
* kubevirt-container-disk-1.3.1-150600.5.9.1
* kubevirt-tests-1.3.1-150600.5.9.1
* kubevirt-virt-operator-1.3.1-150600.5.9.1
* kubevirt-virt-exportproxy-1.3.1-150600.5.9.1
* kubevirt-virt-handler-1.3.1-150600.5.9.1
* kubevirt-virt-handler-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virt-api-1.3.1-150600.5.9.1
* kubevirt-virt-launcher-debuginfo-1.3.1-150600.5.9.1
* kubevirt-virt-launcher-1.3.1-150600.5.9.1
* Containers Module 15-SP6 (x86_64)
* kubevirt-virtctl-1.3.1-150600.5.9.1
* kubevirt-virtctl-debuginfo-1.3.1-150600.5.9.1
* kubevirt-manifests-1.3.1-150600.5.9.1
1
0
SUSE-RU-2024:3128-1: moderate: Recommended update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, c
by OPENSUSE-UPDATES 03 Sep '24
by OPENSUSE-UPDATES 03 Sep '24
03 Sep '24
# Recommended update for cdi-apiserver-container, cdi-cloner-container, cdi-
controller-container, cdi-importer-container, cdi-operator-container, cdi-
uploadproxy-container, cdi-uploadserver-container, c
Announcement ID: SUSE-RU-2024:3128-1
Rating: moderate
References:
Affected Products:
* Containers Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that can now be installed.
## Description:
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-
container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-
container, cdi-uploadserver-container, containerized-data-importer fixes the
following issues:
Update to version 1.60.1
* Release notes https://github.com/kubevirt/containerized-data-
importer/releases/tag/v1.60.1
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3128=1 openSUSE-SLE-15.6-2024-3128=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3128=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* containerized-data-importer-cloner-1.60.1-150600.3.9.1
* containerized-data-importer-uploadproxy-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-api-1.60.1-150600.3.9.1
* containerized-data-importer-api-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-controller-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-uploadserver-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-controller-1.60.1-150600.3.9.1
* containerized-data-importer-manifests-1.60.1-150600.3.9.1
* containerized-data-importer-uploadserver-1.60.1-150600.3.9.1
* containerized-data-importer-cloner-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-importer-1.60.1-150600.3.9.1
* containerized-data-importer-importer-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-operator-debuginfo-1.60.1-150600.3.9.1
* containerized-data-importer-operator-1.60.1-150600.3.9.1
* obs-service-cdi_containers_meta-1.60.1-150600.3.9.1
* containerized-data-importer-uploadproxy-1.60.1-150600.3.9.1
* Containers Module 15-SP6 (x86_64)
* containerized-data-importer-manifests-1.60.1-150600.3.9.1
1
0
03 Sep '24
# Recommended update for unzip
Announcement ID: SUSE-RU-2024:3129-1
Rating: moderate
References:
* bsc#1190273
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for unzip fixes the following issues:
* Add patch to fix issue with some files being incorrectly detected as
symlinks (boo#1190273)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3129=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3129=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3129=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3129=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3129=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3129=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* rcc-runtime-debuginfo-0.2.13-150000.1.3.1
* librcc-debugsource-0.2.13-150000.1.3.1
* librcc0-debuginfo-0.2.13-150000.1.3.1
* librcd-devel-0.1.14-150000.1.3.1
* rcc-runtime-0.2.13-150000.1.3.1
* unzip-6.00-150000.4.14.1
* librcd-debugsource-0.1.14-150000.1.3.1
* librcc-devel-0.2.13-150000.1.3.1
* librcc0-0.2.13-150000.1.3.1
* unzip-debugsource-6.00-150000.4.14.1
* unzip-debuginfo-6.00-150000.4.14.1
* librcd0-debuginfo-0.1.14-150000.1.3.1
* librcd0-0.1.14-150000.1.3.1
* openSUSE Leap 15.5 (x86_64)
* librcc0-32bit-debuginfo-0.2.13-150000.1.3.1
* librcd0-32bit-0.1.14-150000.1.3.1
* librcd0-32bit-debuginfo-0.1.14-150000.1.3.1
* librcc0-32bit-0.2.13-150000.1.3.1
* openSUSE Leap 15.5 (noarch)
* unzip-doc-6.00-150000.4.14.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* rcc-runtime-debuginfo-0.2.13-150000.1.3.1
* librcc-debugsource-0.2.13-150000.1.3.1
* librcc0-debuginfo-0.2.13-150000.1.3.1
* librcd-devel-0.1.14-150000.1.3.1
* rcc-runtime-0.2.13-150000.1.3.1
* unzip-6.00-150000.4.14.1
* librcd-debugsource-0.1.14-150000.1.3.1
* librcc-devel-0.2.13-150000.1.3.1
* librcc0-0.2.13-150000.1.3.1
* unzip-debugsource-6.00-150000.4.14.1
* unzip-debuginfo-6.00-150000.4.14.1
* librcd0-debuginfo-0.1.14-150000.1.3.1
* librcd0-0.1.14-150000.1.3.1
* openSUSE Leap 15.6 (x86_64)
* librcc0-32bit-debuginfo-0.2.13-150000.1.3.1
* librcd0-32bit-0.1.14-150000.1.3.1
* librcd0-32bit-debuginfo-0.1.14-150000.1.3.1
* librcc0-32bit-0.2.13-150000.1.3.1
* openSUSE Leap 15.6 (noarch)
* unzip-doc-6.00-150000.4.14.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* unzip-debuginfo-6.00-150000.4.14.1
* unzip-debugsource-6.00-150000.4.14.1
* unzip-6.00-150000.4.14.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* unzip-debuginfo-6.00-150000.4.14.1
* unzip-debugsource-6.00-150000.4.14.1
* unzip-6.00-150000.4.14.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* rcc-runtime-debuginfo-0.2.13-150000.1.3.1
* librcc-debugsource-0.2.13-150000.1.3.1
* librcc0-debuginfo-0.2.13-150000.1.3.1
* librcd-devel-0.1.14-150000.1.3.1
* rcc-runtime-0.2.13-150000.1.3.1
* librcd-debugsource-0.1.14-150000.1.3.1
* librcc-devel-0.2.13-150000.1.3.1
* librcc0-0.2.13-150000.1.3.1
* librcd0-debuginfo-0.1.14-150000.1.3.1
* librcd0-0.1.14-150000.1.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* rcc-runtime-debuginfo-0.2.13-150000.1.3.1
* librcc-debugsource-0.2.13-150000.1.3.1
* librcc0-debuginfo-0.2.13-150000.1.3.1
* librcd-devel-0.1.14-150000.1.3.1
* rcc-runtime-0.2.13-150000.1.3.1
* librcd-debugsource-0.1.14-150000.1.3.1
* librcc-devel-0.2.13-150000.1.3.1
* librcc0-0.2.13-150000.1.3.1
* librcd0-debuginfo-0.1.14-150000.1.3.1
* librcd0-0.1.14-150000.1.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1190273
1
0
03 Sep '24
# Recommended update for libwebp
Announcement ID: SUSE-RU-2024:3130-1
Rating: moderate
References:
* bsc#1228322
* bsc#1229582
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that has two fixes can now be installed.
## Description:
This update for libwebp fixes the following issue:
* added libwebp7-32bit to packagehub for Wine. (bsc#1228322 bsc#1229582)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3130=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3130=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3130=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3130=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3130=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3130=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libwebp7-1.0.3-150200.3.12.1
* libwebpmux3-1.0.3-150200.3.12.1
* libwebpmux3-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-debuginfo-1.0.3-150200.3.12.1
* libwebp-debugsource-1.0.3-150200.3.12.1
* libwebp7-debuginfo-1.0.3-150200.3.12.1
* libwebp-tools-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-1.0.3-150200.3.12.1
* libwebp-devel-1.0.3-150200.3.12.1
* libwebpdecoder3-debuginfo-1.0.3-150200.3.12.1
* libwebpdecoder3-1.0.3-150200.3.12.1
* libwebp-tools-1.0.3-150200.3.12.1
* openSUSE Leap 15.5 (x86_64)
* libwebpmux3-32bit-debuginfo-1.0.3-150200.3.12.1
* libwebp7-32bit-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-32bit-1.0.3-150200.3.12.1
* libwebp7-32bit-1.0.3-150200.3.12.1
* libwebpmux3-32bit-1.0.3-150200.3.12.1
* libwebpdecoder3-32bit-1.0.3-150200.3.12.1
* libwebpdecoder3-32bit-debuginfo-1.0.3-150200.3.12.1
* libwebp-devel-32bit-1.0.3-150200.3.12.1
* libwebpdemux2-32bit-debuginfo-1.0.3-150200.3.12.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libwebp7-1.0.3-150200.3.12.1
* libwebpmux3-1.0.3-150200.3.12.1
* libwebpmux3-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-debuginfo-1.0.3-150200.3.12.1
* libwebp-debugsource-1.0.3-150200.3.12.1
* libwebp7-debuginfo-1.0.3-150200.3.12.1
* libwebp-tools-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-1.0.3-150200.3.12.1
* libwebp-devel-1.0.3-150200.3.12.1
* libwebpdecoder3-debuginfo-1.0.3-150200.3.12.1
* libwebpdecoder3-1.0.3-150200.3.12.1
* libwebp-tools-1.0.3-150200.3.12.1
* openSUSE Leap 15.6 (x86_64)
* libwebpmux3-32bit-debuginfo-1.0.3-150200.3.12.1
* libwebp7-32bit-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-32bit-1.0.3-150200.3.12.1
* libwebp7-32bit-1.0.3-150200.3.12.1
* libwebpmux3-32bit-1.0.3-150200.3.12.1
* libwebpdecoder3-32bit-1.0.3-150200.3.12.1
* libwebpdecoder3-32bit-debuginfo-1.0.3-150200.3.12.1
* libwebp-devel-32bit-1.0.3-150200.3.12.1
* libwebpdemux2-32bit-debuginfo-1.0.3-150200.3.12.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libwebp7-1.0.3-150200.3.12.1
* libwebpmux3-1.0.3-150200.3.12.1
* libwebpmux3-debuginfo-1.0.3-150200.3.12.1
* libwebp-debugsource-1.0.3-150200.3.12.1
* libwebp7-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-1.0.3-150200.3.12.1
* libwebp-devel-1.0.3-150200.3.12.1
* libwebpdecoder3-debuginfo-1.0.3-150200.3.12.1
* libwebpdecoder3-1.0.3-150200.3.12.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libwebp7-1.0.3-150200.3.12.1
* libwebpmux3-1.0.3-150200.3.12.1
* libwebpmux3-debuginfo-1.0.3-150200.3.12.1
* libwebp-debugsource-1.0.3-150200.3.12.1
* libwebp7-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-debuginfo-1.0.3-150200.3.12.1
* libwebpdemux2-1.0.3-150200.3.12.1
* libwebp-devel-1.0.3-150200.3.12.1
* libwebpdecoder3-debuginfo-1.0.3-150200.3.12.1
* libwebpdecoder3-1.0.3-150200.3.12.1
* SUSE Package Hub 15 15-SP5 (x86_64)
* libwebp7-32bit-1.0.3-150200.3.12.1
* libwebp-debugsource-1.0.3-150200.3.12.1
* libwebp7-32bit-debuginfo-1.0.3-150200.3.12.1
* SUSE Package Hub 15 15-SP6 (x86_64)
* libwebp7-32bit-1.0.3-150200.3.12.1
* libwebp-debugsource-1.0.3-150200.3.12.1
* libwebp7-32bit-debuginfo-1.0.3-150200.3.12.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228322
* https://bugzilla.suse.com/show_bug.cgi?id=1229582
1
0
03 Sep '24
# Recommended update for mozilla-nss
Announcement ID: SUSE-RU-2024:3131-1
Rating: moderate
References:
* bsc#1224113
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for mozilla-nss fixes the following issues:
* FIPS: Enforce approved curves with the CKK_EC_MONTGOMERY key type
(bsc#1224113).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3131=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3131=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3131=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3131=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3131=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3131=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3131=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3131=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3131=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3131=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3131=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3131=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3131=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3131=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3131=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3131=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3131=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3131=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3131=1
## Package List:
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Manager Server 4.3 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* openSUSE Leap 15.4 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-32bit-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* mozilla-nss-sysinit-64bit-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-64bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-64bit-3.101.2-150400.3.51.1
* mozilla-nss-64bit-3.101.2-150400.3.51.1
* mozilla-nss-64bit-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-64bit-3.101.2-150400.3.51.1
* mozilla-nss-certs-64bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-64bit-3.101.2-150400.3.51.1
* libsoftokn3-64bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-64bit-debuginfo-3.101.2-150400.3.51.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* openSUSE Leap 15.5 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-32bit-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* openSUSE Leap 15.6 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-32bit-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* Basesystem Module 15-SP5 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* Basesystem Module 15-SP6 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfreebl3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-debugsource-3.101.2-150400.3.51.1
* libsoftokn3-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-devel-3.101.2-150400.3.51.1
* libfreebl3-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-tools-3.101.2-150400.3.51.1
* mozilla-nss-3.101.2-150400.3.51.1
* libfreebl3-32bit-3.101.2-150400.3.51.1
* libfreebl3-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-3.101.2-150400.3.51.1
* mozilla-nss-tools-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-3.101.2-150400.3.51.1
* mozilla-nss-certs-3.101.2-150400.3.51.1
* mozilla-nss-sysinit-3.101.2-150400.3.51.1
* mozilla-nss-certs-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-certs-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-debuginfo-3.101.2-150400.3.51.1
* mozilla-nss-32bit-3.101.2-150400.3.51.1
* mozilla-nss-debuginfo-3.101.2-150400.3.51.1
* libsoftokn3-32bit-3.101.2-150400.3.51.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1224113
1
0
03 Sep '24
# Recommended update for permissions
Announcement ID: SUSE-RU-2024:3132-1
Rating: moderate
References:
* bsc#1228968
* bsc#1229329
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has two fixes can now be installed.
