openSUSE Updates
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- 3 participants
- 22659 discussions
10 Oct '24
# Recommended update for wicked
Announcement ID: SUSE-RU-2024:3584-1
Release Date: 2024-10-10T07:13:16Z
Rating: moderate
References:
* bsc#1229555
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for wicked fixes the following issue:
* compat-suse: fix dummy interfaces configuration with `INTERFACETYPE=dummy`
(bsc#1229555).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3584=1 openSUSE-SLE-15.5-2024-3584=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3584=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3584=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3584=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* wicked-0.6.76-150500.3.36.2
* wicked-nbft-0.6.76-150500.3.36.2
* wicked-debuginfo-0.6.76-150500.3.36.2
* wicked-service-0.6.76-150500.3.36.2
* wicked-debugsource-0.6.76-150500.3.36.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* wicked-0.6.76-150500.3.36.2
* wicked-service-0.6.76-150500.3.36.2
* wicked-debuginfo-0.6.76-150500.3.36.2
* wicked-debugsource-0.6.76-150500.3.36.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* wicked-0.6.76-150500.3.36.2
* wicked-service-0.6.76-150500.3.36.2
* wicked-debuginfo-0.6.76-150500.3.36.2
* wicked-debugsource-0.6.76-150500.3.36.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* wicked-0.6.76-150500.3.36.2
* wicked-nbft-0.6.76-150500.3.36.2
* wicked-debuginfo-0.6.76-150500.3.36.2
* wicked-service-0.6.76-150500.3.36.2
* wicked-debugsource-0.6.76-150500.3.36.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229555
1
0
# Security update for redis
Announcement ID: SUSE-SU-2024:3575-1
Release Date: 2024-10-09T16:55:37Z
Rating: important
References:
* bsc#1231264
* bsc#1231265
Cross-References:
* CVE-2024-31228
* CVE-2024-31449
CVSS scores:
* CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-31449 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for redis fixes the following issues:
* CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265)
* CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3575=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3575=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3575=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3575=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3575=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3575=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3575=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3575=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3575=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3575=1
## Package List:
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* SUSE Manager Proxy 4.3 (x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* redis-debugsource-6.2.6-150400.3.28.1
* redis-debuginfo-6.2.6-150400.3.28.1
* redis-6.2.6-150400.3.28.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31228.html
* https://www.suse.com/security/cve/CVE-2024-31449.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231264
* https://bugzilla.suse.com/show_bug.cgi?id=1231265
1
0
09 Oct '24
# Recommended update for go1.22
Announcement ID: SUSE-RU-2024:3573-1
Release Date: 2024-10-09T13:29:32Z
Rating: moderate
References:
* bsc#1218424
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go1.22 fixes the following issues:
* Version update 1.22.8 includes fixes to cgo, and the maps and syscall
packages (bsc#1229122)
* maps: segmentation violation in maps.Clone
* cmd/cgo: alignment issue with int128 inside of a struct
* syscall: TestAmbientCapsUserns fails on Ubuntu 24.04/Linux 6.8.0
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3573=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3573=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3573=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3573=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.22-race-1.22.8-150000.1.30.1
* go1.22-doc-1.22.8-150000.1.30.1
* go1.22-1.22.8-150000.1.30.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.22-race-1.22.8-150000.1.30.1
* go1.22-doc-1.22.8-150000.1.30.1
* go1.22-1.22.8-150000.1.30.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.22-race-1.22.8-150000.1.30.1
* go1.22-doc-1.22.8-150000.1.30.1
* go1.22-1.22.8-150000.1.30.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.22-race-1.22.8-150000.1.30.1
* go1.22-doc-1.22.8-150000.1.30.1
* go1.22-1.22.8-150000.1.30.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218424
1
0
09 Oct '24
# Recommended update for go1.23
Announcement ID: SUSE-RU-2024:3574-1
Release Date: 2024-10-09T13:29:54Z
Rating: moderate
References:
* bsc#1229122
Affected Products:
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for go1.23 fixes the following issues:
* Version update 1.23.2 includes fixes to the compiler, cgo, the runtime,
maps, os, os/exec, time, and unique packages (bsc#1229122)
* os: double close pidfd if caller uses pidfd updated by os.StartProcess
* maps: segmentation violation in maps.Clone
* cmd/cgo: alignment issue with int128 inside of a struct
* unique: fatal error: found pointer to free object
* runtime,time: timer.Stop returns false even when no value is read from the
channel
* unique: large string still referenced, after interning only a small
substring
* os/exec: resource leak on exec failure
* cmd/compile: mysterious crashes and non-determinism with range over func
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3574=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3574=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3574=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3574=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.2-150000.1.9.1
* go1.23-1.23.2-150000.1.9.1
* go1.23-doc-1.23.2-150000.1.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.2-150000.1.9.1
* go1.23-1.23.2-150000.1.9.1
* go1.23-doc-1.23.2-150000.1.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.2-150000.1.9.1
* go1.23-1.23.2-150000.1.9.1
* go1.23-doc-1.23.2-150000.1.9.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* go1.23-race-1.23.2-150000.1.9.1
* go1.23-1.23.2-150000.1.9.1
* go1.23-doc-1.23.2-150000.1.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229122
1
0
openSUSE-SU-2024:0329-1: important: Security update for seamonkey
by opensuse-securityďĽ opensuse.org 09 Oct '24
by opensuse-securityďĽ opensuse.org 09 Oct '24
09 Oct '24
openSUSE Security Update: Security update for seamonkey
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0329-1
Rating: important
References: #1230257
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for seamonkey fixes the following issues:
update to SeaMonkey 2.53.19:
* Cancel button in SeaMonkey bookmarking star ui not working bug 1872623.
* Remove OfflineAppCacheHelper.jsm copy from SeaMonkey and use the
one in toolkit bug 1896292.
* Remove obsolete registerFactoryLocation calls from cZ bug 1870930.
* Remove needless implements='nsIDOMEventListener' and QI bug 1611010.
* Replace use of nsIStandardURL::Init bug 1864355.
* Switch SeaMonkey website from hg.mozilla.org to heptapod. bug 1870934.
* Allow view-image to open a data: URI by setting a flag on the loadinfo
bug 1877001.
* Save-link-as feature should use the loading principal and context menu
using nsIContentPolicy.TYPE_SAVE_AS_DOWNLOAD bug 1879726.
* Use punycode in SeaMonkey JS bug 1864287.
* Font lists in preferences are no longer grouped by font type, port
asynchronous handling like Bug 1399206 bug 1437393.
* SeaMonkey broken tab after undo closed tab with invalid protocol bug
1885748.
* SeaMonkey session restore is missing the checkboxes in the Classic
theme bug 1896174.
* Implement about:credits on seamonkey-project.org website bug 1898467.
* Fix for the 0.0.0.0 day vulnerability oligo summary.
* Link in update notification does not open Browser bug 1888364.
* Update ReadExtensionPrefs in Preferences.cpp bug 1890196.
* Add about:seamonkey page to SeaMonkey bug 1897801.
* SeaMonkey 2.53.19 uses the same backend as Firefox and contains the
relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.19 shares most parts of the mail and news code with
Thunderbird. Please read the Thunderbird 60.8.0 release notes for
specific security fixes in this release.
* Additional important security fixes up to Current Firefox 115.14 and
Thunderbird 115.14 ESR plus many enhancements have been backported. We
will continue to enhance SeaMonkey security in subsequent 2.53.x beta
and release versions as fast as we are able to.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-329=1
Package List:
- openSUSE Backports SLE-15-SP6 (i586 x86_64):
seamonkey-2.53.19-bp156.2.3.1
seamonkey-dom-inspector-2.53.19-bp156.2.3.1
seamonkey-irc-2.53.19-bp156.2.3.1
References:
https://bugzilla.suse.com/1230257
1
0
openSUSE-SU-2024:0328-1: moderate: Security update for roundcubemail
by opensuse-securityďĽ opensuse.org 09 Oct '24
by opensuse-securityďĽ opensuse.org 09 Oct '24
09 Oct '24
openSUSE Security Update: Security update for roundcubemail
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0328-1
Rating: moderate
References: #1228900 #1228901
Cross-References: CVE-2024-42008 CVE-2024-42009 CVE-2024-42010
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for roundcubemail fixes the following issues:
Update to 1.6.8 This is a security update to the stable version 1.6 of
Roundcube Webmail. It provides fixes to recently reported security
vulnerabilities:
* Fix XSS vulnerability in post-processing of sanitized HTML content
[CVE-2024-42009]
* Fix XSS vulnerability in serving of attachments other than HTML or SVG
[CVE-2024-42008]
* Fix information leak (access to remote content) via insufficient CSS
filtering [CVE-2024-42010]
CHANGELOG
* Managesieve: Protect special scripts in managesieve_kolab_master mode
* Fix newmail_notifier notification focus in Chrome (#9467)
* Fix fatal error when parsing some TNEF attachments (#9462)
* Fix double scrollbar when composing a mail with many plain text lines
(#7760)
* Fix decoding mail parts with multiple base64-encoded text blocks
(#9290)
* Fix bug where some messages could get malformed in an import from a
MBOX file (#9510)
* Fix invalid line break characters in multi-line text in Sieve scripts
(#9543)
* Fix bug where "with attachment" filter could fail on some fts engines
(#9514)
* Fix bug where an unhandled exception was caused by an invalid image
attachment (#9475)
* Fix bug where a long subject title could not be displayed in some
cases (#9416)
* Fix infinite loop when parsing malformed Sieve script (#9562)
* Fix bug where imap_conn_option's 'socket' was ignored (#9566)
* Fix XSS vulnerability in post-processing of sanitized HTML content
[CVE-2024-42009]
* Fix XSS vulnerability in serving of attachments other than HTML or SVG
[CVE-2024-42008]
* Fix information leak (access to remote content) via insufficient CSS
filtering [CVE-2024-42010]
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-328=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-328=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
roundcubemail-1.6.8-bp156.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
roundcubemail-1.6.8-bp155.2.12.1
References:
https://www.suse.com/security/cve/CVE-2024-42008.html
https://www.suse.com/security/cve/CVE-2024-42009.html
https://www.suse.com/security/cve/CVE-2024-42010.html
https://bugzilla.suse.com/1228900
https://bugzilla.suse.com/1228901
1
0
09 Oct '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3561-1
Release Date: 2024-10-09T08:45:37Z
Rating: important
References:
* bsc#1012628
* bsc#1183045
* bsc#1215199
* bsc#1216223
* bsc#1216776
* bsc#1220382
* bsc#1221527
* bsc#1221610
* bsc#1221650
* bsc#1222629
* bsc#1223600
* bsc#1223848
* bsc#1225487
* bsc#1225812
* bsc#1225903
* bsc#1226003
* bsc#1226507
* bsc#1226606
* bsc#1226666
* bsc#1226846
* bsc#1226860
* bsc#1227487
* bsc#1227694
* bsc#1227726
* bsc#1227819
* bsc#1227885
* bsc#1227890
* bsc#1227962
* bsc#1228090
* bsc#1228140
* bsc#1228244
* bsc#1228507
* bsc#1228771
* bsc#1229001
* bsc#1229004
* bsc#1229019
* bsc#1229086
* bsc#1229167
* bsc#1229169
* bsc#1229289
* bsc#1229334
* bsc#1229362
* bsc#1229363
* bsc#1229364
* bsc#1229371
* bsc#1229380
* bsc#1229389
* bsc#1229394
* bsc#1229429
* bsc#1229443
* bsc#1229452
* bsc#1229455
* bsc#1229456
* bsc#1229494
* bsc#1229585
* bsc#1229753
* bsc#1229764
* bsc#1229768
* bsc#1229790
* bsc#1229810
* bsc#1229899
* bsc#1229928
* bsc#1230015
* bsc#1230119
* bsc#1230123
* bsc#1230124
* bsc#1230125
* bsc#1230169
* bsc#1230170
* bsc#1230171
* bsc#1230173
* bsc#1230174
* bsc#1230175
* bsc#1230176
* bsc#1230178
* bsc#1230180
* bsc#1230181
* bsc#1230185
* bsc#1230191
* bsc#1230192
* bsc#1230193
* bsc#1230194
* bsc#1230195
* bsc#1230200
* bsc#1230204
* bsc#1230206
* bsc#1230207
* bsc#1230209
* bsc#1230211
* bsc#1230213
* bsc#1230217
* bsc#1230221
* bsc#1230224
* bsc#1230230
* bsc#1230232
* bsc#1230233
* bsc#1230240
* bsc#1230244
* bsc#1230245
* bsc#1230247
* bsc#1230248
* bsc#1230269
* bsc#1230270
* bsc#1230295
* bsc#1230340
* bsc#1230426
* bsc#1230430
* bsc#1230431
* bsc#1230432
* bsc#1230433
* bsc#1230434
* bsc#1230435
* bsc#1230440
* bsc#1230441
* bsc#1230442
* bsc#1230444
* bsc#1230450
* bsc#1230451
* bsc#1230454
* bsc#1230455
* bsc#1230457
* bsc#1230459
* bsc#1230506
* bsc#1230507
* bsc#1230511
* bsc#1230515
* bsc#1230517
* bsc#1230518
* bsc#1230519
* bsc#1230520
* bsc#1230521
* bsc#1230524
* bsc#1230526
* bsc#1230533
* bsc#1230535
* bsc#1230539
* bsc#1230540
* bsc#1230549
* bsc#1230556
* bsc#1230562
* bsc#1230563
* bsc#1230564
* bsc#1230580
* bsc#1230582
* bsc#1230589
* bsc#1230602
* bsc#1230699
* bsc#1230700
* bsc#1230701
* bsc#1230702
* bsc#1230703
* bsc#1230704
* bsc#1230705
* bsc#1230706
* bsc#1230709
* bsc#1230711
* bsc#1230712
* bsc#1230715
* bsc#1230719
* bsc#1230722
* bsc#1230724
* bsc#1230725
* bsc#1230726
* bsc#1230727
* bsc#1230730
* bsc#1230731
* bsc#1230732
* bsc#1230747
* bsc#1230748
* bsc#1230749
* bsc#1230751
* bsc#1230752
* bsc#1230753
* bsc#1230756
* bsc#1230761
* bsc#1230766
* bsc#1230767
* bsc#1230768
* bsc#1230771
* bsc#1230772
* bsc#1230775
* bsc#1230776
* bsc#1230780
* bsc#1230783
* bsc#1230786
* bsc#1230787
* bsc#1230791
* bsc#1230794
* bsc#1230796
* bsc#1230802
* bsc#1230806
* bsc#1230808
* bsc#1230809
* bsc#1230810
* bsc#1230812
* bsc#1230813
* bsc#1230814
* bsc#1230815
* bsc#1230821
* bsc#1230825
* bsc#1230830
* bsc#1230831
* bsc#1230854
* bsc#1230948
* bsc#1231008
* bsc#1231035
* bsc#1231120
* bsc#1231146
* bsc#1231182
* bsc#1231183
* jsc#PED-10954
* jsc#PED-9899
Cross-References:
* CVE-2023-52610
* CVE-2023-52752
* CVE-2023-52915
* CVE-2023-52916
* CVE-2024-26640
* CVE-2024-26759
* CVE-2024-26804
* CVE-2024-36953
* CVE-2024-38538
* CVE-2024-38596
* CVE-2024-38632
* CVE-2024-40965
* CVE-2024-40973
* CVE-2024-40983
* CVE-2024-42154
* CVE-2024-42243
* CVE-2024-42252
* CVE-2024-42265
* CVE-2024-42294
* CVE-2024-42304
* CVE-2024-42305
* CVE-2024-42306
* CVE-2024-43828
* CVE-2024-43832
* CVE-2024-43835
* CVE-2024-43845
* CVE-2024-43870
* CVE-2024-43890
* CVE-2024-43898
* CVE-2024-43904
* CVE-2024-43914
* CVE-2024-44935
* CVE-2024-44944
* CVE-2024-44946
* CVE-2024-44947
* CVE-2024-44948
* CVE-2024-44950
* CVE-2024-44951
* CVE-2024-44952
* CVE-2024-44954
* CVE-2024-44960
* CVE-2024-44961
* CVE-2024-44962
* CVE-2024-44965
* CVE-2024-44967
* CVE-2024-44969
* CVE-2024-44970
* CVE-2024-44971
* CVE-2024-44977
* CVE-2024-44982
* CVE-2024-44984
* CVE-2024-44985
* CVE-2024-44986
* CVE-2024-44987
* CVE-2024-44988
* CVE-2024-44989
* CVE-2024-44990
* CVE-2024-44991
* CVE-2024-44997
* CVE-2024-44998
* CVE-2024-44999
* CVE-2024-45000
* CVE-2024-45001
* CVE-2024-45002
* CVE-2024-45003
* CVE-2024-45005
* CVE-2024-45006
* CVE-2024-45007
* CVE-2024-45008
* CVE-2024-45011
* CVE-2024-45012
* CVE-2024-45013
* CVE-2024-45015
* CVE-2024-45017
* CVE-2024-45018
* CVE-2024-45019
* CVE-2024-45020
* CVE-2024-45021
* CVE-2024-45022
* CVE-2024-45023
* CVE-2024-45026
* CVE-2024-45028
* CVE-2024-45029
* CVE-2024-45030
* CVE-2024-46672
* CVE-2024-46673
* CVE-2024-46674
* CVE-2024-46675
* CVE-2024-46676
* CVE-2024-46677
* CVE-2024-46679
* CVE-2024-46685
* CVE-2024-46686
* CVE-2024-46687
* CVE-2024-46689
* CVE-2024-46691
* CVE-2024-46692
* CVE-2024-46693
* CVE-2024-46694
* CVE-2024-46695
* CVE-2024-46702
* CVE-2024-46706
* CVE-2024-46707
* CVE-2024-46709
* CVE-2024-46710
* CVE-2024-46714
* CVE-2024-46715
* CVE-2024-46716
* CVE-2024-46717
* CVE-2024-46719
* CVE-2024-46720
* CVE-2024-46722
* CVE-2024-46723
* CVE-2024-46724
* CVE-2024-46725
* CVE-2024-46726
* CVE-2024-46728
* CVE-2024-46729
* CVE-2024-46730
* CVE-2024-46731
* CVE-2024-46732
* CVE-2024-46734
* CVE-2024-46735
* CVE-2024-46737
* CVE-2024-46738
* CVE-2024-46739
* CVE-2024-46741
* CVE-2024-46743
* CVE-2024-46744
* CVE-2024-46745
* CVE-2024-46746
* CVE-2024-46747
* CVE-2024-46749
* CVE-2024-46750
* CVE-2024-46751
* CVE-2024-46752
* CVE-2024-46753
* CVE-2024-46755
* CVE-2024-46756
* CVE-2024-46757
* CVE-2024-46758
* CVE-2024-46759
* CVE-2024-46760
* CVE-2024-46761
* CVE-2024-46767
* CVE-2024-46771
* CVE-2024-46772
* CVE-2024-46773
* CVE-2024-46774
* CVE-2024-46776
* CVE-2024-46778
* CVE-2024-46780
* CVE-2024-46781
* CVE-2024-46783
* CVE-2024-46784
* CVE-2024-46786
* CVE-2024-46787
* CVE-2024-46791
* CVE-2024-46794
* CVE-2024-46797
* CVE-2024-46798
* CVE-2024-46822
CVSS scores:
* CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-42243 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42252 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43890 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44960 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44961 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44977 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46675 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
* CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46676 ( SUSE ): 2.4