## Description:
This update for permissions fixes the following issues:
* Update to version 20240826:
* permissions: remove outdated entries (bsc#1228968)
* Update to version 20240826:
* cockpit: revert path change (bsc#1229329)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3132=1 openSUSE-SLE-15.6-2024-3132=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3132=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* permissions-20240826-150600.10.9.1
* permissions-debuginfo-20240826-150600.10.9.1
* permissions-debugsource-20240826-150600.10.9.1
* openSUSE Leap 15.6 (noarch)
* permissions-zypp-plugin-20240826-150600.10.9.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* permissions-20240826-150600.10.9.1
* permissions-debuginfo-20240826-150600.10.9.1
* permissions-debugsource-20240826-150600.10.9.1
* Basesystem Module 15-SP6 (noarch)
* permissions-zypp-plugin-20240826-150600.10.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228968
* https://bugzilla.suse.com/show_bug.cgi?id=1229329
1
0
03 Sep '24
# Recommended update for dpdk
Announcement ID: SUSE-RU-2024:3133-1
Rating: moderate
References:
* bsc#1214724
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for dpdk fixes the following issue:
* SUSE provided DPDK modules taint the kernel as unsupported (bsc#1214724).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3133=1 openSUSE-SLE-15.6-2024-3133=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3133=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* dpdk-kmp-default-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-debugsource-22.11.1-150600.3.6.1
* dpdk-22.11.1-150600.3.6.1
* dpdk-devel-22.11.1-150600.3.6.1
* dpdk-tools-22.11.1-150600.3.6.1
* libdpdk-23-debuginfo-22.11.1-150600.3.6.1
* dpdk-examples-debuginfo-22.11.1-150600.3.6.1
* libdpdk-23-22.11.1-150600.3.6.1
* dpdk-examples-22.11.1-150600.3.6.1
* dpdk-devel-static-22.11.1-150600.3.6.1
* dpdk-kmp-default-debuginfo-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-debuginfo-22.11.1-150600.3.6.1
* openSUSE Leap 15.6 (noarch)
* dpdk-doc-22.11.1-150600.3.6.1
* dpdk-thunderx-doc-22.11.1-150600.3.6.1
* openSUSE Leap 15.6 (aarch64)
* dpdk-thunderx-kmp-default-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-thunderx-examples-22.11.1-150600.3.6.1
* dpdk-thunderx-tools-22.11.1-150600.3.6.1
* dpdk-thunderx-22.11.1-150600.3.6.1
* dpdk-thunderx-devel-22.11.1-150600.3.6.1
* dpdk-thunderx-examples-debuginfo-22.11.1-150600.3.6.1
* dpdk-thunderx-kmp-default-debuginfo-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-thunderx-devel-static-22.11.1-150600.3.6.1
* dpdk-thunderx-debuginfo-22.11.1-150600.3.6.1
* dpdk-thunderx-debugsource-22.11.1-150600.3.6.1
* Server Applications Module 15-SP6 (aarch64 ppc64le x86_64)
* dpdk-kmp-default-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-debugsource-22.11.1-150600.3.6.1
* dpdk-22.11.1-150600.3.6.1
* dpdk-devel-22.11.1-150600.3.6.1
* dpdk-tools-22.11.1-150600.3.6.1
* libdpdk-23-debuginfo-22.11.1-150600.3.6.1
* libdpdk-23-22.11.1-150600.3.6.1
* dpdk-kmp-default-debuginfo-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-debuginfo-22.11.1-150600.3.6.1
* Server Applications Module 15-SP6 (aarch64)
* dpdk-thunderx-kmp-default-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-thunderx-22.11.1-150600.3.6.1
* dpdk-thunderx-devel-22.11.1-150600.3.6.1
* dpdk-thunderx-kmp-default-debuginfo-22.11.1_k6.4.0_150600.23.17-150600.3.6.1
* dpdk-thunderx-debugsource-22.11.1-150600.3.6.1
* dpdk-thunderx-debuginfo-22.11.1-150600.3.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1214724
1
0
03 Sep '24
# Recommended update for ovmf
Announcement ID: SUSE-RU-2024:3134-1
Rating: moderate
References:
* bsc#1209266
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for ovmf fixes the following issues:
* We do not official support AMD SEV yet. On the other hand, the secure boot
will be disabled in SEV flavor, so we do not need revert the patch anymore
(bsc#1209266).
* Add backslash to the end of "-D BUILD_SHELL=FALSE" in BUILD_OPTIONS_X86.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3134=1 openSUSE-SLE-15.6-2024-3134=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3134=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3134=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64)
* ovmf-tools-202308-150600.5.3.2
* ovmf-202308-150600.5.3.2
* openSUSE Leap 15.6 (noarch)
* qemu-uefi-aarch64-202308-150600.5.3.2
* qemu-ovmf-ia32-202308-150600.5.3.2
* qemu-uefi-aarch32-202308-150600.5.3.2
* qemu-ovmf-x86_64-202308-150600.5.3.2
* openSUSE Leap 15.6 (x86_64)
* qemu-ovmf-x86_64-debug-202308-150600.5.3.2
* SUSE Package Hub 15 15-SP6 (noarch)
* qemu-uefi-aarch64-202308-150600.5.3.2
* qemu-uefi-aarch32-202308-150600.5.3.2
* qemu-ovmf-x86_64-202308-150600.5.3.2
* SUSE Package Hub 15 15-SP6 (x86_64)
* qemu-ovmf-x86_64-debug-202308-150600.5.3.2
* Server Applications Module 15-SP6 (aarch64 x86_64)
* ovmf-tools-202308-150600.5.3.2
* ovmf-202308-150600.5.3.2
* Server Applications Module 15-SP6 (noarch)
* qemu-uefi-aarch64-202308-150600.5.3.2
* qemu-ovmf-x86_64-202308-150600.5.3.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1209266
1
0
# Security update for glib2
Announcement ID: SUSE-SU-2024:3086-1
Rating: low
References:
* bsc#1224044
Cross-References:
* CVE-2024-34397
CVSS scores:
* CVE-2024-34397 ( SUSE ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for glib2 fixes the following issues:
* Fixed a possible use after free regression introduced by CVE-2024-34397
patch (bsc#1224044).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3086=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3086=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3086=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3086=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3086=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3086=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3086=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3086=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3086=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* gio-branding-upstream-2.70.5-150400.3.14.1
* glib2-lang-2.70.5-150400.3.14.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* glib2-tools-2.70.5-150400.3.14.1
* glib2-tests-devel-2.70.5-150400.3.14.1
* libgthread-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-devel-2.70.5-150400.3.14.1
* glib2-doc-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-static-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-debuginfo-2.70.5-150400.3.14.1
* glib2-tests-devel-debuginfo-2.70.5-150400.3.14.1
* openSUSE Leap 15.4 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.14.1
* libglib-2_0-0-32bit-2.70.5-150400.3.14.1
* glib2-devel-32bit-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.14.1
* glib2-tools-32bit-debuginfo-2.70.5-150400.3.14.1
* libgthread-2_0-0-32bit-2.70.5-150400.3.14.1
* libgthread-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* glib2-tools-32bit-2.70.5-150400.3.14.1
* libgio-2_0-0-32bit-2.70.5-150400.3.14.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-32bit-2.70.5-150400.3.14.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libglib-2_0-0-64bit-2.70.5-150400.3.14.1
* libgmodule-2_0-0-64bit-2.70.5-150400.3.14.1
* glib2-tools-64bit-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-64bit-2.70.5-150400.3.14.1
* libgobject-2_0-0-64bit-debuginfo-2.70.5-150400.3.14.1
* libgthread-2_0-0-64bit-2.70.5-150400.3.14.1
* libgio-2_0-0-64bit-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-64bit-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-64bit-debuginfo-2.70.5-150400.3.14.1
* libglib-2_0-0-64bit-debuginfo-2.70.5-150400.3.14.1
* glib2-tools-64bit-2.70.5-150400.3.14.1
* libgthread-2_0-0-64bit-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-64bit-2.70.5-150400.3.14.1
* libgio-2_0-0-64bit-2.70.5-150400.3.14.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* openSUSE Leap 15.5 (noarch)
* gio-branding-upstream-2.70.5-150400.3.14.1
* glib2-lang-2.70.5-150400.3.14.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* glib2-tests-devel-2.70.5-150400.3.14.1
* libgthread-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-devel-2.70.5-150400.3.14.1
* glib2-doc-2.70.5-150400.3.14.1
* glib2-devel-static-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-debuginfo-2.70.5-150400.3.14.1
* glib2-tests-devel-debuginfo-2.70.5-150400.3.14.1
* openSUSE Leap 15.5 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.14.1
* libglib-2_0-0-32bit-2.70.5-150400.3.14.1
* glib2-devel-32bit-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.14.1
* glib2-tools-32bit-debuginfo-2.70.5-150400.3.14.1
* libgthread-2_0-0-32bit-2.70.5-150400.3.14.1
* libgthread-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* glib2-tools-32bit-2.70.5-150400.3.14.1
* libgio-2_0-0-32bit-2.70.5-150400.3.14.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-32bit-2.70.5-150400.3.14.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glib2-tools-2.70.5-150400.3.14.1
* libgthread-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-2.70.5-150400.3.14.1
* libgio-2_0-0-2.70.5-150400.3.14.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-2.70.5-150400.3.14.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-2.70.5-150400.3.14.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.14.1
* glib2-debugsource-2.70.5-150400.3.14.1
* glib2-devel-2.70.5-150400.3.14.1
* glib2-tools-debuginfo-2.70.5-150400.3.14.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.14.1
* glib2-devel-debuginfo-2.70.5-150400.3.14.1
* Basesystem Module 15-SP5 (noarch)
* glib2-lang-2.70.5-150400.3.14.1
* Basesystem Module 15-SP5 (x86_64)
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libglib-2_0-0-32bit-2.70.5-150400.3.14.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.14.1
* libgio-2_0-0-32bit-2.70.5-150400.3.14.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.14.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.14.1
## References:
* https://www.suse.com/security/cve/CVE-2024-34397.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224044
1
0
openSUSE-SU-2024:0275-1: important: Security update for opera
by opensuse-security@opensuse.org 02 Sep '24
by opensuse-security@opensuse.org 02 Sep '24
02 Sep '24
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0275-1
Rating: important
References:
Cross-References: CVE-2024-7971
CVSS scores:
CVE-2024-7971 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Leap 15.6:NonFree
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for opera fixes the following issues:
- Update to 113.0.5230.32
* DNA-118250 Backport fix for CVE-2024-7971 from Chrome to Opera 113
- Changes in 113.0.5230.31
* CHR-9819 Update Chromium on desktop-stable-127-5230 to 127.0.6533.120
* DNA-116113 Print window boxes have frames and text is not vertically
centered
* DNA-117467 Crash at static void views::Combobox::
PaintIconAndText(class gfx::Canvas*)
* DNA-117557 Fix detected dangling ptr in WorkspacesTabCycler
ControllerIndexInCycleOrderTest.IndexInCyclingOrder
* DNA-117721 [Lin] When I drag a tab out of the tab strip and drop it,
it is not possible to do so without creating a new window.
* DNA-117854 Pinned tab takes whole tab strip
* DNA-117857 [Sync][Lost password] After profile error can’t add
passwords and sync can’t display synced passwords
* DNA-118215 Promote 113 to stable
- Complete Opera 113 changelog at:
https://blogs.opera.com/desktop/changelog-for-113
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.6:NonFree:
zypper in -t patch openSUSE-2024-275=1
Package List:
- openSUSE Leap 15.6:NonFree (x86_64):
opera-113.0.5230.32-lp156.2.17.1
References:
https://www.suse.com/security/cve/CVE-2024-7971.html
1
0
openSUSE-SU-2024:0276-1: important: Security update for cacti, cacti-spine
by opensuse-security@opensuse.org 02 Sep '24
by opensuse-security@opensuse.org 02 Sep '24
02 Sep '24
openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0276-1
Rating: important
References: #1224229 #1224230 #1224231 #1224235 #1224236
#1224237 #1224238 #1224239 #1224240 #1224241
Cross-References: CVE-2024-25641 CVE-2024-27082 CVE-2024-29894
CVE-2024-31443 CVE-2024-31444 CVE-2024-31445
CVE-2024-31458 CVE-2024-31459 CVE-2024-31460
CVE-2024-34340
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
- cacti 1.2.27:
* CVE-2024-34340: Authentication Bypass when using using older password
hashes (boo#1224240)
* CVE-2024-25641: RCE vulnerability when importing packages (boo#1224229)
* CVE-2024-31459: RCE vulnerability when plugins include files
(boo#1224238)
* CVE-2024-31460: SQL Injection vulnerability when using tree rules
through Automation API (boo#1224239)
* CVE-2024-29894: XSS vulnerability when using JavaScript based
messaging API (boo#1224231)
* CVE-2024-31458: SQL Injection vulnerability when using form templates
(boo#1224241)
* CVE-2024-31444: XSS vulnerability when reading tree rules with
Automation API (boo#1224236)
* CVE-2024-31443: XSS vulnerability when managing data queries
(boo#1224235)
* CVE-2024-31445: SQL Injection vulnerability when retrieving graphs
using Automation API (boo#1224237)
* CVE-2024-27082: XSS vulnerability when managing trees (boo#1224230)
* Improve PHP 8.3 support
* When importing packages via command line, data source profile could
not be selected
* When changing password, returning to previous page does not always work
* When using LDAP authentication the first time, warnings may appear in
logs
* When editing/viewing devices, add IPv6 info to hostname tooltip
* Improve speed of polling when Boost is enabled
* Improve support for Half-Hour time zones
* When user session not found, device lists can be incorrectly returned
* On import, legacy templates may generate warnings
* Improve support for alternate locations of Ping
* Improve PHP 8.1 support for Installer
* Fix issues with number formatting
* Improve PHP 8.1 support when SpikeKill is run first time
* Improve PHP 8.1 support for SpikeKill
* When using Chinese to search for graphics, garbled characters appear.
* When importing templates, preview mode will not always load
* When remote poller is installed, MySQL TimeZone DB checks are not
performed
* When Remote Poller installation completes, no finish button is shown
* Unauthorized agents should be recorded into logs
* Poller cache may not always update if hostname changes
* When using CMD poller, Failure and Recovery dates may have incorrect
values
* Saving a Tree can cause the tree to become unpublished
* Web Basic Authentication does not record user logins
* When using Accent-based languages, translations may not work properly
* Fix automation expressions for device rules
* Improve PHP 8.1 Support during fresh install with boost
* Add a device "enabled/disabled" indicator next to the graphs
* Notify the admin periodically when a remote data collector goes into
heartbeat status
* Add template for Aruba Clearpass
* Add fliter/sort of Device Templates by Graph Templates
- cacti-spine 1.2.27:
* Restore AES Support
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-276=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
cacti-spine-1.2.27-bp156.2.3.1
cacti-spine-debuginfo-1.2.27-bp156.2.3.1
cacti-spine-debugsource-1.2.27-bp156.2.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
cacti-1.2.27-bp156.2.3.1
References:
https://www.suse.com/security/cve/CVE-2024-25641.html
https://www.suse.com/security/cve/CVE-2024-27082.html
https://www.suse.com/security/cve/CVE-2024-29894.html
https://www.suse.com/security/cve/CVE-2024-31443.html
https://www.suse.com/security/cve/CVE-2024-31444.html
https://www.suse.com/security/cve/CVE-2024-31445.html
https://www.suse.com/security/cve/CVE-2024-31458.html
https://www.suse.com/security/cve/CVE-2024-31459.html
https://www.suse.com/security/cve/CVE-2024-31460.html
https://www.suse.com/security/cve/CVE-2024-34340.html
https://bugzilla.suse.com/1224229
https://bugzilla.suse.com/1224230
https://bugzilla.suse.com/1224231
https://bugzilla.suse.com/1224235
https://bugzilla.suse.com/1224236
https://bugzilla.suse.com/1224237
https://bugzilla.suse.com/1224238
https://bugzilla.suse.com/1224239
https://bugzilla.suse.com/1224240
https://bugzilla.suse.com/1224241
1
0
02 Sep '24
# Recommended update for aardvark-dns
Announcement ID: SUSE-RU-2024:3070-1
Rating: moderate
References:
* bsc#1224122
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that has one fix can now be installed.
## Description:
This update for netavark and aardvark-dns fixes the following issues:
* Update aardvark-dns from 1.5.0 to 1.10.0 (bsc#1224122)
* Update netavark from 1.5.0 to 1.10.3 (bsc#1224122)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3070=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3070=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3070=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3070=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3070=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3070=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3070=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3070=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* netavark-1.10.3-150300.7.9.1
* aardvark-dns-1.10.0-150300.7.8.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1224122
1
0
02 Sep '24
# Recommended update for suse-build-key
Announcement ID: SUSE-RU-2024:3071-1
Rating: moderate
References:
* bsc#1229339
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for suse-build-key fixes the following issue:
* extended 2048 bit SUSE SLE 12, 15 GA-SP5 key until 2028 (bsc#1229339).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3071=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3071=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3071=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3071=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3071=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3071=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3071=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3071=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3071=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3071=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3071=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3071=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3071=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3071=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3071=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3071=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3071=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3071=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3071=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3071=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3071=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3071=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3071=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3071=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3071=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3071=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3071=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3071=1
## Package List:
* openSUSE Leap Micro 5.5 (noarch)
* suse-build-key-12.0-150000.8.52.3
* openSUSE Leap 15.5 (noarch)
* suse-build-key-12.0-150000.8.52.3
* openSUSE Leap 15.6 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro 5.3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro 5.4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro 5.5 (noarch)
* suse-build-key-12.0-150000.8.52.3
* Basesystem Module 15-SP5 (noarch)
* suse-build-key-12.0-150000.8.52.3
* Basesystem Module 15-SP6 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Manager Proxy 4.3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Manager Retail Branch Server 4.3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Manager Server 4.3 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Enterprise Storage 7.1 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro 5.1 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro 5.2 (noarch)
* suse-build-key-12.0-150000.8.52.3
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* suse-build-key-12.0-150000.8.52.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229339
1
0
# Security update for unbound
Announcement ID: SUSE-SU-2024:3074-1
Rating: low
References:
* bsc#1229068
Cross-References:
* CVE-2024-43167
CVSS scores:
* CVE-2024-43167 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43167 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for unbound fixes the following issues:
* CVE-2024-43167: Fix null pointer dereference issue in function
ub_ctx_set_fwd (bsc#1229068)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3074=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3074=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3074=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3074=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* unbound-devel-1.20.0-150100.10.16.1
* unbound-anchor-1.20.0-150100.10.16.1
* unbound-debuginfo-1.20.0-150100.10.16.1
* unbound-python-1.20.0-150100.10.16.1
* unbound-python-debuginfo-1.20.0-150100.10.16.1
* unbound-debugsource-1.20.0-150100.10.16.1
* libunbound8-debuginfo-1.20.0-150100.10.16.1
* libunbound8-1.20.0-150100.10.16.1
* unbound-1.20.0-150100.10.16.1
* unbound-anchor-debuginfo-1.20.0-150100.10.16.1
* openSUSE Leap 15.5 (noarch)
* unbound-munin-1.20.0-150100.10.16.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* unbound-debuginfo-1.20.0-150100.10.16.1
* unbound-anchor-1.20.0-150100.10.16.1
* unbound-debugsource-1.20.0-150100.10.16.1
* libunbound8-debuginfo-1.20.0-150100.10.16.1
* libunbound8-1.20.0-150100.10.16.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* unbound-devel-1.20.0-150100.10.16.1
* unbound-debuginfo-1.20.0-150100.10.16.1
* unbound-anchor-1.20.0-150100.10.16.1
* unbound-debugsource-1.20.0-150100.10.16.1
* libunbound8-debuginfo-1.20.0-150100.10.16.1
* libunbound8-1.20.0-150100.10.16.1
* unbound-anchor-debuginfo-1.20.0-150100.10.16.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* unbound-python-1.20.0-150100.10.16.1
* unbound-debuginfo-1.20.0-150100.10.16.1
* unbound-debugsource-1.20.0-150100.10.16.1
* unbound-python-debuginfo-1.20.0-150100.10.16.1
* unbound-1.20.0-150100.10.16.1
## References:
* https://www.suse.com/security/cve/CVE-2024-43167.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229068
1
0
# Security update for xen
Announcement ID: SUSE-SU-2024:3075-1
Rating: important
References:
* bsc#1027519
* bsc#1228574
* bsc#1228575
Cross-References:
* CVE-2024-31145
* CVE-2024-31146
CVSS scores:
* CVE-2024-31145 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2024-31146 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities and has one security fix can now be
installed.