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-46702 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46724 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46734 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46735 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46738 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46739 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46741 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46743 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46744 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46747 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46749 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46752 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46753 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46756 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46757 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46758 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46759 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46760 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46780 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46783 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46786 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46787 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46794 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-46797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
An update that solves 162 vulnerabilities, contains two features and has 48
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags
(bsc#1221610).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225487).
* CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900
(bsc#1230269).
* CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
* CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
* CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth
(bsc#1222629).
* CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len
bytes (bsc#1226606).
* CVE-2024-38596: af_unix: Fix data races in
unix_release_sock/unix_stream_sendmsg (bsc#1226846).
* CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
(bsc#1227885).
* CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP
(bsc#1227890).
* CVE-2024-40983: tipc: force a dst refcount before doing decryption
(bsc#1227819).
* CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
* CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray
(bsc#1229001).
* CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004).
* CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from
mispredictions (bsc#1229334).
* CVE-2024-42294: block: fix deadlock between sd_remove & sd_release
(bsc#1229371).
* CVE-2024-42304: ext4: make sure the first directory block is not a hole
(bsc#1229364).
* CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir
indexed (bsc#1229363).
* CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer
(bsc#1229362).
* CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit
(bsc#1229394).
* CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio
reference (bsc#1229380).
* CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename()
(bsc#1229389).
* CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
* CVE-2024-43898: ext4: sanity check for NULL pointer after
ext4_force_shutdown (bsc#1229753).
* CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after
reassembling (bsc#1229790).
* CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock()
(bsc#1229810).
* CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate
expect ID (bsc#1229899).
* CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
(bsc#1230015).
* CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special
register set (bsc#1230180).
* CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181).
* CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
(bsc#1230209).
* CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in
bcm_sf2_mdio_register() (bsc#1230211).
* CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
(bsc#1230240).
* CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206).
* CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
* CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
* CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference
(bsc#1230193).
* CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok
(bsc#1230194).
* CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch
(bsc#1230195).
* CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx()
(bsc#1230171).
* CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
* CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling
(bsc#1230169).
* CVE-2024-45003: Don't evict inode under the inode lru traversing context
(bsc#1230245).
* CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl()
(bsc#1230442).
* CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430).
* CVE-2024-45018: netfilter: flowtable: initialise extack before use
(bsc#1230431).
* CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter
(bsc#1230432).
* CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops
(bsc#1230434).
* CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with
high order fallback to order 0 (bsc#1230435).
* CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow
disk (bsc#1230455).
* CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe
(bsc#1230451).
* CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457).
* CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure
(bsc#1230506).
* CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
* CVE-2024-46679: ethtool: check device is present when getting link settings
(bsc#1230556).
* CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in
smb2_new_read_req() (bsc#1230517).
* CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside
btrfs_submit_chunk() (bsc#1230518).
* CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section
(bsc#1230526).
* CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call
(bsc#1230520).
* CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes
(bsc#1230521).
* CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers
(bsc#1230540).
* CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
* CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop
(bsc#1230704).
* CVE-2024-46735: ublk_drv: fix NULL pointer dereference in
ublk_ctrl_start_recovery() (bsc#1230727).
* CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in
interrupt map walk (bsc#1230756).
* CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at
btrfs_lookup_extent_info() (bsc#1230786).
* CVE-2024-46752: btrfs: reduce nesting for extent processing at
btrfs_lookup_extent_info() (bsc#1230794).
* CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly
(bsc#1230796).
* CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used
(bsc#1230772).
* CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg()
(bsc#1230810).
* CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
* CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
* CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing
CPU entry (bsc#1231120).
The following non-security bugs were fixed:
* ABI: testing: fix admv8818 attr description (git-fixes).
* ACPI: CPPC: Add helper to get the highest performance value (stable-fixes).
* ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
* ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-
fixes).
* ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-
fixes).
* ACPI: processor: Return an error if acpi_processor_get_info() fails in
processor_add() (stable-fixes).
* ACPI: sysfs: validate return type of _STR method (git-fixes).
* ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes).
* ACPICA: executer/exsystem: Do not nag user about every Stall() violating the
spec (git-fixes).
* ALSA: control: Apply sanity check of input values for user elements (stable-
fixes).
* ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius
devices (stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15
X1504VAP (stable-fixes).
* ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes).
* ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
* ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes).
* ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes).
* ALSA: hda: Add input value sanity checks to HDMI channel map controls
(stable-fixes).
* ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes).
* ALSA: hda: cs35l41: fix module autoloading (git-fixes).
* ARM: 9406/1: Fix callchain_trace() return value (git-fixes).
* ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(stable-fixes).
* ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes).
* ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git-
fixes).
* ASoC: cs42l42: Convert comma to semicolon (git-fixes).
* ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
* ASoC: intel: fix module autoloading (stable-fixes).
* ASoC: meson: Remove unused declartion in header file (git-fixes).
* ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
* ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
fixes).
* ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error
(git-fixes).
* ASoC: soc-ac97: Fix the incorrect description (git-fixes).
* ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
* ASoC: tas2781-i2c: Get the right GPIO line (git-fixes).
* ASoC: tda7419: fix module autoloading (stable-fixes).
* ASoC: tegra: Fix CBB error during probe() (git-fixes).
* ASoC: topology: Properly initialize soc_enum values (stable-fixes).
* ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
* ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially
broken alignment (stable-fixes).
* Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
* Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush()
(stable-fixes).
* Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
* Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
* Bluetooth: hci_event: Use HCI error defines instead of magic values (stable-
fixes).
* Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue
(stable-fixes).
* Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-
fixes).
* Detect memory allocation failure in annotated_source__alloc_histograms
(bsc#1227962).
* Documentation: ioctl: document 0x07 ioctl code (git-fixes).
* Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
* Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
* HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
* HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-
fixes).
* HID: multitouch: Add support for GT7868Q (stable-fixes).
* HID: wacom: Do not warn about dropped packets for first packet (git-fixes).
* HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes).
* IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
* Input: adp5588-keys - fix check on return code (git-fixes).
* Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
* Input: ili210x - use kvmalloc() to allocate buffer for firmware update
(stable-fixes).
* Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
* Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
* Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes).
* Input: tsc2004/5 - fix reset handling on probe (git-fixes).
* Input: tsc2004/5 - use device core to create driver-specific device
attributes (git-fixes).
* Input: uinput - reject requests with unreasonable number of slots (stable-
fixes).
* KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes).
* KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
missing (git-fixes).
* KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
(git-fixes).
* KVM: arm64: Block unsafe FF-A calls from the host (git-fixes).
* KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging
(git-fixes).
* KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git-
fixes).
* KVM: arm64: Do not re-initialize the KVM lock (git-fixes).
* KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
(git-fixes).
* KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git-
fixes).
* KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
(git-fixes).
* KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes).
* KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
fixes).
* KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes).
* Move fixes into sorted section (bsc#1230119)
* NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
* NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
* NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
* NFSv4: Add missing rescheduling points in
nfs_client_return_marked_delegations (git-fixes).
* PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
* PCI: Wait for Link before restoring Downstream Buses (git-fixes).
* PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes).
* PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
* PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git-
fixes).
* PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
* PCI: imx6: Fix missing call to phy_power_off() in error handling (git-
fixes).
* PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-
fixes).
* PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
* PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes).
* PCI: qcom-ep: Enable controller resources like PHY only after refclk is
available (git-fixes).
* PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
* PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
* PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
* RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
* RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
* RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
* RDMA/erdma: Return QP state in erdma_query_qp (git-fixes)
* RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
* RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes)
* RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes)
* RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-
fixes)
* RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes)
* RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes)
* RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
* RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
* RDMA/hns: Optimize hem allocation performance (git-fixes)
* RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
* RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-
fixes)
* RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes)
* RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes)
* RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes)
* RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes)
* RDMA/mlx5: Obtain upper net device only when needed (git-fixes)
* RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
* RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-
fixes)
* Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
* Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE"
(git-fixes).
* Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019)
* Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable-
fixes).
* Revert "media: tuners: fix error return code of
hybrid_tuner_request_state()" (git-fixes).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
* Squashfs: sanity check symbolic link size (git-fixes).
* USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
* USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
* USB: serial: option: add MeiG Smart SRM825L (git-fixes).
* USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
* USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
* VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
(git-fixes).
* afs: Do not cross .backup mountpoint from backup volume (git-fixes).
* afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
* arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
* arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
* arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
* arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes).
* arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git-
fixes).
* arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes).
* arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-
fixes).
* arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git-
fixes).
* arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency
(git-fixes).
* arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-
fixes).
* arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on
RK3399 Puma (git-fixes).
* arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
Puma (git-fixes).
* arm64: signal: Fix some under-bracketed UAPI macros (git-fixes).
* arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
* arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
* arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
* ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes).
* ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git-
fixes).
* ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
* ata: pata_macio: Use WARN instead of BUG (stable-fixes).
* blk-mq: add helper for checking if one CPU is mapped to specified hctx
(bsc#1223600).
* blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
* bpf, events: Use prog to emit ksymbol event for main program (git-fixes).
* bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes).
* btrfs: fix race between direct IO write and fsync when using same fd (git-
fixes).
* btrfs: send: allow cloning non-aligned extent if it ends at i_size
(bsc#1230854).
* bus: integrator-lm: fix OF node leak in probe() (git-fixes).
* cachefiles: Fix non-taking of sb_writers around set/removexattr
(bsc#1231008).
* cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183).
* can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes).
* can: bcm: Remove proc entry when dev is unregistered (git-fixes).
* can: j1939: use correct function name in comment (git-fixes).
* can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes).
* can: m_can: Release irq on error in m_can_open (git-fixes).
* can: m_can: enable NAPI before enabling interrupts (git-fixes).
* can: m_can: m_can_close(): stop clocks after device has been shut down (git-
fixes).
* can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-
fixes).
* can: mcp251xfd: clarify the meaning of timestamp (stable-fixes).
* can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD
mode (git-fixes).
* can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate
function (stable-fixes).
* can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration
(stable-fixes).
* can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into
mcp251xfd_chip_start/stop() (stable-fixes).
* can: mcp251xfd: properly indent labels (stable-fixes).
* can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd
(stable-fixes).
* can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum
(stable-fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable-
fixes).
* ceph: remove the incorrect Fw reference check when dirtying pages
(bsc#1231182).
* clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
* clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
(bsc#1227885).
* clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
* clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-
fixes).
* clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled
(git-fixes).
* clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes).
* clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git-
fixes).
* clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes).
* clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes).
* clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes).
* clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git-
fixes).
* clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX
(git-fixes).
* clocksource/drivers/qcom: Add missing iounmap() on errors in
msm_dt_timer_init() (git-fixes).
* cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable-
fixes).
* cpufreq: amd-pstate: fix the highest frequency issue which limits
performance (git-fixes).
* cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes).
* cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately
(git-fixes).
* crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure
(git-fixes).
* crypto: ccp - do not request interrupt on cmd completion when irqs disabled
(git-fixes).
* crypto: iaa - Fix potential use after free bug (git-fixes).
* crypto: qat - fix unintentional re-enabling of error interrupts (stable-
fixes).
* crypto: xor - fix template benchmarking (git-fixes).
* cxl/core: Fix incorrect vendor debug UUID define (git-fixes).
* cxl/pci: Fix to record only non-zero ranges (git-fixes).
* devres: Initialize an uninitialized struct member (stable-fixes).
* dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes).
* dma-debug: avoid deadlock between dma debug vs printk and netconsole
(stable-fixes).
* dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor
(stable-fixes).
* dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking
callbacks (stable-fixes).
* driver core: Fix a potential null-ptr-deref in module_add_driver() (git-
fixes).
* driver core: Fix error handling in driver API device_rename() (git-fixes).
* driver: iio: add missing checks on iio_info's callback access (stable-
fixes).
* drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
(git-fixes).
* drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
(git-fixes).
* drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
* drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
* drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
* drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
* drm/amd/display: Add null check for set_output_gamma in
dcn30_set_output_transfer_func (git-fixes).
* drm/amd/display: Add null checks for 'stream' and 'plane' before
dereferencing (stable-fixes).
* drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
* drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes).
* drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct()
(git-fixes).
* drm/amd/display: Check BIOS images before it is used (stable-fixes).
* drm/amd/display: Check HDCP returned status (stable-fixes).
* drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes).
* drm/amd/display: Check denominator pbn_div before used (stable-fixes).
* drm/amd/display: Check gpio_id before used as array index (stable-fixes).
* drm/amd/display: Check index for aux_rd_interval before using (stable-
fixes).
* drm/amd/display: Check msg_id before processing transcation (stable-fixes).
* drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
(stable-fixes).
* drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
(stable-fixes).
* drm/amd/display: Defer handling mst up request in resume (stable-fixes).
* drm/amd/display: Disable error correction if it's not supported (stable-
fixes).
* drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay
(stable-fixes).
* drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes).
* drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
dal_gpio_service_create (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
decide_fallback_link_setting_max_bw_policy (stable-fixes).
* drm/amd/display: Fix Coverity INTERGER_OVERFLOW within
construct_integrated_info (stable-fixes).
* drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes).
* drm/amd/display: Fix index may exceed array range within
fpu_update_bw_bounding_box (stable-fixes).
* drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35
(stable-fixes).
* drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes).
* drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection
(stable-fixes).
* drm/amd/display: Replace dm_execute_dmub_cmd with
dc_wake_and_execute_dmub_cmd (git-fixes).
* drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes).
* drm/amd/display: Skip inactive planes within
ModeSupportAndSystemConfiguration (stable-fixes).
* drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-
fixes).
* drm/amd/display: Solve mst monitors blank out problem after resume (git-
fixes).
* drm/amd/display: Spinlock before reading event (stable-fixes).
* drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
(stable-fixes).
* drm/amd/display: Wake DMCUB before sending a command for replay feature
(stable-fixes).
* drm/amd/display: added NULL check at start of dc_validate_stream (stable-
fixes).
* drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git-
fixes).
* drm/amd/display: use preferred link settings for dp signal only (stable-
fixes).
* drm/amd/pm: Fix negative array index read (stable-fixes).
* drm/amd/pm: check negtive return for table entries (stable-fixes).
* drm/amd/pm: check specific index for aldebaran (stable-fixes).
* drm/amd/pm: check specific index for smu13 (stable-fixes).
* drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-
fixes).
* drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-
fixes).
* drm/amd: Add gfx12 swizzle mode defs (stable-fixes).
* drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
* drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported
(stable-fixes).
* drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy
SOCs (stable-fixes).
* drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-
fixes).
* drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
* drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
* drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes).
* drm/amdgpu: Fix get each xcp macro (git-fixes).
* drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
* drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
* drm/amdgpu: Fix smatch static checker warning (stable-fixes).
* drm/amdgpu: Fix the uninitialized variable warning (stable-fixes).
* drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-
fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable-
fixes).
* drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes).
* drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
* drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes).
* drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes).
* drm/amdgpu: add missing error handling in function
amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes).
* drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes).
* drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes).
* drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
* drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6
(stable-fixes).
* drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
* drm/amdgpu: fix a possible null pointer dereference (git-fixes).
* drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes).
* drm/amdgpu: fix dereference after null check (stable-fixes).
* drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
* drm/amdgpu: fix overflowed array index read warning (stable-fixes).
* drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating()
(stable-fixes).
* drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
* drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
* drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
* drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes).
* drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
* drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes).
* drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
* drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-
fixes).
* drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes).
* drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes).
* drm/amdkfd: Reconcile the definition and use of oem_id in struct
kfd_topology_device (stable-fixes).
* drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid()
(git-fixes).
* drm/bridge: tc358767: Check if fully initialized before signalling HPD event
via IRQ (stable-fixes).
* drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes).
* drm/fb-helper: Do not schedule_work() to flush frame buffer during panic()
(stable-fixes).
* drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes).
* drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
* drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-
fixes).
* drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
* drm/i915: Do not attempt to load the GSC multiple times (git-fixes).
* drm/kfd: Correct pinned buffer handling at kfd restore and validate process
(stable-fixes).
* drm/mediatek: Set sensible cursor width/height values to fix crash (stable-
fixes).
* drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes).
* drm/meson: plane: Add error handling (stable-fixes).
* drm/msm/a5xx: disable preemption in submits by default (git-fixes).
* drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
* drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
* drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
* drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
* drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes).
* drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
* drm/msm: fix %s null argument error (git-fixes).
* drm/nouveau/fb: restore init() for ramgp102 (git-fixes).
* drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-
fixes).
* drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-
fixes).
* drm/radeon: properly handle vbios fake edid sizing (git-fixes).
* drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-
fixes).
* drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
* drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes).
* drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes).
* drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes).
* drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
* drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes).
* drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes).
* drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
* drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
* ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes).
* erofs: fix incorrect symlink detection in fast symlink (git-fixes).
* exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
* fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
* firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes).
* firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
* firmware_loader: Block path traversal (git-fixes).
* fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
(bsc#1230602).
* fuse: fix memory leak in fuse_create_open (bsc#1230124).
* fuse: update stats for pages in dropped aux writeback list (bsc#1230125).
* fuse: use unsigned type for getxattr/listxattr size truncation
(bsc#1230123).
* gpio: modepin: Enable module autoloading (git-fixes).
* gpio: rockchip: fix OF node leak in probe() (git-fixes).
* hwmon: (adc128d818) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes).
* hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes).
* hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-
fixes).
* hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
* hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
* hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >=
1.2 (git-fixes).
* hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-
fixes).
* hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-
fixes).
* hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
* i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-
fixes).
* i2c: designware: fix controller is holding SCL low while ENABLE bit is
disabled (git-fixes).
* i2c: isch: Add missed 'else' (git-fixes).
* i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
* i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver
Due to Race Condition (git-fixes).
* i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-
fixes).
* iio: adc: ad7124: fix chip ID mismatch (git-fixes).
* iio: adc: ad7124: fix config comparison (git-fixes).
* iio: adc: ad7606: fix oversampling gpio array (git-fixes).
* iio: adc: ad7606: fix standby gpio state to match the documentation (git-
fixes).
* iio: adc: ad7606: remove frstdata check for serial mode (git-fixes).
* iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
* iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-
fixes).
* iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-
fixes).
* iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
* ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206)
* jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
* kABI workaround for cros_ec stuff (git-fixes).
* kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045,
bsc#1216776).
* kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable-
fixes).
* kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
* leds: spi-byte: Call of_node_put() on error path (stable-fixes).
* lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable-
fixes).
* lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
* mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
* mailbox: rockchip: fix a typo in module autoloading (git-fixes).
* media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes).
* media: ov5675: Fix power on/off delay timings (git-fixes).
* media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE
(git-fixes).
* media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
* media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes).
* media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
* media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
* media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
* media: venus: fix use after free bug in venus_remove due to race condition
(git-fixes).
* media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
* media: vivid: do not set HDMI TX controls if there are no HDMI outputs
(stable-fixes).
* media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
* memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes).
* memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes).
* minmax: reduce min/max macro expansion in atomisp driver (git-fixes).
* misc: fastrpc: Fix double free of 'buf' in error path (git-fixes).
* mmc: core: apply SD quirks earlier during probe (git-fixes).
* mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
* mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
* mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
* module: Fix KCOV-ignored file name (git-fixes).
* mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
* mtd: slram: insert break after errors in parsing the map (git-fixes).
* net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-
fixes).
* net: phy: Fix missing of_node_put() for leds (git-fixes).
* net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes).
* net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
* net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes).
* nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
* nilfs2: determine empty node blocks as corrupted (git-fixes).
* nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
* nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
* nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
* nilfs2: fix state management in error path of log writing function (git-
fixes).
* nilfs2: protect references to superblock parameters exposed in sysfs (git-
fixes).
* nouveau: fix the fwsec sb verification register (git-fixes).
* nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244).
* nvme-multipath: system fails to create generic nvme device (bsc#1228244).
* nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
* nvme-pci: allocate tagset on reset if necessary (git-fixes).
* nvme-tcp: fix link failure for TCP auth (git-fixes).
* nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
* nvme: clear caller pointer on identify failure (git-fixes).
* nvme: fix namespace removal list (git-fixes).
* nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
* nvmet-tcp: do not continue for invalid icreq (git-fixes).
* nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
* nvmet-trace: avoid dereferencing pointer too early (git-fixes).
* nvmet: Identify-Active Namespace ID List command should reject invalid nsid
(git-fixes).
* ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
* ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
* ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
* ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
* pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
* pcmcia: Use resource_size function on resource object (stable-fixes).
* perf annotate: Introduce global annotation_options (git-fixes).
* perf annotate: Split branch stack cycles information out of 'struct
annotation_line' (git-fixes).
* perf annotate: Use global annotation_options (git-fixes).
* perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes).
* perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes).
* perf intel-pt: Fix exclude_guest setting (git-fixes).
* perf machine thread: Remove exited threads by default (git-fixes).
* perf maps: Move symbol maps functions to maps.c (git-fixes).
* perf pmu: Assume sysfs events are always the same case (git-fixes).
* perf pmus: Fixes always false when compare duplicates aliases (git-fixes).
* perf record: Lazy load kernel symbols (git-fixes).
* perf report: Convert to the global annotation_options (git-fixes).
* perf report: Fix condition in sort__sym_cmp() (git-fixes).
* perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes).
* perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes).
* perf tool: fix dereferencing NULL al->maps (git-fixes).
* perf tools: Add/use PMU reverse lookup from config to name (git-fixes).
* perf tools: Use pmus to describe type from attribute (git-fixes).
* perf top: Convert to the global annotation_options (git-fixes).
* perf/core: Fix missing wakeup when waiting for context reference (git-
fixes).
* perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git-
fixes).
* perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes).
* perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes).
* perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes).
* perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git-
fixes).
* perf/x86/intel/pt: Fix topa_entry base length (git-fixes).
* perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git-
fixes).
* perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119).
* perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes).
* perf/x86/intel: Factor out the initialization code for SPR (git fixes).
* perf/x86/intel: Limit the period on Haswell (git-fixes).
* perf/x86/intel: Use the common uarch name for the shared functions (git
fixes).
* perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units
(bsc#1230119).
* perf/x86/uncore: Apply the unit control RB tree to MSR uncore units
(bsc#1230119).
* perf/x86/uncore: Apply the unit control RB tree to PCI uncore units
(bsc#1230119).
* perf/x86/uncore: Cleanup unused unit structure (bsc#1230119).
* perf/x86/uncore: Retrieve the unit ID from the unit control RB tree
(bsc#1230119).
* perf/x86/uncore: Save the unit control address of all units (bsc#1230119).
* perf/x86/uncore: Support per PMU cpumask (bsc#1230119).
* perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes).
* perf/x86: Serialize set_attr_rdpmc() (git-fixes).
* perf: Fix default aux_watermark calculation (git-fixes).
* perf: Fix event leak upon exit (git-fixes).
* perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes).
* perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes).
* perf: script: add raw|disasm arguments to --insn-trace option (git-fixes).
* phy: zynqmp: Take the phy mutex in xlate (stable-fixes).
* pinctrl: at91: make it work with current gpiolib (stable-fixes).
* pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes).
* pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
* platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable-
fixes).
* platform/surface: aggregator_registry: Add Support for Surface Pro 10
(stable-fixes).
* platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
(stable-fixes).
* platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
* platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array
(git-fixes).
* platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-
fixes).
* platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match
less strict (stable-fixes).
* power: supply: Drop use_cnt check from power_supply_property_is_writeable()
(git-fixes).
* power: supply: axp20x_battery: Remove design from min and max voltage (git-
fixes).
* power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
* power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense
(git-fixes).
* powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes).
* powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656).
* pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes).
* r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
* regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes).
* regmap: spi: Fix potential off-by-one when calculating reserved size
(stable-fixes).
* regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes).
* regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value
(git-fixes).
* regulator: core: Fix short description for _regulator_check_status_enabled()
(git-fixes).
* regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR
(git-fixes).
* regulator: rt5120: Convert comma to semicolon (git-fixes).
* regulator: wm831x-isink: Convert comma to semicolon (git-fixes).
* remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes).
* remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes).
* remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes).
* reset: berlin: fix OF node leak in probe() error path (git-fixes).
* reset: k210: fix OF node leak in probe() error path (git-fixes).
* resource: fix region_intersects() vs add_memory_driver_managed() (git-
fixes).
* rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY
gcc version dependent, at least on ppc
* rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
* s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694).
* s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes).
* s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562).
* s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563).
* s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564).
* scripts: kconfig: merge_config: config files: add a trailing newline
(stable-fixes).
* scripts: sphinx-pre-install: remove unnecessary double check for
$cur_version (git-fixes).
* scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
* scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds
(bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429
jsc#PED-9899).
* scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached
topology (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Remove redundant vport assignment when building an abort request
(bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429
jsc#PED-9899).
* scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata
paths (bsc#1229429 jsc#PED-9899).
* scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
(bsc#1223848).
* selftests: lib: remove strscpy test (git-fixes).
* selinux,smack: do not bypass permissions check in inode_setsecctx hook
(stable-fixes).
* soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes).
* soc: versatile: integrator: fix OF node leak in probe() error path (git-
fixes).
* spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes).
* spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: bcm63xx: Enable module autoloading (stable-fixes).
* spi: bcm63xx: Fix module autoloading (git-fixes).
* spi: meson-spicc: convert comma to semicolon (git-fixes).
* spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
* spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
* spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
* spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git-
fixes).
* spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
* spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes).
* spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
* staging: iio: frequency: ad9834: Validate frequency parameter value (git-
fixes).
* supported.conf: mark adiantum and xctr crypto modules as supported
(bsc#1231035)
* thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes).
* thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git-
fixes).
* thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git-
fixes).
* thunderbolt: There are only 5 basic router registers in pre-USB4 routers
(git-fixes).
* tomoyo: fallback to realpath if symlink's pathname does not exist (git-
fixes).
* tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load
(git-fixes).
* tpm: Clean up TPM space after command failure (git-fixes).
* tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
* tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
* uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-
fixes).
* usb: cdnsp: Fix incorrect usb_request status (git-fixes).
* usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
* usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
* usb: dwc3: Avoid waking up gadget during startxfer (git-fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access (git-
fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access
(stable-fixes).
* usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).
* usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes).
* usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
* usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes).
* usb: uas: set host status byte on data completion error (stable-fixes).
* usbip: Do not submit special requests twice (stable-fixes).
* usbnet: ipheth: add CDC NCM support (git-fixes).
* usbnet: ipheth: do not stop RX on failing RX callback (git-fixes).
* usbnet: ipheth: drop RX URBs with no payload (git-fixes).
* usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes).
* usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes).
* usbnet: ipheth: race between ipheth_close and error handling (stable-fixes).
* usbnet: ipheth: remove extraneous rx URB length check (git-fixes).
* usbnet: ipheth: transmit URBs without trailing padding (git-fixes).
* usbnet: modern method to get random MAC (git-fixes).
* virtio-net: synchronize probe with ndo_set_features (git-fixes).
* virtio_net: Fix napi_skb_cache_put warning (git-fixes).
* virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
* watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
* wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable-
fixes).
* wifi: ath12k: fix BSS chan info request WMI command (git-fixes).
* wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes).
* wifi: ath12k: fix invalid AMPDU factor calculation in
ath12k_peer_assoc_h_he() (git-fixes).
* wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he()
(stable-fixes).
* wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850()
(stable-fixes).
* wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable-
fixes).
* wifi: ath12k: match WMI BSS chan info structure with firmware definition
(git-fixes).
* wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
* wifi: brcmfmac: introducing fwil query functions (git-fixes).
* wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
* wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
* wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git-
fixes).
* wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-
fixes).
* wifi: cfg80211: make hash table duplicates more survivable (stable-fixes).
* wifi: cfg80211: restrict operation during radar detection (stable-fixes).
* wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
* wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
* wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable-
fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
* wifi: iwlwifi: mvm: increase the time between ranging measurements (git-
fixes).
* wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes).
* wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes).
* wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD
(stable-fixes).
* wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes).
* wifi: mac80211: fix the comeback long retry times (git-fixes).
* wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable-
fixes).
* wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-
fixes).
* wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes).
* wifi: mt76: mt7603: fix mixed declarations and code (git-fixes).
* wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes).
* wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-
fixes).
* wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change
(stable-fixes).
* wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage
(git-fixes).
* wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc
(git-fixes).
* wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes).
* wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes).
* wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he
(git-fixes).
* wifi: mt76: mt7996: fix traffic delay when switching back to working channel
(git-fixes).
* wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes).
* wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes).
* wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes).
* wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
(stable-fixes).
* wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
* wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
* wifi: rtw88: remove CPT execution branch never used (git-fixes).
* wifi: rtw88: usb: schedule rx work after everything is set up (stable-
fixes).
* wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes).
* wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware
(stable-fixes).
* wifi: wilc1000: fix potential RCU dereference issue in
wilc_parse_join_bss_param (git-fixes).
* x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
* x86/kaslr: Expose and use the end of the physical memory address space
(bsc#1229443).
* x86/kexec: Add EFI config table identity mapping for kexec kernel
(bsc#1220382).
* x86/mm/ident_map: Use gbpages only where full GB page should be mapped
(bsc#1220382).
* x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527).
* x86/pat: Fix W^X violation false-positives when running as Xen PV guest
(bsc#1221527).
* x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527).
* x86/pat: Restructure _lookup_address_cpa() (bsc#1221527).
* xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
* xen/swiotlb: fix allocated size (git-fixes).
* xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
* xen: allow mapping ACPI data using a different physical address
(bsc#1226003).
* xen: introduce generic helper checking for memory map conflicts
(bsc#1226003).
* xen: move checks for e820 conflicts further up (bsc#1226003).
* xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
* xen: tolerate ACPI NVS memory overlapping with Xen allocated memory
(bsc#1226003).
* xen: use correct end address of kernel for conflict checking (bsc#1226003).
* xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git-
fixes).
* xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-
fixes).
* xz: cleanup CRC32 edits from 2018 (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3561=1 openSUSE-SLE-15.6-2024-3561=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3561=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3561=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3561=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3561=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3561=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3561=1
## Package List:
* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.25.2
* openSUSE Leap 15.6 (noarch)
* kernel-docs-html-6.4.0-150600.23.25.2
* kernel-source-vanilla-6.4.0-150600.23.25.1
* kernel-devel-6.4.0-150600.23.25.1
* kernel-source-6.4.0-150600.23.25.1
* kernel-macros-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-debugsource-6.4.0-150600.23.25.1
* kernel-debug-devel-6.4.0-150600.23.25.1
* kernel-debug-debuginfo-6.4.0-150600.23.25.1
* kernel-debug-livepatch-devel-6.4.0-150600.23.25.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (x86_64)
* kernel-debug-vdso-6.4.0-150600.23.25.1
* kernel-default-vdso-debuginfo-6.4.0-150600.23.25.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.25.1
* kernel-default-vdso-6.4.0-150600.23.25.1
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.25.1
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-6.4.0-150600.23.25.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.25.1
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.25.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.25.1
* kernel-default-base-rebuild-6.4.0-150600.23.25.1.150600.12.10.2
* kernel-default-base-6.4.0-150600.23.25.1.150600.12.10.2
* kernel-kvmsmall-livepatch-devel-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-debugsource-6.4.0-150600.23.25.2
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.25.1
* kernel-default-debugsource-6.4.0-150600.23.25.1
* kernel-default-livepatch-devel-6.4.0-150600.23.25.1
* gfs2-kmp-default-6.4.0-150600.23.25.1
* kernel-obs-build-6.4.0-150600.23.25.2
* kernel-default-devel-6.4.0-150600.23.25.1
* dlm-kmp-default-6.4.0-150600.23.25.1
* kernel-default-optional-6.4.0-150600.23.25.1
* cluster-md-kmp-default-6.4.0-150600.23.25.1
* kernel-default-debuginfo-6.4.0-150600.23.25.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.25.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.25.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.25.1
* kselftests-kmp-default-6.4.0-150600.23.25.1
* reiserfs-kmp-default-6.4.0-150600.23.25.1
* kernel-syms-6.4.0-150600.23.25.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.25.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.25.1
* ocfs2-kmp-default-6.4.0-150600.23.25.1
* kernel-default-extra-6.4.0-150600.23.25.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.25.1
* kernel-obs-qa-6.4.0-150600.23.25.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1
* kernel-default-livepatch-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_5-debugsource-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debugsource-6.4.0-150600.23.25.1
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (aarch64)
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.25.1
* dtb-cavium-6.4.0-150600.23.25.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.25.1
* dtb-broadcom-6.4.0-150600.23.25.1
* dtb-renesas-6.4.0-150600.23.25.1
* dlm-kmp-64kb-6.4.0-150600.23.25.1
* dtb-nvidia-6.4.0-150600.23.25.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.25.1
* kernel-64kb-livepatch-devel-6.4.0-150600.23.25.1
* dtb-allwinner-6.4.0-150600.23.25.1
* kernel-64kb-extra-6.4.0-150600.23.25.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.25.1
* dtb-altera-6.4.0-150600.23.25.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.25.1
* reiserfs-kmp-64kb-6.4.0-150600.23.25.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.25.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.25.1
* dtb-apple-6.4.0-150600.23.25.1
* dtb-mediatek-6.4.0-150600.23.25.1
* dtb-socionext-6.4.0-150600.23.25.1
* dtb-hisilicon-6.4.0-150600.23.25.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.25.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.25.1
* dtb-qcom-6.4.0-150600.23.25.1
* kselftests-kmp-64kb-6.4.0-150600.23.25.1
* kernel-64kb-debuginfo-6.4.0-150600.23.25.1
* dtb-amazon-6.4.0-150600.23.25.1
* dtb-lg-6.4.0-150600.23.25.1
* dtb-rockchip-6.4.0-150600.23.25.1
* dtb-freescale-6.4.0-150600.23.25.1
* ocfs2-kmp-64kb-6.4.0-150600.23.25.1
* dtb-apm-6.4.0-150600.23.25.1
* dtb-xilinx-6.4.0-150600.23.25.1
* kernel-64kb-optional-6.4.0-150600.23.25.1
* kernel-64kb-debugsource-6.4.0-150600.23.25.1
* cluster-md-kmp-64kb-6.4.0-150600.23.25.1
* dtb-sprd-6.4.0-150600.23.25.1
* dtb-amlogic-6.4.0-150600.23.25.1
* gfs2-kmp-64kb-6.4.0-150600.23.25.1
* dtb-amd-6.4.0-150600.23.25.1
* dtb-exynos-6.4.0-150600.23.25.1
* kernel-64kb-devel-6.4.0-150600.23.25.1
* dtb-arm-6.4.0-150600.23.25.1
* dtb-marvell-6.4.0-150600.23.25.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-debugsource-6.4.0-150600.23.25.1
* kernel-64kb-debuginfo-6.4.0-150600.23.25.1