## Description:
This update for xen fixes the following issues:
* CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460,
bsc#1228574)
* CVE-2024-31146: Fixed PCI device pass-through with shared resources
(XSA-461, bsc#1228575)
Other fixes: \- Update to Xen 4.17.5 security bug fix release (bsc#1027519)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3075=1 openSUSE-SLE-15.5-2024-3075=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3075=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3075=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3075=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3075=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* xen-libs-debuginfo-4.17.5_02-150500.3.36.1
* xen-libs-4.17.5_02-150500.3.36.1
* xen-tools-domU-4.17.5_02-150500.3.36.1
* xen-debugsource-4.17.5_02-150500.3.36.1
* xen-devel-4.17.5_02-150500.3.36.1
* xen-tools-domU-debuginfo-4.17.5_02-150500.3.36.1
* openSUSE Leap 15.5 (x86_64)
* xen-libs-32bit-debuginfo-4.17.5_02-150500.3.36.1
* xen-libs-32bit-4.17.5_02-150500.3.36.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* xen-4.17.5_02-150500.3.36.1
* xen-tools-4.17.5_02-150500.3.36.1
* xen-tools-debuginfo-4.17.5_02-150500.3.36.1
* xen-doc-html-4.17.5_02-150500.3.36.1
* openSUSE Leap 15.5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.5_02-150500.3.36.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.17.5_02-150500.3.36.1
* xen-libs-64bit-4.17.5_02-150500.3.36.1
* openSUSE Leap Micro 5.5 (x86_64)
* xen-libs-debuginfo-4.17.5_02-150500.3.36.1
* xen-debugsource-4.17.5_02-150500.3.36.1
* xen-libs-4.17.5_02-150500.3.36.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* xen-libs-debuginfo-4.17.5_02-150500.3.36.1
* xen-debugsource-4.17.5_02-150500.3.36.1
* xen-libs-4.17.5_02-150500.3.36.1
* Basesystem Module 15-SP5 (x86_64)
* xen-libs-debuginfo-4.17.5_02-150500.3.36.1
* xen-libs-4.17.5_02-150500.3.36.1
* xen-tools-domU-4.17.5_02-150500.3.36.1
* xen-debugsource-4.17.5_02-150500.3.36.1
* xen-tools-domU-debuginfo-4.17.5_02-150500.3.36.1
* Server Applications Module 15-SP5 (x86_64)
* xen-tools-4.17.5_02-150500.3.36.1
* xen-debugsource-4.17.5_02-150500.3.36.1
* xen-tools-debuginfo-4.17.5_02-150500.3.36.1
* xen-devel-4.17.5_02-150500.3.36.1
* xen-4.17.5_02-150500.3.36.1
* Server Applications Module 15-SP5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.5_02-150500.3.36.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31145.html
* https://www.suse.com/security/cve/CVE-2024-31146.html
* https://bugzilla.suse.com/show_bug.cgi?id=1027519
* https://bugzilla.suse.com/show_bug.cgi?id=1228574
* https://bugzilla.suse.com/show_bug.cgi?id=1228575
1
0
02 Sep '24
# Security update for python39
Announcement ID: SUSE-SU-2024:3076-1
Rating: important
References:
* bsc#1227233
* bsc#1227378
* bsc#1227999
* bsc#1228780
Cross-References:
* CVE-2024-5642
* CVE-2024-6923
CVSS scores:
* CVE-2024-5642 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities and has two security fixes can now be
installed.
## Description:
This update for python39 fixes the following issues:
Security issues fixed:
* CVE-2024-6923: Fixed email header injection due to unquoted newlines
(bsc#1228780)
* CVE-2024-5642: Removed support for anything but OpenSSL 1.1.1 or newer
(bsc#1227233)
Non-security issues fixed:
* Fixed executable bits for /usr/bin/idle* (bsc#1227378).
* Improve python reproducible builds (bsc#1227999)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3076=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3076=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3076=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3076=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3076=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3076=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3076=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3076=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* python39-testsuite-debuginfo-3.9.19-150300.4.49.1
* python39-doc-devhelp-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-testsuite-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-doc-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_9-1_0-32bit-3.9.19-150300.4.49.1
* libpython3_9-1_0-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-base-32bit-3.9.19-150300.4.49.1
* python39-base-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-32bit-3.9.19-150300.4.49.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpython3_9-1_0-64bit-debuginfo-3.9.19-150300.4.49.1
* python39-64bit-3.9.19-150300.4.49.1
* libpython3_9-1_0-64bit-3.9.19-150300.4.49.1
* python39-base-64bit-3.9.19-150300.4.49.1
* python39-64bit-debuginfo-3.9.19-150300.4.49.1
* python39-base-64bit-debuginfo-3.9.19-150300.4.49.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* python39-testsuite-debuginfo-3.9.19-150300.4.49.1
* python39-doc-devhelp-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-testsuite-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-doc-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
* openSUSE Leap 15.5 (x86_64)
* libpython3_9-1_0-32bit-3.9.19-150300.4.49.1
* libpython3_9-1_0-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-base-32bit-3.9.19-150300.4.49.1
* python39-base-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-32bit-3.9.19-150300.4.49.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* python39-testsuite-debuginfo-3.9.19-150300.4.49.1
* python39-doc-devhelp-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-testsuite-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-doc-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_9-1_0-32bit-3.9.19-150300.4.49.1
* libpython3_9-1_0-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-base-32bit-3.9.19-150300.4.49.1
* python39-base-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-32bit-debuginfo-3.9.19-150300.4.49.1
* python39-32bit-3.9.19-150300.4.49.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python39-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* python39-3.9.19-150300.4.49.1
* python39-tk-3.9.19-150300.4.49.1
* python39-base-debuginfo-3.9.19-150300.4.49.1
* python39-curses-debuginfo-3.9.19-150300.4.49.1
* python39-curses-3.9.19-150300.4.49.1
* python39-debugsource-3.9.19-150300.4.49.1
* python39-idle-3.9.19-150300.4.49.1
* libpython3_9-1_0-3.9.19-150300.4.49.1
* python39-base-3.9.19-150300.4.49.1
* python39-core-debugsource-3.9.19-150300.4.49.1
* python39-tk-debuginfo-3.9.19-150300.4.49.1
* python39-debuginfo-3.9.19-150300.4.49.1
* python39-devel-3.9.19-150300.4.49.1
* python39-tools-3.9.19-150300.4.49.1
* python39-dbm-3.9.19-150300.4.49.1
* libpython3_9-1_0-debuginfo-3.9.19-150300.4.49.1
* python39-dbm-debuginfo-3.9.19-150300.4.49.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5642.html
* https://www.suse.com/security/cve/CVE-2024-6923.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227233
* https://bugzilla.suse.com/show_bug.cgi?id=1227378
* https://bugzilla.suse.com/show_bug.cgi?id=1227999
* https://bugzilla.suse.com/show_bug.cgi?id=1228780
1
0
# Security update for qemu
Announcement ID: SUSE-SU-2024:3077-1
Rating: important
References:
* bsc#1227322
Cross-References:
* CVE-2024-4467
CVSS scores:
* CVE-2024-4467 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for qemu fixes the following issues:
* CVE-2024-4467: Fixed denial of service and file read/write via qemu-img info
command (bsc#1227322)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3077=1 openSUSE-SLE-15.5-2024-3077=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3077=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3077=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3077=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3077=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3077=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qemu-block-ssh-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-host-7.1.0-150500.49.18.1
* qemu-ui-opengl-7.1.0-150500.49.18.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1
* qemu-accel-qtest-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-7.1.0-150500.49.18.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-jack-7.1.0-150500.49.18.1
* qemu-extra-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1
* qemu-arm-7.1.0-150500.49.18.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.18.1
* qemu-accel-tcg-x86-7.1.0-150500.49.18.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.18.1
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-block-ssh-7.1.0-150500.49.18.1
* qemu-tools-debuginfo-7.1.0-150500.49.18.1
* qemu-s390x-7.1.0-150500.49.18.1
* qemu-ivshmem-tools-7.1.0-150500.49.18.1
* qemu-ui-spice-core-7.1.0-150500.49.18.1
* qemu-7.1.0-150500.49.18.1
* qemu-headless-7.1.0-150500.49.18.1
* qemu-ksm-7.1.0-150500.49.18.1
* qemu-linux-user-7.1.0-150500.49.18.1
* qemu-block-nfs-debuginfo-7.1.0-150500.49.18.1
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-gtk-7.1.0-150500.49.18.1
* qemu-ui-dbus-7.1.0-150500.49.18.1
* qemu-ui-spice-app-7.1.0-150500.49.18.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.18.1
* qemu-block-curl-7.1.0-150500.49.18.1
* qemu-extra-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-baum-7.1.0-150500.49.18.1
* qemu-ui-curses-7.1.0-150500.49.18.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.18.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.18.1
* qemu-s390x-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-7.1.0-150500.49.18.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.18.1
* qemu-audio-pa-7.1.0-150500.49.18.1
* qemu-linux-user-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-spice-7.1.0-150500.49.18.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.18.1
* qemu-lang-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.18.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.18.1
* qemu-guest-agent-7.1.0-150500.49.18.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.18.1
* qemu-debugsource-7.1.0-150500.49.18.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.18.1
* qemu-block-dmg-7.1.0-150500.49.18.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.18.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.18.1
* qemu-block-nfs-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-7.1.0-150500.49.18.1
* qemu-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-dbus-7.1.0-150500.49.18.1
* qemu-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-alsa-7.1.0-150500.49.18.1
* qemu-block-iscsi-7.1.0-150500.49.18.1
* qemu-ppc-debuginfo-7.1.0-150500.49.18.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.18.1
* qemu-block-gluster-7.1.0-150500.49.18.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.18.1
* qemu-ppc-7.1.0-150500.49.18.1
* qemu-audio-oss-7.1.0-150500.49.18.1
* qemu-tools-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-spice-7.1.0-150500.49.18.1
* qemu-vhost-user-gpu-7.1.0-150500.49.18.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.18.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.18.1
* qemu-arm-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.18.1
* qemu-linux-user-debugsource-7.1.0-150500.49.18.1
* openSUSE Leap 15.5 (s390x x86_64 i586)
* qemu-kvm-7.1.0-150500.49.18.1
* openSUSE Leap 15.5 (noarch)
* qemu-sgabios-8-150500.49.18.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.18.1
* qemu-skiboot-7.1.0-150500.49.18.1
* qemu-ipxe-1.0.0+-150500.49.18.1
* qemu-SLOF-7.1.0-150500.49.18.1
* qemu-microvm-7.1.0-150500.49.18.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* qemu-block-rbd-7.1.0-150500.49.18.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.18.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* qemu-ui-opengl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-spice-7.1.0-150500.49.18.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.18.1
* qemu-block-curl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1
* qemu-guest-agent-7.1.0-150500.49.18.1
* qemu-debugsource-7.1.0-150500.49.18.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.18.1
* qemu-tools-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-spice-7.1.0-150500.49.18.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-7.1.0-150500.49.18.1
* qemu-debuginfo-7.1.0-150500.49.18.1
* qemu-tools-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-core-7.1.0-150500.49.18.1
* qemu-7.1.0-150500.49.18.1
* openSUSE Leap Micro 5.5 (x86_64)
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-7.1.0-150500.49.18.1
* qemu-accel-tcg-x86-7.1.0-150500.49.18.1
* openSUSE Leap Micro 5.5 (noarch)
* qemu-seabios-1.16.0_0_gd239552-150500.49.18.1
* qemu-ipxe-1.0.0+-150500.49.18.1
* qemu-sgabios-8-150500.49.18.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1
* openSUSE Leap Micro 5.5 (s390x)
* qemu-s390x-7.1.0-150500.49.18.1
* qemu-s390x-debuginfo-7.1.0-150500.49.18.1
* openSUSE Leap Micro 5.5 (aarch64)
* qemu-arm-debuginfo-7.1.0-150500.49.18.1
* qemu-arm-7.1.0-150500.49.18.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* qemu-ui-opengl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-spice-7.1.0-150500.49.18.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.18.1
* qemu-block-curl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1
* qemu-guest-agent-7.1.0-150500.49.18.1
* qemu-debugsource-7.1.0-150500.49.18.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.18.1
* qemu-tools-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.18.1
* qemu-chardev-spice-7.1.0-150500.49.18.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-7.1.0-150500.49.18.1
* qemu-debuginfo-7.1.0-150500.49.18.1
* qemu-tools-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-core-7.1.0-150500.49.18.1
* qemu-7.1.0-150500.49.18.1
* SUSE Linux Enterprise Micro 5.5 (aarch64)
* qemu-arm-debuginfo-7.1.0-150500.49.18.1
* qemu-arm-7.1.0-150500.49.18.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* qemu-sgabios-8-150500.49.18.1
* qemu-ipxe-1.0.0+-150500.49.18.1
* qemu-SLOF-7.1.0-150500.49.18.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.18.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1
* SUSE Linux Enterprise Micro 5.5 (ppc64le)
* qemu-ppc-debuginfo-7.1.0-150500.49.18.1
* qemu-ppc-7.1.0-150500.49.18.1
* SUSE Linux Enterprise Micro 5.5 (s390x)
* qemu-s390x-7.1.0-150500.49.18.1
* qemu-s390x-debuginfo-7.1.0-150500.49.18.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-7.1.0-150500.49.18.1
* qemu-accel-tcg-x86-7.1.0-150500.49.18.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-debugsource-7.1.0-150500.49.18.1
* qemu-tools-7.1.0-150500.49.18.1
* qemu-debuginfo-7.1.0-150500.49.18.1
* qemu-tools-debuginfo-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (noarch)
* qemu-sgabios-8-150500.49.18.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.18.1
* qemu-skiboot-7.1.0-150500.49.18.1
* qemu-SLOF-7.1.0-150500.49.18.1
* qemu-microvm-7.1.0-150500.49.18.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-block-nfs-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-jack-debuginfo-7.1.0-150500.49.18.1
* qemu-accel-qtest-7.1.0-150500.49.18.1
* qemu-block-gluster-7.1.0-150500.49.18.1
* qemu-audio-jack-7.1.0-150500.49.18.1
* qemu-extra-7.1.0-150500.49.18.1
* qemu-extra-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.18.1
* qemu-debugsource-7.1.0-150500.49.18.1
* qemu-audio-oss-7.1.0-150500.49.18.1
* qemu-audio-oss-debuginfo-7.1.0-150500.49.18.1
* qemu-block-dmg-7.1.0-150500.49.18.1
* qemu-block-dmg-debuginfo-7.1.0-150500.49.18.1
* qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.18.1
* qemu-block-gluster-debuginfo-7.1.0-150500.49.18.1
* qemu-block-nfs-7.1.0-150500.49.18.1
* qemu-vhost-user-gpu-7.1.0-150500.49.18.1
* qemu-accel-qtest-debuginfo-7.1.0-150500.49.18.1
* qemu-debuginfo-7.1.0-150500.49.18.1
* qemu-ivshmem-tools-7.1.0-150500.49.18.1
* qemu-hw-usb-smartcard-7.1.0-150500.49.18.1
* qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-alsa-7.1.0-150500.49.18.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-7.1.0-150500.49.18.1
* qemu-accel-tcg-x86-7.1.0-150500.49.18.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-pa-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le)
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64)
* qemu-s390x-7.1.0-150500.49.18.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.18.1
* qemu-s390x-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64)
* qemu-ppc-debuginfo-7.1.0-150500.49.18.1
* qemu-ppc-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (ppc64le s390x x86_64)
* qemu-arm-debuginfo-7.1.0-150500.49.18.1
* qemu-arm-7.1.0-150500.49.18.1
* SUSE Package Hub 15 15-SP5 (s390x)
* qemu-chardev-spice-7.1.0-150500.49.18.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-app-7.1.0-150500.49.18.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-7.1.0-150500.49.18.1
* qemu-ui-gtk-7.1.0-150500.49.18.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-opengl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1
* qemu-ui-spice-core-7.1.0-150500.49.18.1
* qemu-audio-spice-7.1.0-150500.49.18.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* qemu-block-ssh-debuginfo-7.1.0-150500.49.18.1
* qemu-ksm-7.1.0-150500.49.18.1
* qemu-hw-usb-host-7.1.0-150500.49.18.1
* qemu-block-iscsi-debuginfo-7.1.0-150500.49.18.1
* qemu-block-iscsi-7.1.0-150500.49.18.1
* qemu-block-curl-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-dbus-7.1.0-150500.49.18.1
* qemu-hw-usb-host-debuginfo-7.1.0-150500.49.18.1
* qemu-lang-7.1.0-150500.49.18.1
* qemu-guest-agent-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-dbus-debuginfo-7.1.0-150500.49.18.1
* qemu-block-rbd-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-dbus-debuginfo-7.1.0-150500.49.18.1
* qemu-block-curl-7.1.0-150500.49.18.1
* qemu-chardev-baum-7.1.0-150500.49.18.1
* qemu-guest-agent-7.1.0-150500.49.18.1
* qemu-block-rbd-7.1.0-150500.49.18.1
* qemu-debugsource-7.1.0-150500.49.18.1
* qemu-ui-curses-7.1.0-150500.49.18.1
* qemu-chardev-baum-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-curses-debuginfo-7.1.0-150500.49.18.1
* qemu-debuginfo-7.1.0-150500.49.18.1
* qemu-block-ssh-7.1.0-150500.49.18.1
* qemu-audio-dbus-7.1.0-150500.49.18.1
* qemu-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (aarch64)
* qemu-arm-debuginfo-7.1.0-150500.49.18.1
* qemu-arm-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (aarch64 ppc64le x86_64)
* qemu-chardev-spice-7.1.0-150500.49.18.1
* qemu-chardev-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-core-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-app-7.1.0-150500.49.18.1
* qemu-ui-opengl-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-7.1.0-150500.49.18.1
* qemu-ui-gtk-7.1.0-150500.49.18.1
* qemu-ui-gtk-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-opengl-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1
* qemu-ui-spice-core-7.1.0-150500.49.18.1
* qemu-audio-spice-7.1.0-150500.49.18.1
* qemu-audio-spice-debuginfo-7.1.0-150500.49.18.1
* qemu-ui-spice-app-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-qxl-7.1.0-150500.49.18.1
* qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (noarch)
* qemu-sgabios-8-150500.49.18.1
* qemu-skiboot-7.1.0-150500.49.18.1
* qemu-ipxe-1.0.0+-150500.49.18.1
* qemu-SLOF-7.1.0-150500.49.18.1
* qemu-seabios-1.16.0_0_gd239552-150500.49.18.1
* qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1
* Server Applications Module 15-SP5 (ppc64le)
* qemu-ppc-debuginfo-7.1.0-150500.49.18.1
* qemu-ppc-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (s390x x86_64)
* qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.18.1
* qemu-kvm-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1
* qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (s390x)
* qemu-s390x-7.1.0-150500.49.18.1
* qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.18.1
* qemu-s390x-debuginfo-7.1.0-150500.49.18.1
* qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.18.1
* Server Applications Module 15-SP5 (x86_64)
* qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-alsa-7.1.0-150500.49.18.1
* qemu-audio-pa-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-7.1.0-150500.49.18.1
* qemu-accel-tcg-x86-7.1.0-150500.49.18.1
* qemu-audio-alsa-debuginfo-7.1.0-150500.49.18.1
* qemu-x86-debuginfo-7.1.0-150500.49.18.1
* qemu-audio-pa-7.1.0-150500.49.18.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4467.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227322
1
0
02 Sep '24
# Security update for libqt5-qtquick3d
Announcement ID: SUSE-SU-2024:3078-1
Rating: important
References:
* bsc#1228199
Cross-References:
* CVE-2024-40724
CVSS scores:
* CVE-2024-40724 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40724 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for libqt5-qtquick3d fixes the following issues:
* CVE-2024-40724: Fixed heap-based buffer overflow in the PLY importer class
in assimp (bsc#1228199)
Other fixes: \- Fix progressive anti-aliasing, which doesn't work if any object
in the scene used a PrincipledMaterial \- Skip processing unknown uniforms, such
as those that are vendor specific:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3078=1 openSUSE-SLE-15.5-2024-3078=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3078=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libQt5Quick3D5-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-devel-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-examples-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-imports-5.15.8+kde1-150500.3.3.1
* libQt5Quick3D5-5.15.8+kde1-150500.3.3.1
* libQt5Quick3DAssetImport5-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-examples-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-private-headers-devel-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-tools-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-imports-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-tools-debuginfo-5.15.8+kde1-150500.3.3.1
* libQt5Quick3DAssetImport5-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-debugsource-5.15.8+kde1-150500.3.3.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* libQt5Quick3D5-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-debuginfo-5.15.8+kde1-150500.3.3.1
* libQt5Quick3D5-5.15.8+kde1-150500.3.3.1
* libQt5Quick3DAssetImport5-5.15.8+kde1-150500.3.3.1
* libQt5Quick3DAssetImport5-debuginfo-5.15.8+kde1-150500.3.3.1
* libqt5-qtquick3d-debugsource-5.15.8+kde1-150500.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40724.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228199
1
0
02 Sep '24
# Security update for libqt5-qt3d
Announcement ID: SUSE-SU-2024:3079-1
Rating: important
References:
* bsc#1228204
Cross-References:
* CVE-2024-40724
CVSS scores:
* CVE-2024-40724 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-40724 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for libqt5-qt3d fixes the following issues:
* CVE-2024-40724: Fixed heap-based buffer overflow in the PLY importer class
in assimp (bsc#1228204)
Other fixes: \- Check for a nullptr returned from the shader manager \- Fill
image with transparency by default to avoid having junk if it's not filled
properly before the first paint call \- Fix QTextureAtlas parenting that could
lead to crashes due to being used after free'd.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3079=1 openSUSE-SLE-15.5-2024-3079=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3079=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libQt53DQuickScene2D5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickAnimation-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-examples-5.15.8+kde0-150500.3.3.1
* libQt53DLogic5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DCore5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickInput5-5.15.8+kde0-150500.3.3.1
* libQt53DRender-devel-5.15.8+kde0-150500.3.3.1
* libQt53DAnimation-devel-5.15.8+kde0-150500.3.3.1
* libQt53DInput-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-devel-5.15.8+kde0-150500.3.3.1
* libQt53DRender5-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-examples-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DAnimation5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DExtras5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DAnimation5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickInput5-debuginfo-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-tools-5.15.8+kde0-150500.3.3.1
* libQt53DQuick-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickAnimation5-5.15.8+kde0-150500.3.3.1
* libQt53DInput5-5.15.8+kde0-150500.3.3.1
* libQt53DExtras-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickExtras5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickScene2D5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickRender5-5.15.8+kde0-150500.3.3.1
* libQt53DQuick5-debuginfo-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-imports-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickInput-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickExtras-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickRender-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-imports-5.15.8+kde0-150500.3.3.1
* libQt53DQuick5-5.15.8+kde0-150500.3.3.1
* libQt53DExtras5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickScene2D-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DCore-devel-5.15.8+kde0-150500.3.3.1
* libQt53DCore5-debuginfo-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-debugsource-5.15.8+kde0-150500.3.3.1
* libQt53DInput5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickExtras5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickRender5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DLogic-devel-5.15.8+kde0-150500.3.3.1
* libQt53DLogic5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickAnimation5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DRender5-debuginfo-5.15.8+kde0-150500.3.3.1
* openSUSE Leap 15.5 (noarch)
* libqt5-qt3d-private-headers-devel-5.15.8+kde0-150500.3.3.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libQt53DQuickScene2D5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickAnimation-devel-5.15.8+kde0-150500.3.3.1