* kernel-64kb-devel-6.4.0-150600.23.25.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.25.1.150600.12.10.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.25.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.25.1
* kernel-default-devel-6.4.0-150600.23.25.1
* kernel-default-debugsource-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (noarch)
* kernel-devel-6.4.0-150600.23.25.1
* kernel-macros-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.25.1
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debugsource-6.4.0-150600.23.25.1
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.25.1
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.25.2
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-6.4.0-150600.23.25.2
* kernel-obs-build-debugsource-6.4.0-150600.23.25.2
* kernel-syms-6.4.0-150600.23.25.1
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.25.1
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.25.1
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.25.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.25.1
* reiserfs-kmp-default-6.4.0-150600.23.25.1
* kernel-default-debugsource-6.4.0-150600.23.25.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.25.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_5-debugsource-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_25-default-1-150600.13.3.1
* kernel-default-debuginfo-6.4.0-150600.23.25.1
* kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-1-150600.13.3.1
* kernel-default-debugsource-6.4.0-150600.23.25.1
* kernel-default-livepatch-devel-6.4.0-150600.23.25.1
* kernel-default-livepatch-6.4.0-150600.23.25.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-6.4.0-150600.23.25.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.25.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.25.1
* cluster-md-kmp-default-6.4.0-150600.23.25.1
* kernel-default-debuginfo-6.4.0-150600.23.25.1
* kernel-default-debugsource-6.4.0-150600.23.25.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.25.1
* gfs2-kmp-default-6.4.0-150600.23.25.1
* ocfs2-kmp-default-6.4.0-150600.23.25.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.25.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.25.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.25.1
* kernel-default-extra-6.4.0-150600.23.25.1
* kernel-default-debugsource-6.4.0-150600.23.25.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.25.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52610.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52916.html
* https://www.suse.com/security/cve/CVE-2024-26640.html
* https://www.suse.com/security/cve/CVE-2024-26759.html
* https://www.suse.com/security/cve/CVE-2024-26804.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-38538.html
* https://www.suse.com/security/cve/CVE-2024-38596.html
* https://www.suse.com/security/cve/CVE-2024-38632.html
* https://www.suse.com/security/cve/CVE-2024-40965.html
* https://www.suse.com/security/cve/CVE-2024-40973.html
* https://www.suse.com/security/cve/CVE-2024-40983.html
* https://www.suse.com/security/cve/CVE-2024-42154.html
* https://www.suse.com/security/cve/CVE-2024-42243.html
* https://www.suse.com/security/cve/CVE-2024-42252.html
* https://www.suse.com/security/cve/CVE-2024-42265.html
* https://www.suse.com/security/cve/CVE-2024-42294.html
* https://www.suse.com/security/cve/CVE-2024-42304.html
* https://www.suse.com/security/cve/CVE-2024-42305.html
* https://www.suse.com/security/cve/CVE-2024-42306.html
* https://www.suse.com/security/cve/CVE-2024-43828.html
* https://www.suse.com/security/cve/CVE-2024-43832.html
* https://www.suse.com/security/cve/CVE-2024-43835.html
* https://www.suse.com/security/cve/CVE-2024-43845.html
* https://www.suse.com/security/cve/CVE-2024-43870.html
* https://www.suse.com/security/cve/CVE-2024-43890.html
* https://www.suse.com/security/cve/CVE-2024-43898.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43914.html
* https://www.suse.com/security/cve/CVE-2024-44935.html
* https://www.suse.com/security/cve/CVE-2024-44944.html
* https://www.suse.com/security/cve/CVE-2024-44946.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-44948.html
* https://www.suse.com/security/cve/CVE-2024-44950.html
* https://www.suse.com/security/cve/CVE-2024-44951.html
* https://www.suse.com/security/cve/CVE-2024-44952.html
* https://www.suse.com/security/cve/CVE-2024-44954.html
* https://www.suse.com/security/cve/CVE-2024-44960.html
* https://www.suse.com/security/cve/CVE-2024-44961.html
* https://www.suse.com/security/cve/CVE-2024-44962.html
* https://www.suse.com/security/cve/CVE-2024-44965.html
* https://www.suse.com/security/cve/CVE-2024-44967.html
* https://www.suse.com/security/cve/CVE-2024-44969.html
* https://www.suse.com/security/cve/CVE-2024-44970.html
* https://www.suse.com/security/cve/CVE-2024-44971.html
* https://www.suse.com/security/cve/CVE-2024-44977.html
* https://www.suse.com/security/cve/CVE-2024-44982.html
* https://www.suse.com/security/cve/CVE-2024-44984.html
* https://www.suse.com/security/cve/CVE-2024-44985.html
* https://www.suse.com/security/cve/CVE-2024-44986.html
* https://www.suse.com/security/cve/CVE-2024-44987.html
* https://www.suse.com/security/cve/CVE-2024-44988.html
* https://www.suse.com/security/cve/CVE-2024-44989.html
* https://www.suse.com/security/cve/CVE-2024-44990.html
* https://www.suse.com/security/cve/CVE-2024-44991.html
* https://www.suse.com/security/cve/CVE-2024-44997.html
* https://www.suse.com/security/cve/CVE-2024-44998.html
* https://www.suse.com/security/cve/CVE-2024-44999.html
* https://www.suse.com/security/cve/CVE-2024-45000.html
* https://www.suse.com/security/cve/CVE-2024-45001.html
* https://www.suse.com/security/cve/CVE-2024-45002.html
* https://www.suse.com/security/cve/CVE-2024-45003.html
* https://www.suse.com/security/cve/CVE-2024-45005.html
* https://www.suse.com/security/cve/CVE-2024-45006.html
* https://www.suse.com/security/cve/CVE-2024-45007.html
* https://www.suse.com/security/cve/CVE-2024-45008.html
* https://www.suse.com/security/cve/CVE-2024-45011.html
* https://www.suse.com/security/cve/CVE-2024-45012.html
* https://www.suse.com/security/cve/CVE-2024-45013.html
* https://www.suse.com/security/cve/CVE-2024-45015.html
* https://www.suse.com/security/cve/CVE-2024-45017.html
* https://www.suse.com/security/cve/CVE-2024-45018.html
* https://www.suse.com/security/cve/CVE-2024-45019.html
* https://www.suse.com/security/cve/CVE-2024-45020.html
* https://www.suse.com/security/cve/CVE-2024-45021.html
* https://www.suse.com/security/cve/CVE-2024-45022.html
* https://www.suse.com/security/cve/CVE-2024-45023.html
* https://www.suse.com/security/cve/CVE-2024-45026.html
* https://www.suse.com/security/cve/CVE-2024-45028.html
* https://www.suse.com/security/cve/CVE-2024-45029.html
* https://www.suse.com/security/cve/CVE-2024-45030.html
* https://www.suse.com/security/cve/CVE-2024-46672.html
* https://www.suse.com/security/cve/CVE-2024-46673.html
* https://www.suse.com/security/cve/CVE-2024-46674.html
* https://www.suse.com/security/cve/CVE-2024-46675.html
* https://www.suse.com/security/cve/CVE-2024-46676.html
* https://www.suse.com/security/cve/CVE-2024-46677.html
* https://www.suse.com/security/cve/CVE-2024-46679.html
* https://www.suse.com/security/cve/CVE-2024-46685.html
* https://www.suse.com/security/cve/CVE-2024-46686.html
* https://www.suse.com/security/cve/CVE-2024-46687.html
* https://www.suse.com/security/cve/CVE-2024-46689.html
* https://www.suse.com/security/cve/CVE-2024-46691.html
* https://www.suse.com/security/cve/CVE-2024-46692.html
* https://www.suse.com/security/cve/CVE-2024-46693.html
* https://www.suse.com/security/cve/CVE-2024-46694.html
* https://www.suse.com/security/cve/CVE-2024-46695.html
* https://www.suse.com/security/cve/CVE-2024-46702.html
* https://www.suse.com/security/cve/CVE-2024-46706.html
* https://www.suse.com/security/cve/CVE-2024-46707.html
* https://www.suse.com/security/cve/CVE-2024-46709.html
* https://www.suse.com/security/cve/CVE-2024-46710.html
* https://www.suse.com/security/cve/CVE-2024-46714.html
* https://www.suse.com/security/cve/CVE-2024-46715.html
* https://www.suse.com/security/cve/CVE-2024-46716.html
* https://www.suse.com/security/cve/CVE-2024-46717.html
* https://www.suse.com/security/cve/CVE-2024-46719.html
* https://www.suse.com/security/cve/CVE-2024-46720.html
* https://www.suse.com/security/cve/CVE-2024-46722.html
* https://www.suse.com/security/cve/CVE-2024-46723.html
* https://www.suse.com/security/cve/CVE-2024-46724.html
* https://www.suse.com/security/cve/CVE-2024-46725.html
* https://www.suse.com/security/cve/CVE-2024-46726.html
* https://www.suse.com/security/cve/CVE-2024-46728.html
* https://www.suse.com/security/cve/CVE-2024-46729.html
* https://www.suse.com/security/cve/CVE-2024-46730.html
* https://www.suse.com/security/cve/CVE-2024-46731.html
* https://www.suse.com/security/cve/CVE-2024-46732.html
* https://www.suse.com/security/cve/CVE-2024-46734.html
* https://www.suse.com/security/cve/CVE-2024-46735.html
* https://www.suse.com/security/cve/CVE-2024-46737.html
* https://www.suse.com/security/cve/CVE-2024-46738.html
* https://www.suse.com/security/cve/CVE-2024-46739.html
* https://www.suse.com/security/cve/CVE-2024-46741.html
* https://www.suse.com/security/cve/CVE-2024-46743.html
* https://www.suse.com/security/cve/CVE-2024-46744.html
* https://www.suse.com/security/cve/CVE-2024-46745.html
* https://www.suse.com/security/cve/CVE-2024-46746.html
* https://www.suse.com/security/cve/CVE-2024-46747.html
* https://www.suse.com/security/cve/CVE-2024-46749.html
* https://www.suse.com/security/cve/CVE-2024-46750.html
* https://www.suse.com/security/cve/CVE-2024-46751.html
* https://www.suse.com/security/cve/CVE-2024-46752.html
* https://www.suse.com/security/cve/CVE-2024-46753.html
* https://www.suse.com/security/cve/CVE-2024-46755.html
* https://www.suse.com/security/cve/CVE-2024-46756.html
* https://www.suse.com/security/cve/CVE-2024-46757.html
* https://www.suse.com/security/cve/CVE-2024-46758.html
* https://www.suse.com/security/cve/CVE-2024-46759.html
* https://www.suse.com/security/cve/CVE-2024-46760.html
* https://www.suse.com/security/cve/CVE-2024-46761.html
* https://www.suse.com/security/cve/CVE-2024-46767.html
* https://www.suse.com/security/cve/CVE-2024-46771.html
* https://www.suse.com/security/cve/CVE-2024-46772.html
* https://www.suse.com/security/cve/CVE-2024-46773.html
* https://www.suse.com/security/cve/CVE-2024-46774.html
* https://www.suse.com/security/cve/CVE-2024-46776.html
* https://www.suse.com/security/cve/CVE-2024-46778.html
* https://www.suse.com/security/cve/CVE-2024-46780.html
* https://www.suse.com/security/cve/CVE-2024-46781.html
* https://www.suse.com/security/cve/CVE-2024-46783.html
* https://www.suse.com/security/cve/CVE-2024-46784.html
* https://www.suse.com/security/cve/CVE-2024-46786.html
* https://www.suse.com/security/cve/CVE-2024-46787.html
* https://www.suse.com/security/cve/CVE-2024-46791.html
* https://www.suse.com/security/cve/CVE-2024-46794.html
* https://www.suse.com/security/cve/CVE-2024-46797.html
* https://www.suse.com/security/cve/CVE-2024-46798.html
* https://www.suse.com/security/cve/CVE-2024-46822.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1183045
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1216776
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221527
* https://bugzilla.suse.com/show_bug.cgi?id=1221610
* https://bugzilla.suse.com/show_bug.cgi?id=1221650
* https://bugzilla.suse.com/show_bug.cgi?id=1222629
* https://bugzilla.suse.com/show_bug.cgi?id=1223600
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1225487
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226507
* https://bugzilla.suse.com/show_bug.cgi?id=1226606
* https://bugzilla.suse.com/show_bug.cgi?id=1226666
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1226860
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227694
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227819
* https://bugzilla.suse.com/show_bug.cgi?id=1227885
* https://bugzilla.suse.com/show_bug.cgi?id=1227890
* https://bugzilla.suse.com/show_bug.cgi?id=1227962
* https://bugzilla.suse.com/show_bug.cgi?id=1228090
* https://bugzilla.suse.com/show_bug.cgi?id=1228140
* https://bugzilla.suse.com/show_bug.cgi?id=1228244
* https://bugzilla.suse.com/show_bug.cgi?id=1228507
* https://bugzilla.suse.com/show_bug.cgi?id=1228771
* https://bugzilla.suse.com/show_bug.cgi?id=1229001
* https://bugzilla.suse.com/show_bug.cgi?id=1229004
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229167
* https://bugzilla.suse.com/show_bug.cgi?id=1229169
* https://bugzilla.suse.com/show_bug.cgi?id=1229289
* https://bugzilla.suse.com/show_bug.cgi?id=1229334
* https://bugzilla.suse.com/show_bug.cgi?id=1229362
* https://bugzilla.suse.com/show_bug.cgi?id=1229363
* https://bugzilla.suse.com/show_bug.cgi?id=1229364
* https://bugzilla.suse.com/show_bug.cgi?id=1229371
* https://bugzilla.suse.com/show_bug.cgi?id=1229380
* https://bugzilla.suse.com/show_bug.cgi?id=1229389
* https://bugzilla.suse.com/show_bug.cgi?id=1229394
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229443
* https://bugzilla.suse.com/show_bug.cgi?id=1229452
* https://bugzilla.suse.com/show_bug.cgi?id=1229455
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229494
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229753
* https://bugzilla.suse.com/show_bug.cgi?id=1229764
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229790
* https://bugzilla.suse.com/show_bug.cgi?id=1229810
* https://bugzilla.suse.com/show_bug.cgi?id=1229899
* https://bugzilla.suse.com/show_bug.cgi?id=1229928
* https://bugzilla.suse.com/show_bug.cgi?id=1230015
* https://bugzilla.suse.com/show_bug.cgi?id=1230119
* https://bugzilla.suse.com/show_bug.cgi?id=1230123
* https://bugzilla.suse.com/show_bug.cgi?id=1230124
* https://bugzilla.suse.com/show_bug.cgi?id=1230125
* https://bugzilla.suse.com/show_bug.cgi?id=1230169
* https://bugzilla.suse.com/show_bug.cgi?id=1230170
* https://bugzilla.suse.com/show_bug.cgi?id=1230171
* https://bugzilla.suse.com/show_bug.cgi?id=1230173
* https://bugzilla.suse.com/show_bug.cgi?id=1230174
* https://bugzilla.suse.com/show_bug.cgi?id=1230175
* https://bugzilla.suse.com/show_bug.cgi?id=1230176
* https://bugzilla.suse.com/show_bug.cgi?id=1230178
* https://bugzilla.suse.com/show_bug.cgi?id=1230180
* https://bugzilla.suse.com/show_bug.cgi?id=1230181
* https://bugzilla.suse.com/show_bug.cgi?id=1230185
* https://bugzilla.suse.com/show_bug.cgi?id=1230191
* https://bugzilla.suse.com/show_bug.cgi?id=1230192
* https://bugzilla.suse.com/show_bug.cgi?id=1230193
* https://bugzilla.suse.com/show_bug.cgi?id=1230194
* https://bugzilla.suse.com/show_bug.cgi?id=1230195
* https://bugzilla.suse.com/show_bug.cgi?id=1230200
* https://bugzilla.suse.com/show_bug.cgi?id=1230204
* https://bugzilla.suse.com/show_bug.cgi?id=1230206
* https://bugzilla.suse.com/show_bug.cgi?id=1230207
* https://bugzilla.suse.com/show_bug.cgi?id=1230209
* https://bugzilla.suse.com/show_bug.cgi?id=1230211
* https://bugzilla.suse.com/show_bug.cgi?id=1230213
* https://bugzilla.suse.com/show_bug.cgi?id=1230217
* https://bugzilla.suse.com/show_bug.cgi?id=1230221
* https://bugzilla.suse.com/show_bug.cgi?id=1230224
* https://bugzilla.suse.com/show_bug.cgi?id=1230230