* libQt53DLogic5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DCore5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickInput5-5.15.8+kde0-150500.3.3.1
* libQt53DRender-devel-5.15.8+kde0-150500.3.3.1
* libQt53DAnimation-devel-5.15.8+kde0-150500.3.3.1
* libQt53DInput-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-devel-5.15.8+kde0-150500.3.3.1
* libQt53DRender5-5.15.8+kde0-150500.3.3.1
* libQt53DAnimation5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DExtras5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DAnimation5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickInput5-debuginfo-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-tools-5.15.8+kde0-150500.3.3.1
* libQt53DQuick-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickAnimation5-5.15.8+kde0-150500.3.3.1
* libQt53DInput5-5.15.8+kde0-150500.3.3.1
* libQt53DExtras-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickExtras5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickScene2D5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickRender5-5.15.8+kde0-150500.3.3.1
* libQt53DQuick5-debuginfo-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-imports-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickInput-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickExtras-devel-5.15.8+kde0-150500.3.3.1
* libQt53DQuickRender-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-imports-5.15.8+kde0-150500.3.3.1
* libQt53DQuick5-5.15.8+kde0-150500.3.3.1
* libQt53DExtras5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickScene2D-devel-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DCore-devel-5.15.8+kde0-150500.3.3.1
* libQt53DCore5-debuginfo-5.15.8+kde0-150500.3.3.1
* libqt5-qt3d-debugsource-5.15.8+kde0-150500.3.3.1
* libQt53DInput5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DQuickExtras5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickRender5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DLogic-devel-5.15.8+kde0-150500.3.3.1
* libQt53DLogic5-5.15.8+kde0-150500.3.3.1
* libQt53DQuickAnimation5-debuginfo-5.15.8+kde0-150500.3.3.1
* libQt53DRender5-debuginfo-5.15.8+kde0-150500.3.3.1
* Desktop Applications Module 15-SP5 (noarch)
* libqt5-qt3d-private-headers-devel-5.15.8+kde0-150500.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40724.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228204
1
0
# Security update for curl
Announcement ID: SUSE-SU-2024:3080-1
Rating: moderate
References:
* bsc#1228535
Cross-References:
* CVE-2024-7264
CVSS scores:
* CVE-2024-7264 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-7264 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for curl fixes the following issues:
* CVE-2024-7264: Fixed out-of-bounds read in ASN.1 date parser GTime2str()
(bsc#1228535)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3080=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3080=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3080=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3080=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3080=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3080=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3080=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3080=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3080=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3080=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3080=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3080=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3080=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3080=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcurl-devel-8.0.1-150400.5.47.1
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* openSUSE Leap 15.4 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.47.1
* libcurl4-32bit-8.0.1-150400.5.47.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.47.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl-devel-64bit-8.0.1-150400.5.47.1
* libcurl4-64bit-8.0.1-150400.5.47.1
* libcurl4-64bit-debuginfo-8.0.1-150400.5.47.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcurl-devel-8.0.1-150400.5.47.1
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* openSUSE Leap 15.5 (x86_64)
* libcurl-devel-32bit-8.0.1-150400.5.47.1
* libcurl4-32bit-8.0.1-150400.5.47.1
* libcurl4-32bit-debuginfo-8.0.1-150400.5.47.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Manager Proxy 4.3 (x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libcurl4-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcurl-devel-8.0.1-150400.5.47.1
* libcurl4-debuginfo-8.0.1-150400.5.47.1
* curl-debugsource-8.0.1-150400.5.47.1
* curl-debuginfo-8.0.1-150400.5.47.1
* libcurl4-8.0.1-150400.5.47.1
* curl-8.0.1-150400.5.47.1
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-debuginfo-8.0.1-150400.5.47.1
* libcurl4-32bit-8.0.1-150400.5.47.1
## References:
* https://www.suse.com/security/cve/CVE-2024-7264.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228535
1
0
02 Sep '24
# Security update for kernel-firmware
Announcement ID: SUSE-SU-2024:3081-1
Rating: important
References:
* bsc#1229069
Cross-References:
* CVE-2023-31315
CVSS scores:
* CVE-2023-31315 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for kernel-firmware fixes the following issues:
* CVE-2023-31315: Fixed validation in a model specific register (MSR) that
lead to modification of SMM configuration by malicious program with ring0
access (bsc#1229069)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3081=1 openSUSE-SLE-15.5-2024-3081=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3081=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3081=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3081=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* kernel-firmware-liquidio-20230724-150500.3.12.1
* kernel-firmware-nfp-20230724-150500.3.12.1
* kernel-firmware-brcm-20230724-150500.3.12.1
* kernel-firmware-mwifiex-20230724-150500.3.12.1
* kernel-firmware-chelsio-20230724-150500.3.12.1
* kernel-firmware-intel-20230724-150500.3.12.1
* kernel-firmware-ueagle-20230724-150500.3.12.1
* kernel-firmware-bluetooth-20230724-150500.3.12.1
* kernel-firmware-bnx2-20230724-150500.3.12.1
* kernel-firmware-sound-20230724-150500.3.12.1
* kernel-firmware-ath11k-20230724-150500.3.12.1
* kernel-firmware-mellanox-20230724-150500.3.12.1
* kernel-firmware-network-20230724-150500.3.12.1
* kernel-firmware-iwlwifi-20230724-150500.3.12.1
* kernel-firmware-atheros-20230724-150500.3.12.1
* kernel-firmware-mediatek-20230724-150500.3.12.1
* kernel-firmware-20230724-150500.3.12.1
* kernel-firmware-ti-20230724-150500.3.12.1
* kernel-firmware-i915-20230724-150500.3.12.1
* kernel-firmware-media-20230724-150500.3.12.1
* kernel-firmware-ath10k-20230724-150500.3.12.1
* kernel-firmware-qcom-20230724-150500.3.12.1
* kernel-firmware-marvell-20230724-150500.3.12.1
* kernel-firmware-qlogic-20230724-150500.3.12.1
* kernel-firmware-platform-20230724-150500.3.12.1
* kernel-firmware-prestera-20230724-150500.3.12.1
* kernel-firmware-dpaa2-20230724-150500.3.12.1
* kernel-firmware-realtek-20230724-150500.3.12.1
* kernel-firmware-usb-network-20230724-150500.3.12.1
* kernel-firmware-all-20230724-150500.3.12.1
* ucode-amd-20230724-150500.3.12.1
* kernel-firmware-radeon-20230724-150500.3.12.1
* kernel-firmware-serial-20230724-150500.3.12.1
* kernel-firmware-nvidia-20230724-150500.3.12.1
* kernel-firmware-amdgpu-20230724-150500.3.12.1
* openSUSE Leap Micro 5.5 (noarch)
* kernel-firmware-liquidio-20230724-150500.3.12.1
* kernel-firmware-nfp-20230724-150500.3.12.1
* kernel-firmware-brcm-20230724-150500.3.12.1
* kernel-firmware-mwifiex-20230724-150500.3.12.1
* kernel-firmware-chelsio-20230724-150500.3.12.1
* kernel-firmware-intel-20230724-150500.3.12.1
* kernel-firmware-ueagle-20230724-150500.3.12.1
* kernel-firmware-bluetooth-20230724-150500.3.12.1
* kernel-firmware-bnx2-20230724-150500.3.12.1
* kernel-firmware-sound-20230724-150500.3.12.1
* kernel-firmware-ath11k-20230724-150500.3.12.1
* kernel-firmware-mellanox-20230724-150500.3.12.1
* kernel-firmware-network-20230724-150500.3.12.1
* kernel-firmware-iwlwifi-20230724-150500.3.12.1
* kernel-firmware-atheros-20230724-150500.3.12.1
* kernel-firmware-mediatek-20230724-150500.3.12.1
* kernel-firmware-ti-20230724-150500.3.12.1
* kernel-firmware-i915-20230724-150500.3.12.1
* kernel-firmware-media-20230724-150500.3.12.1
* kernel-firmware-ath10k-20230724-150500.3.12.1
* kernel-firmware-qcom-20230724-150500.3.12.1
* kernel-firmware-marvell-20230724-150500.3.12.1
* kernel-firmware-qlogic-20230724-150500.3.12.1
* kernel-firmware-platform-20230724-150500.3.12.1
* kernel-firmware-prestera-20230724-150500.3.12.1
* kernel-firmware-dpaa2-20230724-150500.3.12.1
* kernel-firmware-realtek-20230724-150500.3.12.1
* kernel-firmware-usb-network-20230724-150500.3.12.1
* kernel-firmware-all-20230724-150500.3.12.1
* ucode-amd-20230724-150500.3.12.1
* kernel-firmware-radeon-20230724-150500.3.12.1
* kernel-firmware-serial-20230724-150500.3.12.1
* kernel-firmware-nvidia-20230724-150500.3.12.1
* kernel-firmware-amdgpu-20230724-150500.3.12.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-firmware-liquidio-20230724-150500.3.12.1
* kernel-firmware-nfp-20230724-150500.3.12.1
* kernel-firmware-brcm-20230724-150500.3.12.1
* kernel-firmware-mwifiex-20230724-150500.3.12.1
* kernel-firmware-chelsio-20230724-150500.3.12.1
* kernel-firmware-intel-20230724-150500.3.12.1
* kernel-firmware-ueagle-20230724-150500.3.12.1
* kernel-firmware-bluetooth-20230724-150500.3.12.1
* kernel-firmware-bnx2-20230724-150500.3.12.1
* kernel-firmware-sound-20230724-150500.3.12.1
* kernel-firmware-ath11k-20230724-150500.3.12.1
* kernel-firmware-mellanox-20230724-150500.3.12.1
* kernel-firmware-network-20230724-150500.3.12.1
* kernel-firmware-iwlwifi-20230724-150500.3.12.1
* kernel-firmware-atheros-20230724-150500.3.12.1
* kernel-firmware-mediatek-20230724-150500.3.12.1
* kernel-firmware-ti-20230724-150500.3.12.1
* kernel-firmware-i915-20230724-150500.3.12.1
* kernel-firmware-media-20230724-150500.3.12.1
* kernel-firmware-ath10k-20230724-150500.3.12.1
* kernel-firmware-qcom-20230724-150500.3.12.1
* kernel-firmware-marvell-20230724-150500.3.12.1
* kernel-firmware-qlogic-20230724-150500.3.12.1
* kernel-firmware-platform-20230724-150500.3.12.1
* kernel-firmware-prestera-20230724-150500.3.12.1
* kernel-firmware-dpaa2-20230724-150500.3.12.1
* kernel-firmware-realtek-20230724-150500.3.12.1
* kernel-firmware-usb-network-20230724-150500.3.12.1
* kernel-firmware-all-20230724-150500.3.12.1
* ucode-amd-20230724-150500.3.12.1
* kernel-firmware-radeon-20230724-150500.3.12.1
* kernel-firmware-serial-20230724-150500.3.12.1
* kernel-firmware-nvidia-20230724-150500.3.12.1
* kernel-firmware-amdgpu-20230724-150500.3.12.1
* Basesystem Module 15-SP5 (noarch)
* kernel-firmware-liquidio-20230724-150500.3.12.1
* kernel-firmware-nfp-20230724-150500.3.12.1
* kernel-firmware-brcm-20230724-150500.3.12.1
* kernel-firmware-mwifiex-20230724-150500.3.12.1
* kernel-firmware-chelsio-20230724-150500.3.12.1
* kernel-firmware-intel-20230724-150500.3.12.1
* kernel-firmware-ueagle-20230724-150500.3.12.1
* kernel-firmware-bluetooth-20230724-150500.3.12.1
* kernel-firmware-bnx2-20230724-150500.3.12.1
* kernel-firmware-sound-20230724-150500.3.12.1
* kernel-firmware-ath11k-20230724-150500.3.12.1
* kernel-firmware-mellanox-20230724-150500.3.12.1
* kernel-firmware-network-20230724-150500.3.12.1
* kernel-firmware-iwlwifi-20230724-150500.3.12.1
* kernel-firmware-atheros-20230724-150500.3.12.1
* kernel-firmware-mediatek-20230724-150500.3.12.1
* kernel-firmware-ti-20230724-150500.3.12.1
* kernel-firmware-i915-20230724-150500.3.12.1
* kernel-firmware-media-20230724-150500.3.12.1
* kernel-firmware-ath10k-20230724-150500.3.12.1
* kernel-firmware-qcom-20230724-150500.3.12.1
* kernel-firmware-marvell-20230724-150500.3.12.1
* kernel-firmware-qlogic-20230724-150500.3.12.1
* kernel-firmware-platform-20230724-150500.3.12.1
* kernel-firmware-prestera-20230724-150500.3.12.1
* kernel-firmware-dpaa2-20230724-150500.3.12.1
* kernel-firmware-realtek-20230724-150500.3.12.1
* kernel-firmware-usb-network-20230724-150500.3.12.1
* kernel-firmware-all-20230724-150500.3.12.1
* ucode-amd-20230724-150500.3.12.1
* kernel-firmware-radeon-20230724-150500.3.12.1
* kernel-firmware-serial-20230724-150500.3.12.1
* kernel-firmware-nvidia-20230724-150500.3.12.1
* kernel-firmware-amdgpu-20230724-150500.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2023-31315.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229069
1
0
02 Sep '24
# Security update for 389-ds
Announcement ID: SUSE-SU-2024:3082-1
Rating: important
References:
* bsc#1225507
* bsc#1225512
* bsc#1226277
* bsc#1228912
Cross-References:
* CVE-2024-2199
* CVE-2024-3657
* CVE-2024-5953
CVSS scores:
* CVE-2024-2199 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-3657 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5953 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities and has one security fix can now be
installed.
## Description:
This update for 389-ds fixes the following issues:
Security issues fixed:
* CVE-2024-3657: Fixed potential denial of service via specially crafted
kerberos AS-REQ request (bsc#1225512)
* CVE-2024-5953: Fixed a denial of service caused by malformed userPassword
hashes (bsc#1226277)
* CVE-2024-2199: Fixed a crash caused by malformed userPassword in do_modify()
(bsc#1225507)
Non-security issues fixed:
* crash when user does change password using iso-8859-1 encoding (bsc#1228912)
* Update to version 2.2.10~git2.345056d3:
* Issue 2324 - Add a CI test (#6289)
* Issue 6284 - BUG - freelist ordering causes high wtime
* Update to version 2.2.10~git0.4d7218b7:
* Bump version to 2.2.10
* Issue 5327 - Fix test metadata
* Issue 5853 - Update Cargo.lock
* Issue 5962 - Rearrange includes for 32-bit support logic
* Issue 5973 - Fix fedora cop RawHide builds (#5974)
* Bump braces from 3.0.2 to 3.0.3 in /src/cockpit/389-console
* Issue 6254 - Enabling replication for a sub suffix crashes browser (#6255)
* Issue 6224 - d2entry - Could not open id2entry err 0 - at startup when
having sub-suffixes (#6225)
* Issue 6183 - Slow ldif2db import on a newly created BDB backend (#6208)
* Issue 6170 - audit log buffering doesn't handle large updates
* Issue 6193 - Test failure: test_tls_command_returns_error_text
* Issue 6189 - CI tests fail with `[Errno 2] No such file or directory:
'/var/cache/dnf/metadata_lock.pid'`
* Issue 6172 - RFE: improve the performance of evaluation of filter component
when tested against a large valueset (like group members) (#6173)
* Issue 6092 - passwordHistory is not updated with a pre-hashed password
(#6093)
* Issue 6080 - ns-slapd crash in referint_get_config (#6081)
* Issue 6117 - Fix the UTC offset print (#6118)
* Issue 5305 - OpenLDAP version autodetection doesn't work
* Issue 6112 - RFE - add new operation note for MFA authentications
* Issue 5842 - Add log buffering to audit log
* Issue 6103 - New connection timeout error breaks errormap (#6104)
* Issue 6067 - Improve dsidm CLI No Such Entry handling (#6079)
* Issue 6096 - Improve connection timeout error logging (#6097)
* Issue 6067 - Add hidden -v and -j options to each CLI subcommand (#6088)
* Issue 5487 - Fix various isses with logconv.pl (#6085)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3082=1 openSUSE-SLE-15.5-2024-3082=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3082=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* 389-ds-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-debugsource-2.2.10~git2.345056d3-150500.3.21.1
* libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-snmp-debuginfo-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-debuginfo-2.2.10~git2.345056d3-150500.3.21.1
* libsvrcore0-debuginfo-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1
* lib389-2.2.10~git2.345056d3-150500.3.21.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* 389-ds-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-debugsource-2.2.10~git2.345056d3-150500.3.21.1
* libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-debuginfo-2.2.10~git2.345056d3-150500.3.21.1
* libsvrcore0-debuginfo-2.2.10~git2.345056d3-150500.3.21.1
* 389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1
* lib389-2.2.10~git2.345056d3-150500.3.21.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2199.html
* https://www.suse.com/security/cve/CVE-2024-3657.html
* https://www.suse.com/security/cve/CVE-2024-5953.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225507
* https://bugzilla.suse.com/show_bug.cgi?id=1225512
* https://bugzilla.suse.com/show_bug.cgi?id=1226277
* https://bugzilla.suse.com/show_bug.cgi?id=1228912
1
0
02 Sep '24
# Security update for zziplib
Announcement ID: SUSE-SU-2024:3083-1
Rating: moderate
References:
* bsc#1227178
Cross-References:
* CVE-2024-39134
CVSS scores:
* CVE-2024-39134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for zziplib fixes the following issues:
* CVE-2024-39134: Fixed a stack buffer overflow via the
__zzip_fetch_disk_trailer() (bsc#1227178)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3083=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3083=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* zziplib-devel-debuginfo-0.13.69-150000.3.20.1
* zziplib-devel-0.13.69-150000.3.20.1
* libzzip-0-13-debuginfo-0.13.69-150000.3.20.1
* libzzip-0-13-0.13.69-150000.3.20.1
* zziplib-debugsource-0.13.69-150000.3.20.1
* openSUSE Leap 15.5 (x86_64)
* libzzip-0-13-32bit-debuginfo-0.13.69-150000.3.20.1
* zziplib-devel-32bit-debuginfo-0.13.69-150000.3.20.1
* zziplib-devel-32bit-0.13.69-150000.3.20.1
* libzzip-0-13-32bit-0.13.69-150000.3.20.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* zziplib-devel-debuginfo-0.13.69-150000.3.20.1
* zziplib-devel-0.13.69-150000.3.20.1
* libzzip-0-13-debuginfo-0.13.69-150000.3.20.1
* libzzip-0-13-0.13.69-150000.3.20.1
* zziplib-debugsource-0.13.69-150000.3.20.1
## References:
* https://www.suse.com/security/cve/CVE-2024-39134.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227178
1
0
openSUSE-SU-2024:0274-1: important: Security update for cacti, cacti-spine
by opensuse-security@opensuse.org 02 Sep '24
by opensuse-security@opensuse.org 02 Sep '24
02 Sep '24
openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0274-1
Rating: important
References: #1224229 #1224230 #1224231 #1224235 #1224236
#1224237 #1224238 #1224239 #1224240 #1224241
Cross-References: CVE-2024-25641 CVE-2024-27082 CVE-2024-29894
CVE-2024-31443 CVE-2024-31444 CVE-2024-31445
CVE-2024-31458 CVE-2024-31459 CVE-2024-31460
CVE-2024-34340
Affected Products:
SUSE Linux Enterprise High Performance Computing 12
SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Server 12-SP4
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Server for SAP Applications 12-SP3
SUSE Linux Enterprise Server for SAP Applications 12-SP4
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Package Hub for SUSE Linux Enterprise 12
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
- cacti 1.2.27:
* CVE-2024-34340: Authentication Bypass when using using older password
hashes (boo#1224240)
* CVE-2024-25641: RCE vulnerability when importing packages (boo#1224229)
* CVE-2024-31459: RCE vulnerability when plugins include files
(boo#1224238)
* CVE-2024-31460: SQL Injection vulnerability when using tree rules
through Automation API (boo#1224239)
* CVE-2024-29894: XSS vulnerability when using JavaScript based
messaging API (boo#1224231)
* CVE-2024-31458: SQL Injection vulnerability when using form templates
(boo#1224241)
* CVE-2024-31444: XSS vulnerability when reading tree rules with
Automation API (boo#1224236)
* CVE-2024-31443: XSS vulnerability when managing data queries
(boo#1224235)
* CVE-2024-31445: SQL Injection vulnerability when retrieving graphs
using Automation API (boo#1224237)
* CVE-2024-27082: XSS vulnerability when managing trees (boo#1224230)
* Improve PHP 8.3 support
* When importing packages via command line, data source profile could
not be selected
* When changing password, returning to previous page does not always work
* When using LDAP authentication the first time, warnings may appear in
logs
* When editing/viewing devices, add IPv6 info to hostname tooltip
* Improve speed of polling when Boost is enabled
* Improve support for Half-Hour time zones
* When user session not found, device lists can be incorrectly returned
* On import, legacy templates may generate warnings
* Improve support for alternate locations of Ping
* Improve PHP 8.1 support for Installer
* Fix issues with number formatting
* Improve PHP 8.1 support when SpikeKill is run first time
* Improve PHP 8.1 support for SpikeKill
* When using Chinese to search for graphics, garbled characters appear.
* When importing templates, preview mode will not always load
* When remote poller is installed, MySQL TimeZone DB checks are not
performed
* When Remote Poller installation completes, no finish button is shown
* Unauthorized agents should be recorded into logs
* Poller cache may not always update if hostname changes
* When using CMD poller, Failure and Recovery dates may have incorrect
values
* Saving a Tree can cause the tree to become unpublished
* Web Basic Authentication does not record user logins
* When using Accent-based languages, translations may not work properly
* Fix automation expressions for device rules
* Improve PHP 8.1 Support during fresh install with boost
* Add a device "enabled/disabled" indicator next to the graphs
* Notify the admin periodically when a remote data collector goes into
heartbeat status
* Add template for Aruba Clearpass
* Add fliter/sort of Device Templates by Graph Templates
- cacti-spine 1.2.27:
* Restore AES Support
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-274=1
- SUSE Package Hub for SUSE Linux Enterprise 12:
zypper in -t patch openSUSE-2024-274=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
cacti-spine-1.2.27-bp155.2.9.1
- openSUSE Backports SLE-15-SP5 (noarch):
cacti-1.2.27-bp155.2.9.1
- SUSE Package Hub for SUSE Linux Enterprise 12 (aarch64 ppc64le s390x x86_64):
cacti-spine-1.2.27-35.1
- SUSE Package Hub for SUSE Linux Enterprise 12 (noarch):
cacti-1.2.27-41.1
References:
https://www.suse.com/security/cve/CVE-2024-25641.html
https://www.suse.com/security/cve/CVE-2024-27082.html
https://www.suse.com/security/cve/CVE-2024-29894.html
https://www.suse.com/security/cve/CVE-2024-31443.html
https://www.suse.com/security/cve/CVE-2024-31444.html
https://www.suse.com/security/cve/CVE-2024-31445.html
https://www.suse.com/security/cve/CVE-2024-31458.html
https://www.suse.com/security/cve/CVE-2024-31459.html
https://www.suse.com/security/cve/CVE-2024-31460.html
https://www.suse.com/security/cve/CVE-2024-34340.html
https://bugzilla.suse.com/1224229
https://bugzilla.suse.com/1224230
https://bugzilla.suse.com/1224231
https://bugzilla.suse.com/1224235
https://bugzilla.suse.com/1224236
https://bugzilla.suse.com/1224237
https://bugzilla.suse.com/1224238
https://bugzilla.suse.com/1224239
https://bugzilla.suse.com/1224240
https://bugzilla.suse.com/1224241
1
0
openSUSE-SU-2024:0274-1: important: Security update for cacti, cacti-spine
by opensuse-security@opensuse.org 02 Sep '24
by opensuse-security@opensuse.org 02 Sep '24
02 Sep '24
openSUSE Security Update: Security update for cacti, cacti-spine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0274-1
Rating: important
References: #1224229 #1224230 #1224231 #1224235 #1224236
#1224237 #1224238 #1224239 #1224240 #1224241
Cross-References: CVE-2024-25641 CVE-2024-27082 CVE-2024-29894
CVE-2024-31443 CVE-2024-31444 CVE-2024-31445
CVE-2024-31458 CVE-2024-31459 CVE-2024-31460
CVE-2024-34340
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes 10 vulnerabilities is now available.
Description:
This update for cacti, cacti-spine fixes the following issues:
- cacti 1.2.27:
* CVE-2024-34340: Authentication Bypass when using using older password
hashes (boo#1224240)
* CVE-2024-25641: RCE vulnerability when importing packages (boo#1224229)
* CVE-2024-31459: RCE vulnerability when plugins include files
(boo#1224238)
* CVE-2024-31460: SQL Injection vulnerability when using tree rules
through Automation API (boo#1224239)
* CVE-2024-29894: XSS vulnerability when using JavaScript based
messaging API (boo#1224231)
* CVE-2024-31458: SQL Injection vulnerability when using form templates
(boo#1224241)
* CVE-2024-31444: XSS vulnerability when reading tree rules with
Automation API (boo#1224236)
* CVE-2024-31443: XSS vulnerability when managing data queries
(boo#1224235)
* CVE-2024-31445: SQL Injection vulnerability when retrieving graphs
using Automation API (boo#1224237)
* CVE-2024-27082: XSS vulnerability when managing trees (boo#1224230)
* Improve PHP 8.3 support
* When importing packages via command line, data source profile could
not be selected
* When changing password, returning to previous page does not always work
* When using LDAP authentication the first time, warnings may appear in
logs
* When editing/viewing devices, add IPv6 info to hostname tooltip
* Improve speed of polling when Boost is enabled
* Improve support for Half-Hour time zones
* When user session not found, device lists can be incorrectly returned
* On import, legacy templates may generate warnings
* Improve support for alternate locations of Ping
* Improve PHP 8.1 support for Installer
* Fix issues with number formatting
* Improve PHP 8.1 support when SpikeKill is run first time
* Improve PHP 8.1 support for SpikeKill
* When using Chinese to search for graphics, garbled characters appear.
* When importing templates, preview mode will not always load
* When remote poller is installed, MySQL TimeZone DB checks are not
performed
* When Remote Poller installation completes, no finish button is shown
* Unauthorized agents should be recorded into logs
* Poller cache may not always update if hostname changes
* When using CMD poller, Failure and Recovery dates may have incorrect
values
* Saving a Tree can cause the tree to become unpublished
* Web Basic Authentication does not record user logins
* When using Accent-based languages, translations may not work properly
* Fix automation expressions for device rules
* Improve PHP 8.1 Support during fresh install with boost
* Add a device "enabled/disabled" indicator next to the graphs
* Notify the admin periodically when a remote data collector goes into
heartbeat status
* Add template for Aruba Clearpass
* Add fliter/sort of Device Templates by Graph Templates
- cacti-spine 1.2.27:
* Restore AES Support
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-274=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
cacti-spine-1.2.27-bp155.2.9.1
- openSUSE Backports SLE-15-SP5 (noarch):
cacti-1.2.27-bp155.2.9.1
References:
https://www.suse.com/security/cve/CVE-2024-25641.html
https://www.suse.com/security/cve/CVE-2024-27082.html
https://www.suse.com/security/cve/CVE-2024-29894.html
https://www.suse.com/security/cve/CVE-2024-31443.html
https://www.suse.com/security/cve/CVE-2024-31444.html
https://www.suse.com/security/cve/CVE-2024-31445.html
https://www.suse.com/security/cve/CVE-2024-31458.html
https://www.suse.com/security/cve/CVE-2024-31459.html
https://www.suse.com/security/cve/CVE-2024-31460.html
https://www.suse.com/security/cve/CVE-2024-34340.html
https://bugzilla.suse.com/1224229
https://bugzilla.suse.com/1224230
https://bugzilla.suse.com/1224231
https://bugzilla.suse.com/1224235
https://bugzilla.suse.com/1224236
https://bugzilla.suse.com/1224237
https://bugzilla.suse.com/1224238
https://bugzilla.suse.com/1224239
https://bugzilla.suse.com/1224240
https://bugzilla.suse.com/1224241
1
0
02 Sep '24
# Recommended update for kubernetes1.23
Announcement ID: SUSE-RU-2024:3067-1
Rating: moderate
References:
* bsc#1229008
Affected Products:
* Containers Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for kubernetes1.23 fixes the following issues:
* Fix dependencies installation (bsc#1229008)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3067=1 openSUSE-SLE-15.5-2024-3067=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3067=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3067=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-kubelet-1.23.17-150500.3.18.1
* kubernetes1.23-client-1.23.17-150500.3.18.1
* kubernetes1.23-apiserver-1.23.17-150500.3.18.1
* kubernetes1.23-controller-manager-1.23.17-150500.3.18.1
* kubernetes1.23-proxy-1.23.17-150500.3.18.1
* kubernetes1.23-scheduler-1.23.17-150500.3.18.1
* kubernetes1.23-client-common-1.23.17-150500.3.18.1
* kubernetes1.23-kubeadm-1.23.17-150500.3.18.1
* kubernetes1.23-kubelet-common-1.23.17-150500.3.18.1
* openSUSE Leap 15.5 (noarch)
* kubernetes1.23-client-fish-completion-1.23.17-150500.3.18.1
* kubernetes1.23-client-bash-completion-1.23.17-150500.3.18.1
* openSUSE Leap 15.5 (ppc64le)
* kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.18.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-kubelet-1.23.17-150500.3.18.1
* kubernetes1.23-client-1.23.17-150500.3.18.1
* kubernetes1.23-apiserver-1.23.17-150500.3.18.1
* kubernetes1.23-controller-manager-1.23.17-150500.3.18.1
* kubernetes1.23-proxy-1.23.17-150500.3.18.1
* kubernetes1.23-scheduler-1.23.17-150500.3.18.1
* kubernetes1.23-client-common-1.23.17-150500.3.18.1
* kubernetes1.23-kubeadm-1.23.17-150500.3.18.1
* kubernetes1.23-kubelet-common-1.23.17-150500.3.18.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.23-client-fish-completion-1.23.17-150500.3.18.1
* kubernetes1.23-client-bash-completion-1.23.17-150500.3.18.1
* openSUSE Leap 15.6 (ppc64le)
* kubernetes1.23-apiserver-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-kubelet-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-controller-manager-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-proxy-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-scheduler-debuginfo-1.23.17-150500.3.18.1
* kubernetes1.23-kubeadm-debuginfo-1.23.17-150500.3.18.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kubernetes1.23-client-1.23.17-150500.3.18.1
* kubernetes1.23-client-common-1.23.17-150500.3.18.1
* Containers Module 15-SP5 (ppc64le)
* kubernetes1.23-client-debuginfo-1.23.17-150500.3.18.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229008
1
0
openSUSE-RU-2024:0273-1: moderate: Security update for rust-bindgen.
by maintenance@opensuse.org 01 Sep '24
by maintenance@opensuse.org 01 Sep '24
01 Sep '24
openSUSE Recommended Update: Security update for rust-bindgen.
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0273-1
Rating: moderate
References: #1229375 #1229376
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
rust-bindgen was updated to fix the following issues:
Update to version 0.70.1:
* Revert "Only trigger the publish workflow manually"
* Fix `collapsible_match` clippy warning
* Add `#[clippy::allow]` attribute to `const` layout tests
* Fix creduce example
* Fix creduce install link
* Fix create-tag.yml
Update to version 0.70.0:
* Fix generation of extern "C" blocks with llvm 18
* Update shlex dependency (RUSTSEC-2024-0006, boo#1229375)
* Try to avoid repr(packed) for explicitly aligned types when not needed
* Support Float16
* Fix alignment contribution from bitfields
* Replace peeking_take_while by itertools
* Add blocklist_var
* Stabilize thiscall_abi
* Allow older itertools
* Add target mappings for riscv64imac and riscv32imafc.
* Add a complex macro fallback API
* Add option to use DST structs for flexible arrays
* Add option to dynamically load variables
* Add option in CLI to use rustified non-exhaustive enums
* Remove which and lazy-static dependencies
* Generate compile-time layout tests
* Print bindgen-cli errors to stderr instead of stdout
* Fix --formatter=prettyplease not working in bindgen-cli by adding
prettyplease feature and enabling it by default for bindgen-cli
* Fix --allowlist-item so anonymous enums are no longer ignored
* Use clang_getFileLocation instead of clang_getSpellingLocation to fix
clang-trun
* Fix generated constants: f64::INFINITY, f64::NEG_ INFINITY,f64::NAN
* Update tempfile and rustix due to GHSA-c827-hfw6-qwvm (boo#1229376)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-273=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-273=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
rust-bindgen-0.70.1-bp156.5.1
rust-bindgen-debuginfo-0.70.1-bp156.5.1
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
rust-bindgen-0.70.1-bp155.5.1
References:
https://www.suse.com/security/cve/CVE-2024-43806.html
https://bugzilla.suse.com/1229375
https://bugzilla.suse.com/1229376
1
0