* https://bugzilla.suse.com/show_bug.cgi?id=1230232
* https://bugzilla.suse.com/show_bug.cgi?id=1230233
* https://bugzilla.suse.com/show_bug.cgi?id=1230240
* https://bugzilla.suse.com/show_bug.cgi?id=1230244
* https://bugzilla.suse.com/show_bug.cgi?id=1230245
* https://bugzilla.suse.com/show_bug.cgi?id=1230247
* https://bugzilla.suse.com/show_bug.cgi?id=1230248
* https://bugzilla.suse.com/show_bug.cgi?id=1230269
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230295
* https://bugzilla.suse.com/show_bug.cgi?id=1230340
* https://bugzilla.suse.com/show_bug.cgi?id=1230426
* https://bugzilla.suse.com/show_bug.cgi?id=1230430
* https://bugzilla.suse.com/show_bug.cgi?id=1230431
* https://bugzilla.suse.com/show_bug.cgi?id=1230432
* https://bugzilla.suse.com/show_bug.cgi?id=1230433
* https://bugzilla.suse.com/show_bug.cgi?id=1230434
* https://bugzilla.suse.com/show_bug.cgi?id=1230435
* https://bugzilla.suse.com/show_bug.cgi?id=1230440
* https://bugzilla.suse.com/show_bug.cgi?id=1230441
* https://bugzilla.suse.com/show_bug.cgi?id=1230442
* https://bugzilla.suse.com/show_bug.cgi?id=1230444
* https://bugzilla.suse.com/show_bug.cgi?id=1230450
* https://bugzilla.suse.com/show_bug.cgi?id=1230451
* https://bugzilla.suse.com/show_bug.cgi?id=1230454
* https://bugzilla.suse.com/show_bug.cgi?id=1230455
* https://bugzilla.suse.com/show_bug.cgi?id=1230457
* https://bugzilla.suse.com/show_bug.cgi?id=1230459
* https://bugzilla.suse.com/show_bug.cgi?id=1230506
* https://bugzilla.suse.com/show_bug.cgi?id=1230507
* https://bugzilla.suse.com/show_bug.cgi?id=1230511
* https://bugzilla.suse.com/show_bug.cgi?id=1230515
* https://bugzilla.suse.com/show_bug.cgi?id=1230517
* https://bugzilla.suse.com/show_bug.cgi?id=1230518
* https://bugzilla.suse.com/show_bug.cgi?id=1230519
* https://bugzilla.suse.com/show_bug.cgi?id=1230520
* https://bugzilla.suse.com/show_bug.cgi?id=1230521
* https://bugzilla.suse.com/show_bug.cgi?id=1230524
* https://bugzilla.suse.com/show_bug.cgi?id=1230526
* https://bugzilla.suse.com/show_bug.cgi?id=1230533
* https://bugzilla.suse.com/show_bug.cgi?id=1230535
* https://bugzilla.suse.com/show_bug.cgi?id=1230539
* https://bugzilla.suse.com/show_bug.cgi?id=1230540
* https://bugzilla.suse.com/show_bug.cgi?id=1230549
* https://bugzilla.suse.com/show_bug.cgi?id=1230556
* https://bugzilla.suse.com/show_bug.cgi?id=1230562
* https://bugzilla.suse.com/show_bug.cgi?id=1230563
* https://bugzilla.suse.com/show_bug.cgi?id=1230564
* https://bugzilla.suse.com/show_bug.cgi?id=1230580
* https://bugzilla.suse.com/show_bug.cgi?id=1230582
* https://bugzilla.suse.com/show_bug.cgi?id=1230589
* https://bugzilla.suse.com/show_bug.cgi?id=1230602
* https://bugzilla.suse.com/show_bug.cgi?id=1230699
* https://bugzilla.suse.com/show_bug.cgi?id=1230700
* https://bugzilla.suse.com/show_bug.cgi?id=1230701
* https://bugzilla.suse.com/show_bug.cgi?id=1230702
* https://bugzilla.suse.com/show_bug.cgi?id=1230703
* https://bugzilla.suse.com/show_bug.cgi?id=1230704
* https://bugzilla.suse.com/show_bug.cgi?id=1230705
* https://bugzilla.suse.com/show_bug.cgi?id=1230706
* https://bugzilla.suse.com/show_bug.cgi?id=1230709
* https://bugzilla.suse.com/show_bug.cgi?id=1230711
* https://bugzilla.suse.com/show_bug.cgi?id=1230712
* https://bugzilla.suse.com/show_bug.cgi?id=1230715
* https://bugzilla.suse.com/show_bug.cgi?id=1230719
* https://bugzilla.suse.com/show_bug.cgi?id=1230722
* https://bugzilla.suse.com/show_bug.cgi?id=1230724
* https://bugzilla.suse.com/show_bug.cgi?id=1230725
* https://bugzilla.suse.com/show_bug.cgi?id=1230726
* https://bugzilla.suse.com/show_bug.cgi?id=1230727
* https://bugzilla.suse.com/show_bug.cgi?id=1230730
* https://bugzilla.suse.com/show_bug.cgi?id=1230731
* https://bugzilla.suse.com/show_bug.cgi?id=1230732
* https://bugzilla.suse.com/show_bug.cgi?id=1230747
* https://bugzilla.suse.com/show_bug.cgi?id=1230748
* https://bugzilla.suse.com/show_bug.cgi?id=1230749
* https://bugzilla.suse.com/show_bug.cgi?id=1230751
* https://bugzilla.suse.com/show_bug.cgi?id=1230752
* https://bugzilla.suse.com/show_bug.cgi?id=1230753
* https://bugzilla.suse.com/show_bug.cgi?id=1230756
* https://bugzilla.suse.com/show_bug.cgi?id=1230761
* https://bugzilla.suse.com/show_bug.cgi?id=1230766
* https://bugzilla.suse.com/show_bug.cgi?id=1230767
* https://bugzilla.suse.com/show_bug.cgi?id=1230768
* https://bugzilla.suse.com/show_bug.cgi?id=1230771
* https://bugzilla.suse.com/show_bug.cgi?id=1230772
* https://bugzilla.suse.com/show_bug.cgi?id=1230775
* https://bugzilla.suse.com/show_bug.cgi?id=1230776
* https://bugzilla.suse.com/show_bug.cgi?id=1230780
* https://bugzilla.suse.com/show_bug.cgi?id=1230783
* https://bugzilla.suse.com/show_bug.cgi?id=1230786
* https://bugzilla.suse.com/show_bug.cgi?id=1230787
* https://bugzilla.suse.com/show_bug.cgi?id=1230791
* https://bugzilla.suse.com/show_bug.cgi?id=1230794
* https://bugzilla.suse.com/show_bug.cgi?id=1230796
* https://bugzilla.suse.com/show_bug.cgi?id=1230802
* https://bugzilla.suse.com/show_bug.cgi?id=1230806
* https://bugzilla.suse.com/show_bug.cgi?id=1230808
* https://bugzilla.suse.com/show_bug.cgi?id=1230809
* https://bugzilla.suse.com/show_bug.cgi?id=1230810
* https://bugzilla.suse.com/show_bug.cgi?id=1230812
* https://bugzilla.suse.com/show_bug.cgi?id=1230813
* https://bugzilla.suse.com/show_bug.cgi?id=1230814
* https://bugzilla.suse.com/show_bug.cgi?id=1230815
* https://bugzilla.suse.com/show_bug.cgi?id=1230821
* https://bugzilla.suse.com/show_bug.cgi?id=1230825
* https://bugzilla.suse.com/show_bug.cgi?id=1230830
* https://bugzilla.suse.com/show_bug.cgi?id=1230831
* https://bugzilla.suse.com/show_bug.cgi?id=1230854
* https://bugzilla.suse.com/show_bug.cgi?id=1230948
* https://bugzilla.suse.com/show_bug.cgi?id=1231008
* https://bugzilla.suse.com/show_bug.cgi?id=1231035
* https://bugzilla.suse.com/show_bug.cgi?id=1231120
* https://bugzilla.suse.com/show_bug.cgi?id=1231146
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231183
* https://jira.suse.com/browse/PED-10954
* https://jira.suse.com/browse/PED-9899
1
0
SUSE-RU-2024:3560-1: moderate: Recommended update for certification-sles-eal4
by OPENSUSE-UPDATES 09 Oct '24
by OPENSUSE-UPDATES 09 Oct '24
09 Oct '24
# Recommended update for certification-sles-eal4
Announcement ID: SUSE-RU-2024:3560-1
Release Date: 2024-10-09T08:43:59Z
Rating: moderate
References:
* bsc#1228795
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for certification-sles-eal4 fixes the following issue:
* require crypto-policies-scripts (bsc#1228795).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3560=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3560=1
## Package List:
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* certification-sles-eal4-15.6+git20240925.229b814-150600.14.12.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* certification-sles-eal4-15.6+git20240925.229b814-150600.14.12.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228795
1
0
09 Oct '24
# Recommended update for ibus-libpinyin
Announcement ID: SUSE-RU-2024:3562-1
Release Date: 2024-10-09T08:53:59Z
Rating: moderate
References:
* bsc#1218160
* bsc#1228652
Affected Products:
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has two fixes can now be installed.
## Description:
This update for ibus-libpinyin fixes the following issues:
* Change python depending version, Since tumbleweed and SLE already totally
switch to python3, no longer coexist with python2. (bsc#1228652).
* Backporting patch from upstream, Revert python3 version checking to 3.2 to
enable lower python version building (bsc#1228652).
* The command 'zypper se python3' in 15-SP6 is listing python310, which should
not be present in 15-SP6 (bsc#1218160).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3562=1 openSUSE-SLE-15.6-2024-3562=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3562=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* ibus-libpinyin-1.15.3-150600.4.3.3
* ibus-libpinyin-debuginfo-1.15.3-150600.4.3.3
* ibus-libpinyin-debugsource-1.15.3-150600.4.3.3
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ibus-libpinyin-1.15.3-150600.4.3.3
* ibus-libpinyin-debuginfo-1.15.3-150600.4.3.3
* ibus-libpinyin-debugsource-1.15.3-150600.4.3.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1218160
* https://bugzilla.suse.com/show_bug.cgi?id=1228652
1
0
09 Oct '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3569-1
Release Date: 2024-10-09T11:52:14Z
Rating: important
References:
* bsc#1199769
* bsc#1216223
* bsc#1220382
* bsc#1221610
* bsc#1221650
* bsc#1222629
* bsc#1222973
* bsc#1223600
* bsc#1223848
* bsc#1224085
* bsc#1225903
* bsc#1226003
* bsc#1226606
* bsc#1226662
* bsc#1226666
* bsc#1226846
* bsc#1226860
* bsc#1226875
* bsc#1226915
* bsc#1227487
* bsc#1227726
* bsc#1227819
* bsc#1227832
* bsc#1227890
* bsc#1228507
* bsc#1228576
* bsc#1228620
* bsc#1228771
* bsc#1229031
* bsc#1229034
* bsc#1229086
* bsc#1229156
* bsc#1229289
* bsc#1229334
* bsc#1229362
* bsc#1229363
* bsc#1229364
* bsc#1229394
* bsc#1229429
* bsc#1229453
* bsc#1229572
* bsc#1229573
* bsc#1229585
* bsc#1229607
* bsc#1229619
* bsc#1229633
* bsc#1229662
* bsc#1229753
* bsc#1229764
* bsc#1229790
* bsc#1229810
* bsc#1229830
* bsc#1229899
* bsc#1229928
* bsc#1229947
* bsc#1230015
* bsc#1230129
* bsc#1230130
* bsc#1230170
* bsc#1230171
* bsc#1230174
* bsc#1230175
* bsc#1230176
* bsc#1230178
* bsc#1230180
* bsc#1230185
* bsc#1230192
* bsc#1230193
* bsc#1230194
* bsc#1230200
* bsc#1230204
* bsc#1230209
* bsc#1230211
* bsc#1230212
* bsc#1230217
* bsc#1230224
* bsc#1230230
* bsc#1230233
* bsc#1230244
* bsc#1230245
* bsc#1230247
* bsc#1230248
* bsc#1230269
* bsc#1230339
* bsc#1230340
* bsc#1230392
* bsc#1230398
* bsc#1230431
* bsc#1230433
* bsc#1230434
* bsc#1230440
* bsc#1230442
* bsc#1230444
* bsc#1230450
* bsc#1230451
* bsc#1230454
* bsc#1230506
* bsc#1230507
* bsc#1230511
* bsc#1230515
* bsc#1230517
* bsc#1230524
* bsc#1230533
* bsc#1230535
* bsc#1230549
* bsc#1230556
* bsc#1230582
* bsc#1230589
* bsc#1230591
* bsc#1230592
* bsc#1230699
* bsc#1230700
* bsc#1230701
* bsc#1230702
* bsc#1230703
* bsc#1230705
* bsc#1230706
* bsc#1230707
* bsc#1230709
* bsc#1230710
* bsc#1230711
* bsc#1230712
* bsc#1230719
* bsc#1230724
* bsc#1230725
* bsc#1230730
* bsc#1230731
* bsc#1230732
* bsc#1230733
* bsc#1230747
* bsc#1230748
* bsc#1230751
* bsc#1230752
* bsc#1230756
* bsc#1230761
* bsc#1230766
* bsc#1230767
* bsc#1230768
* bsc#1230771
* bsc#1230772
* bsc#1230776
* bsc#1230783
* bsc#1230786
* bsc#1230791
* bsc#1230794
* bsc#1230796
* bsc#1230802
* bsc#1230806
* bsc#1230808
* bsc#1230810
* bsc#1230812
* bsc#1230813
* bsc#1230814
* bsc#1230815
* bsc#1230821
* bsc#1230825
* bsc#1230830
* bsc#1231013
* bsc#1231017
* bsc#1231116
* bsc#1231120
* bsc#1231146
* bsc#1231180
* bsc#1231181
Cross-References:
* CVE-2022-48901
* CVE-2022-48911
* CVE-2022-48923
* CVE-2022-48935
* CVE-2022-48944
* CVE-2022-48945
* CVE-2023-52610
* CVE-2023-52916
* CVE-2024-26640
* CVE-2024-26759
* CVE-2024-26767
* CVE-2024-26804
* CVE-2024-26837
* CVE-2024-37353
* CVE-2024-38538
* CVE-2024-38596
* CVE-2024-38632
* CVE-2024-40910
* CVE-2024-40973
* CVE-2024-40983
* CVE-2024-41062
* CVE-2024-41082
* CVE-2024-42154
* CVE-2024-42259
* CVE-2024-42265
* CVE-2024-42304
* CVE-2024-42305
* CVE-2024-42306
* CVE-2024-43828
* CVE-2024-43835
* CVE-2024-43890
* CVE-2024-43898
* CVE-2024-43912
* CVE-2024-43914
* CVE-2024-44935
* CVE-2024-44944
* CVE-2024-44946
* CVE-2024-44948
* CVE-2024-44950
* CVE-2024-44952
* CVE-2024-44954
* CVE-2024-44967
* CVE-2024-44969
* CVE-2024-44970
* CVE-2024-44971
* CVE-2024-44972
* CVE-2024-44977
* CVE-2024-44982
* CVE-2024-44986
* CVE-2024-44987
* CVE-2024-44988
* CVE-2024-44989
* CVE-2024-44990
* CVE-2024-44998
* CVE-2024-44999
* CVE-2024-45000
* CVE-2024-45001
* CVE-2024-45003
* CVE-2024-45006
* CVE-2024-45007
* CVE-2024-45008
* CVE-2024-45011
* CVE-2024-45013
* CVE-2024-45015
* CVE-2024-45018
* CVE-2024-45020
* CVE-2024-45021
* CVE-2024-45026
* CVE-2024-45028
* CVE-2024-45029
* CVE-2024-46673
* CVE-2024-46674
* CVE-2024-46675
* CVE-2024-46676
* CVE-2024-46677
* CVE-2024-46679
* CVE-2024-46685
* CVE-2024-46686
* CVE-2024-46689
* CVE-2024-46694
* CVE-2024-46702
* CVE-2024-46707
* CVE-2024-46714
* CVE-2024-46715
* CVE-2024-46717
* CVE-2024-46720
* CVE-2024-46721
* CVE-2024-46722
* CVE-2024-46723
* CVE-2024-46724
* CVE-2024-46725
* CVE-2024-46726
* CVE-2024-46727
* CVE-2024-46728
* CVE-2024-46730
* CVE-2024-46731
* CVE-2024-46732
* CVE-2024-46737
* CVE-2024-46738
* CVE-2024-46739
* CVE-2024-46743
* CVE-2024-46744
* CVE-2024-46745
* CVE-2024-46746
* CVE-2024-46747
* CVE-2024-46750
* CVE-2024-46751
* CVE-2024-46752
* CVE-2024-46753
* CVE-2024-46755
* CVE-2024-46756
* CVE-2024-46758
* CVE-2024-46759
* CVE-2024-46761
* CVE-2024-46771
* CVE-2024-46772
* CVE-2024-46773
* CVE-2024-46774
* CVE-2024-46778
* CVE-2024-46780
* CVE-2024-46781
* CVE-2024-46783
* CVE-2024-46784
* CVE-2024-46786
* CVE-2024-46787
* CVE-2024-46791
* CVE-2024-46794
* CVE-2024-46798
* CVE-2024-46822
* CVE-2024-46830
CVSS scores:
* CVE-2022-48901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48923 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48944 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-26767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-37353 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40910 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-42259 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42259 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42259 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43890 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43912 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43912 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44972 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44977 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46675 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
* CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46676 ( SUSE ): 2.4
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46724 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46738 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46739 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46743 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46744 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46747 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46750 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46752 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46753 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46756 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46758 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46759 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46761 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46780 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46783 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46786 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46787 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46794 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-46798 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
An update that solves 130 vulnerabilities and has 34 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2022-48901: btrfs: do not start relocation until in progress drops are
done (bsc#1229607).
* CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.
(bsc#1229633).
* CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment
(bsc#1229662)
* CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit
(bsc#1229619)
* CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags
(bsc#1221610).
* CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900
(bsc#1230269).
* CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
* CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
* CVE-2024-26767: drm/amd/display: fixed integer types and null check
locations (bsc#1230339).
* CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth
(bsc#1222629).
* CVE-2024-26837: net: bridge: switchdev: race between creation of new group
memberships and generation of the list of MDB events to replay
(bsc#1222973).
* CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
* CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len
bytes (bsc#1226606).
* CVE-2024-38596: af_unix: Fix data races in
unix_release_sock/unix_stream_sendmsg (bsc#1226846).
* CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
* CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP
(bsc#1227890).
* CVE-2024-40983: tipc: force a dst refcount before doing decryption
(bsc#1227819).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command
(bsc#1228620 CVE-2024-41082).
* CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
* CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation
(bsc#1229156)
* CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from
mispredictions (bsc#1229334).
* CVE-2024-42304: ext4: make sure the first directory block is not a hole
(bsc#1229364).
* CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir
indexed (bsc#1229363).
* CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer
(bsc#1229362).
* CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit
(bsc#1229394).
* CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
* CVE-2024-43898: ext4: sanity check for NULL pointer after
ext4_force_shutdown (bsc#1229753).
* CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths
(bsc#1229830)
* CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after
reassembling (bsc#1229790).
* CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock()
(bsc#1229810).
* CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate
expect ID (bsc#1229899).
* CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
(bsc#1230015).
* CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special
register set (bsc#1230180).
* CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race
(bsc#1230178).
* CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
(bsc#1230209).
* CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in
bcm_sf2_mdio_register() (bsc#1230211).
* CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230)
* CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
* CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
* CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference
(bsc#1230193).
* CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok
(bsc#1230194).
* CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx()
(bsc#1230171).
* CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
* CVE-2024-45003: Don't evict inode under the inode lru traversing context
(bsc#1230245).
* CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175).
* CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
* CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl()
(bsc#1230442).
* CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to
(bsc#1230444)
* CVE-2024-45018: netfilter: flowtable: initialise extack before use
(bsc#1230431).
* CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops
(bsc#1230434).
* CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe
(bsc#1230451).
* CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure
(bsc#1230506).
* CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe
error path (bsc#1230507).
* CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
* CVE-2024-46679: ethtool: check device is present when getting link settings
(bsc#1230556).
* CVE-2024-46685: pinctrl: single: fix potential NULL dereference in
pcs_get_function() (bsc#1230515)
* CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in
smb2_new_read_req() (bsc#1230517).
* CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB
(bsc#1230524)
* CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is
removed (bsc#1230589)
* CVE-2024-46707: KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a
vGICv3 (bsc#1230582).
* CVE-2024-46715: driver: iio: add missing checks on iio_info's callback
access (bsc#1230700).
* CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
* CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
* CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before
using (bsc#1230703)
* CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1
(bsc#1230701)
* CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in
interrupt map walk (bsc#1230756).
* CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at
btrfs_lookup_extent_info() (bsc#1230786).
* CVE-2024-46752: btrfs: reduce nesting for extent processing at
btrfs_lookup_extent_info() (bsc#1230794).
* CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly
(bsc#1230796).
* CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used
(bsc#1230772).
* CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg()
(bsc#1230810).
* CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
* CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
* CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing
CPU entry (bsc#1231120).
* CVE-2024-46830: KVM: x86: Acquire kvm->srcu when handling
KVM_SET_VCPU_EVENTS (bsc#1231116).
The following non-security bugs were fixed:
* ACPI: battery: create alarm sysfs attribute atomically (git-fixes).
* ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
* ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-
fixes).
* ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-
fixes).
* ACPI: processor: Return an error if acpi_processor_get_info() fails in
processor_add() (stable-fixes).
* ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes).
* ACPI: sysfs: validate return type of _STR method (git-fixes).
* af_unix: annotate lockless accesses to sk->sk_err (bsc#1226846).
* af_unix: Fix data races around sk->sk_shutdown (bsc#1226846).
* af_unix: Fix data-races around sk->sk_shutdown (git-fixes).
* ALSA: hda: Add input value sanity checks to HDMI channel map controls
(stable-fixes).
* ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius
devices (stable-fixes).
* ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes).
* ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown
(stable-fixes).
* ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
* apparmor: fix possible NULL pointer dereference (stable-fixes).
* arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
* arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-
fixes).
* arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-
fixes).
* arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency
(git-fixes).
* arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
* arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
* arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
* arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
* arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
* ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
* ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
* ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
* ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
* ASoC: tegra: Fix CBB error during probe() (git-fixes).
* ASoC: topology: Properly initialize soc_enum values (stable-fixes).
* ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
* ata: pata_macio: Use WARN instead of BUG (stable-fixes).
* blk-mq: add helper for checking if one CPU is mapped to specified hctx
(bsc#1223600).
* blk-mq: add number of queue calc helper (bsc#1229034).
* blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031).
* blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
* blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034).
* blk-mq: issue warning when offlining hctx with online isolcpus
(bsc#1229034).
* blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034).
* Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
* Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
* Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-
fixes).
* Bluetooth: L2CAP: Fix deadlock (git-fixes).
* Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
* cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181).
* cachefiles: Fix non-taking of sb_writers around set/removexattr
(bsc#1231013).
* can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes).
* can: bcm: Remove proc entry when dev is unregistered (git-fixes).
* can: j1939: use correct function name in comment (git-fixes).
* can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-
fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
* ceph: remove the incorrect Fw reference check when dirtying pages
(bsc#1231180).
* char: xillybus: Check USB endpoints when probing device (git-fixes).
* clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
* clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-
fixes).
* clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled
(git-fixes).
* cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately
(git-fixes).
* crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure
(git-fixes).
* crypto: virtio - Handle dataq logic with tasklet (git-fixes).
* crypto: virtio - Wait for tasklet to complete on device remove (git-fixes).
* crypto: xor - fix template benchmarking (git-fixes).
* devres: Initialize an uninitialized struct member (stable-fixes).
* driver core: Add debug logs when fwnode links are added/deleted (git-fixes).
* driver core: Add missing parameter description to __fwnode_link_add() (git-
fixes).
* driver core: Create __fwnode_link_del() helper function (git-fixes).
* driver core: fw_devlink: Allow marking a fwnode link as being part of a
cycle (git-fixes).
* driver core: fw_devlink: Consolidate device link flag computation (git-
fixes).
* driver core: Set deferred probe reason when deferred by driver core (git-
fixes).
* drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
* Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
* Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
* drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
(git-fixes).
* drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
(git-fixes).
* drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
* drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
* drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
* drm/amd/display: added NULL check at start of dc_validate_stream (stable-
fixes).
* drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
* drm/amd/display: Check denominator pbn_div before used (stable-fixes).
* drm/amd/display: Check gpio_id before used as array index (stable-fixes).
* drm/amd/display: Check HDCP returned status (stable-fixes).
* drm/amd/display: Check msg_id before processing transcation (stable-fixes).
* drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
(stable-fixes).
* drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
(stable-fixes).
* drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
dal_gpio_service_create (stable-fixes).
* drm/amd/display: Skip inactive planes within
ModeSupportAndSystemConfiguration (stable-fixes).
* drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-
fixes).
* drm/amd/display: Spinlock before reading event (stable-fixes).
* drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
(stable-fixes).
* drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
* drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
* drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6
(stable-fixes).
* drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
* drm/amdgpu: fix a possible null pointer dereference (git-fixes).
* drm/amdgpu: fix dereference after null check (stable-fixes).
* drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
* drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
* drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
* drm/amdgpu: fix overflowed array index read warning (stable-fixes).
* drm/amdgpu: Fix smatch static checker warning (stable-fixes).
* drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
* drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-
fixes).
* drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy
SOCs (stable-fixes).
* drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-
fixes).
* drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
* drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
* drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
* drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
* drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-
fixes).
* drm/amdkfd: Reconcile the definition and use of oem_id in struct
kfd_topology_device (stable-fixes).
* drm/amd/pm: check negtive return for table entries (stable-fixes).
* drm/amd/pm: check specific index for aldebaran (stable-fixes).
* drm/amd/pm: Fix negative array index read (stable-fixes).
* drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warning (stable-fixes).
* drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-
fixes).
* drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid()
(git-fixes).
* drm/bridge: tc358767: Check if fully initialized before signalling HPD event
via IRQ (stable-fixes).
* drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
* drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-
fixes).
* drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
* drm/meson: plane: Add error handling (stable-fixes).
* drm/msm/a5xx: disable preemption in submits by default (git-fixes).
* drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
* drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
* drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
* drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
* drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder
(bsc#1230444)
* drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
* drm/msm: fix %s null argument error (git-fixes).
* drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
* drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-
fixes).
* drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-
fixes).
* drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-
fixes).
* drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
* drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
* exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
* fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
* filemap: remove use of wait bookmarks (bsc#1224085).
* firmware_loader: Block path traversal (git-fixes).
* fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
(bsc#1230592).
* fuse: update stats for pages in dropped aux writeback list (bsc#1230130).
* fuse: use unsigned type for getxattr/listxattr size truncation
(bsc#1230129).
* genirq/affinity: Do not pass irq_affinity_desc array to
irq_build_affinity_masks (bsc#1229031).
* genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031).
* genirq/affinity: Only build SMP-only helper functions on SMP kernels
(bsc#1229031).
* genirq/affinity: Pass affinity managed mask array to
irq_build_affinity_masks (bsc#1229031).
* genirq/affinity: Remove the 'firstvec' parameter from
irq_build_affinity_masks (bsc#1229031).
* genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly
(bsc#1229031).
* genirq/affinity: Replace cpumask_weight() with cpumask_empty() where
appropriate (bsc#1229031).
* gfs2: setattr_chown: Add missing initialization (git-fixes).
* HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
* HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-
fixes).
* hwmon: (adc128d818) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-
fixes).
* hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
* hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
* hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-
fixes).
* hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-
fixes).
* hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
* i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-
fixes).
* i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
* i2c: isch: Add missed 'else' (git-fixes).
* i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
* i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
* i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-
fixes).
* IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
* IB/hfi1: Fix potential deadlock on &irq_src_lock and &dd->uctxt_lock (git-
fixes)
* iio: adc: ad7124: fix chip ID mismatch (git-fixes).
* iio: adc: ad7124: fix config comparison (git-fixes).
* iio: adc: ad7606: fix oversampling gpio array (git-fixes).
* iio: adc: ad7606: fix standby gpio state to match the documentation (git-
fixes).
* iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
* iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-
fixes).
* iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-
fixes).
* iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
* Input: ilitek_ts_i2c - add report id message validation (git-fixes).
* Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
* Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Input: uinput - reject requests with unreasonable number of slots (stable-
fixes).
* ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
* kabi: add __nf_queue_get_refs() for kabi compliance.
* kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes).
* kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
* lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly
(bsc#1229031).
* lib/group_cpus.c: honor housekeeping config when grouping CPUs
(bsc#1229034).
* lib/group_cpus: Export group_cpus_evenly() (bsc#1229031).
* lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
* mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
* mailbox: rockchip: fix a typo in module autoloading (git-fixes).
* media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269)
* media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
* media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).
* media: Revert "media: dvb-usb: Fix unexpected infinite loop in
dvb_usb_read_remote_control()" (git-fixes).
* media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
* media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
* media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
* media: venus: fix use after free bug in venus_remove due to race condition
(git-fixes).
* media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
* media: vivid: do not set HDMI TX controls if there are no HDMI outputs
(stable-fixes).
* media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
* mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
* mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
* mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
* mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
* mtd: slram: insert break after errors in parsing the map (git-fixes).
* net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
* net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-
fixes).
* net: missing check virtio (git-fixes).
* net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
* nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH
(bsc#1199769).
* NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
* NFS: Do not re-read the entire page cache to find the next cookie
(bsc#1226662).
* NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
* NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
* NFS: Reduce use of uncached readdir (bsc#1226662).
* NFSv4: Add missing rescheduling points in
nfs_client_return_marked_delegations (git-fixes).
* nilfs2: Constify struct kobj_type (git-fixes).
* nilfs2: determine empty node blocks as corrupted (git-fixes).
* nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
* nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
* nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
* nilfs2: fix state management in error path of log writing function (git-
fixes).
* nilfs2: protect references to superblock parameters exposed in sysfs (git-
fixes).
* nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes).
* nilfs2: use default_groups in kobj_type (git-fixes).
* nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes).
* nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
* nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
* nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034).
* nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues
(bsc#1229034).
* nvmet: Identify-Active Namespace ID List command should reject invalid nsid
(git-fixes).
* nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
* nvmet-tcp: do not continue for invalid icreq (git-fixes).
* nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
* nvmet-trace: avoid dereferencing pointer too early (git-fixes).
* ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
* ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
* ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
* ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
* PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
* PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes).
* PCI/ASPM: Move pci_function_0() upward (bsc#1226915)
* PCI/ASPM: Remove struct aspm_latency (bsc#1226915)
* PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies
(bsc#1226915)
* PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915)
* PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
* PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
* PCI: dwc: Restore MSI Receiver mask during resume (git-fixes).
* pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
* PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-
fixes).
* PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
* PCI: Support BAR sizes up to 8TB (bsc#1231017)
* PCI: Wait for Link before restoring Downstream Buses (git-fixes).
* PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
* PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
* PCI: xilinx-nwl: Fix register misspelling (git-fixes).
* pcmcia: Use resource_size function on resource object (stable-fixes).
* pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
* pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-
fixes).
* PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
* platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
* platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array
(git-fixes).
* platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-
fixes).
* power: supply: axp20x_battery: Remove design from min and max voltage (git-
fixes).
* power: supply: Drop use_cnt check from power_supply_property_is_writeable()
(git-fixes).
* power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
* power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense
(git-fixes).
* RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
* RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
* RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
* RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
* RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
* RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
* RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-
fixes)
* RDMA/hns: Optimize hem allocation performance (git-fixes)
* RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
* RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-
fixes)
* RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
* RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes)
* RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-
fixes)
* Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
* Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE"
(git-fixes).
* Revert "media: tuners: fix error return code of
hybrid_tuner_request_state()" (git-fixes).
* Revert "media: tuners: fix error return code of
hybrid_tuner_request_state()" (stable-fixes).
* rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
* scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
* scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds
(bsc#1229429).
* scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429).
* scsi: lpfc: Fix overflow build issue (bsc#1229429).
* scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429).
* scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached
topology (bsc#1229429).
* scsi: lpfc: Remove redundant vport assignment when building an abort request
(bsc#1229429).
* scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429).
* scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429).
* scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata
paths (bsc#1229429).
* scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034).
* scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues
(bsc#1229034).
* scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
(bsc#1223848).
* scsi: use block layer helpers to calculate num of queues (bsc#1229034).
* spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
* Squashfs: sanity check symbolic link size (git-fixes).
* staging: iio: frequency: ad9834: Validate frequency parameter value (git-
fixes).
* thunderbolt: Mark XDomain as unplugged when router is removed (stable-
fixes).
* tomoyo: fallback to realpath if symlink's pathname does not exist (git-
fixes).
* tools/virtio: fix build (git-fixes).
* tpm: Clean up TPM space after command failure (git-fixes).
* tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
* tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
* udp: fix receiving fraglist GSO packets (git-fixes).
* uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-
fixes).
* usb: cdnsp: Fix incorrect usb_request status (git-fixes).
* USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
* usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
* usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access (git-
fixes).
* usb: dwc3: core: Skip setting event buffers for host only controllers (git-
fixes).
* usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes).
* usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).
* usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
* usb: dwc3: st: fix probed platform device ref count on probe error path
(git-fixes).
* usbip: Do not submit special requests twice (stable-fixes).
* usbnet: fix cyclical race on disconnect with work queue (git-fixes).
* usbnet: ipheth: race between ipheth_close and error handling (git-fixes).
* usbnet: modern method to get random MAC (git-fixes).
* USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
* USB: serial: option: add MeiG Smart SRM825L (git-fixes).
* usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
* usb: uas: set host status byte on data completion error (git-fixes).
* usb: uas: set host status byte on data completion error (stable-fixes).
* USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
* usb: xhci: fix loss of data on Cadence xHC (git-fixes).
* vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
* vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).
* virito: add APIs for retrieving vq affinity (bsc#1229034).
* virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-
fixes).
* virtio: blk/scsi: use block layer helpers to calculate num of queues
(bsc#1229034).
* virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues
(bsc#1229034).
* virtiofs: forbid newlines in tags (bsc#1230591).
* virtio_net: checksum offloading handling fix (git-fixes).
* virtio_net: Fix "'%d' directive writing between 1 and 11 bytes into a region
of size 10" warnings (git-fixes).
* virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
* virtio: reenable config if freezing device failed (git-fixes).
* virtio/vsock: fix logic which reduces credit update messages (git-fixes).
* VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
(git-fixes).
* vsock/virtio: add support for device suspend/resume (git-fixes).
* vsock/virtio: factor our the code to initialize and delete VQs (git-fixes).
* vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes).
* vsock/virtio: remove socket from connected/bound list on shutdown (git-
fixes).
* watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
* wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
* wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-
fixes).
* wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
* wifi: iwlwifi: mvm: increase the time between ranging measurements (git-
fixes).
* wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-
fixes).
* wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-
fixes).
* wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
(stable-fixes).
* wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
* wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
* wifi: rtw88: remove CPT execution branch never used (git-fixes).
* wifi: wilc1000: fix potential RCU dereference issue in
wilc_parse_join_bss_param (git-fixes).
* x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
* x86/kexec: Add EFI config table identity mapping for kexec kernel
(bsc#1220382).
* x86/mm/ident_map: Use gbpages only where full GB page should be mapped
(bsc#1220382).
* x86/xen: Convert comma to semicolon (git-fixes).
* xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
* xen: allow mapping ACPI data using a different physical address
(bsc#1226003).
* xen: introduce generic helper checking for memory map conflicts
(bsc#1226003).
* xen: move checks for e820 conflicts further up (bsc#1226003).
* xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
* xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
* xen/swiotlb: fix allocated size (git-fixes).
* xen: tolerate ACPI NVS memory overlapping with Xen allocated memory
(bsc#1226003).
* xen: use correct end address of kernel for conflict checking (bsc#1226003).
* xfs: do not include bnobt blocks when reserving free block pool (git-fixes).
* xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-
fixes).
* xz: cleanup CRC32 edits from 2018 (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3569=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3569=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3569=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3569=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3569=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3569=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3569=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3569=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150500.55.83.1
* openSUSE Leap Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.83.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.83.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.83.1
* kernel-64kb-devel-5.14.21-150500.55.83.1
* kernel-64kb-debugsource-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.83.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* kernel-default-devel-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (noarch)
* kernel-devel-5.14.21-150500.55.83.1
* kernel-macros-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.83.1
* Basesystem Module 15-SP5 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.83.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.83.1
* Development Tools Module 15-SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.83.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-debugsource-5.14.21-150500.55.83.1
* kernel-obs-build-5.14.21-150500.55.83.1
* kernel-syms-5.14.21-150500.55.83.1
* Development Tools Module 15-SP5 (noarch)
* kernel-source-5.14.21-150500.55.83.1
* Legacy Module 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.83.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.83.1
* kernel-default-debugsource-5.14.21-150500.55.83.1
* reiserfs-kmp-default-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.83.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* kernel-default-livepatch-5.14.21-150500.55.83.1
* kernel-livepatch-5_14_21-150500_55_83-default-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5_Update_20-debugsource-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.83.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.14.21-150500.55.83.1
* ocfs2-kmp-default-5.14.21-150500.55.83.1
* dlm-kmp-default-5.14.21-150500.55.83.1
* kernel-default-debugsource-5.14.21-150500.55.83.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.83.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.83.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.83.1
* cluster-md-kmp-default-5.14.21-150500.55.83.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.83.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.83.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* kernel-default-extra-debuginfo-5.14.21-150500.55.83.1
* kernel-default-debugsource-5.14.21-150500.55.83.1
* kernel-default-debuginfo-5.14.21-150500.55.83.1
* kernel-default-extra-5.14.21-150500.55.83.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48901.html
* https://www.suse.com/security/cve/CVE-2022-48911.html
* https://www.suse.com/security/cve/CVE-2022-48923.html
* https://www.suse.com/security/cve/CVE-2022-48935.html
* https://www.suse.com/security/cve/CVE-2022-48944.html
* https://www.suse.com/security/cve/CVE-2022-48945.html
* https://www.suse.com/security/cve/CVE-2023-52610.html
* https://www.suse.com/security/cve/CVE-2023-52916.html
* https://www.suse.com/security/cve/CVE-2024-26640.html
* https://www.suse.com/security/cve/CVE-2024-26759.html
* https://www.suse.com/security/cve/CVE-2024-26767.html
* https://www.suse.com/security/cve/CVE-2024-26804.html
* https://www.suse.com/security/cve/CVE-2024-26837.html
* https://www.suse.com/security/cve/CVE-2024-37353.html
* https://www.suse.com/security/cve/CVE-2024-38538.html
* https://www.suse.com/security/cve/CVE-2024-38596.html
* https://www.suse.com/security/cve/CVE-2024-38632.html
* https://www.suse.com/security/cve/CVE-2024-40910.html
* https://www.suse.com/security/cve/CVE-2024-40973.html
* https://www.suse.com/security/cve/CVE-2024-40983.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41082.html
* https://www.suse.com/security/cve/CVE-2024-42154.html
* https://www.suse.com/security/cve/CVE-2024-42259.html
* https://www.suse.com/security/cve/CVE-2024-42265.html
* https://www.suse.com/security/cve/CVE-2024-42304.html
* https://www.suse.com/security/cve/CVE-2024-42305.html
* https://www.suse.com/security/cve/CVE-2024-42306.html
* https://www.suse.com/security/cve/CVE-2024-43828.html
* https://www.suse.com/security/cve/CVE-2024-43835.html
* https://www.suse.com/security/cve/CVE-2024-43890.html
* https://www.suse.com/security/cve/CVE-2024-43898.html
* https://www.suse.com/security/cve/CVE-2024-43912.html
* https://www.suse.com/security/cve/CVE-2024-43914.html
* https://www.suse.com/security/cve/CVE-2024-44935.html
* https://www.suse.com/security/cve/CVE-2024-44944.html
* https://www.suse.com/security/cve/CVE-2024-44946.html
* https://www.suse.com/security/cve/CVE-2024-44948.html
* https://www.suse.com/security/cve/CVE-2024-44950.html
* https://www.suse.com/security/cve/CVE-2024-44952.html
* https://www.suse.com/security/cve/CVE-2024-44954.html
* https://www.suse.com/security/cve/CVE-2024-44967.html
* https://www.suse.com/security/cve/CVE-2024-44969.html
* https://www.suse.com/security/cve/CVE-2024-44970.html
* https://www.suse.com/security/cve/CVE-2024-44971.html
* https://www.suse.com/security/cve/CVE-2024-44972.html
* https://www.suse.com/security/cve/CVE-2024-44977.html
* https://www.suse.com/security/cve/CVE-2024-44982.html
* https://www.suse.com/security/cve/CVE-2024-44986.html
* https://www.suse.com/security/cve/CVE-2024-44987.html
* https://www.suse.com/security/cve/CVE-2024-44988.html
* https://www.suse.com/security/cve/CVE-2024-44989.html
* https://www.suse.com/security/cve/CVE-2024-44990.html
* https://www.suse.com/security/cve/CVE-2024-44998.html
* https://www.suse.com/security/cve/CVE-2024-44999.html
* https://www.suse.com/security/cve/CVE-2024-45000.html
* https://www.suse.com/security/cve/CVE-2024-45001.html
* https://www.suse.com/security/cve/CVE-2024-45003.html
* https://www.suse.com/security/cve/CVE-2024-45006.html
* https://www.suse.com/security/cve/CVE-2024-45007.html
* https://www.suse.com/security/cve/CVE-2024-45008.html
* https://www.suse.com/security/cve/CVE-2024-45011.html
* https://www.suse.com/security/cve/CVE-2024-45013.html
* https://www.suse.com/security/cve/CVE-2024-45015.html
* https://www.suse.com/security/cve/CVE-2024-45018.html
* https://www.suse.com/security/cve/CVE-2024-45020.html
* https://www.suse.com/security/cve/CVE-2024-45021.html
* https://www.suse.com/security/cve/CVE-2024-45026.html
* https://www.suse.com/security/cve/CVE-2024-45028.html
* https://www.suse.com/security/cve/CVE-2024-45029.html
* https://www.suse.com/security/cve/CVE-2024-46673.html
* https://www.suse.com/security/cve/CVE-2024-46674.html
* https://www.suse.com/security/cve/CVE-2024-46675.html
* https://www.suse.com/security/cve/CVE-2024-46676.html
* https://www.suse.com/security/cve/CVE-2024-46677.html
* https://www.suse.com/security/cve/CVE-2024-46679.html
* https://www.suse.com/security/cve/CVE-2024-46685.html
* https://www.suse.com/security/cve/CVE-2024-46686.html
* https://www.suse.com/security/cve/CVE-2024-46689.html
* https://www.suse.com/security/cve/CVE-2024-46694.html
* https://www.suse.com/security/cve/CVE-2024-46702.html
* https://www.suse.com/security/cve/CVE-2024-46707.html
* https://www.suse.com/security/cve/CVE-2024-46714.html
* https://www.suse.com/security/cve/CVE-2024-46715.html
* https://www.suse.com/security/cve/CVE-2024-46717.html
* https://www.suse.com/security/cve/CVE-2024-46720.html
* https://www.suse.com/security/cve/CVE-2024-46721.html
* https://www.suse.com/security/cve/CVE-2024-46722.html
* https://www.suse.com/security/cve/CVE-2024-46723.html
* https://www.suse.com/security/cve/CVE-2024-46724.html
* https://www.suse.com/security/cve/CVE-2024-46725.html
* https://www.suse.com/security/cve/CVE-2024-46726.html
* https://www.suse.com/security/cve/CVE-2024-46727.html
* https://www.suse.com/security/cve/CVE-2024-46728.html
* https://www.suse.com/security/cve/CVE-2024-46730.html
* https://www.suse.com/security/cve/CVE-2024-46731.html
* https://www.suse.com/security/cve/CVE-2024-46732.html
* https://www.suse.com/security/cve/CVE-2024-46737.html
* https://www.suse.com/security/cve/CVE-2024-46738.html
* https://www.suse.com/security/cve/CVE-2024-46739.html
* https://www.suse.com/security/cve/CVE-2024-46743.html
* https://www.suse.com/security/cve/CVE-2024-46744.html
* https://www.suse.com/security/cve/CVE-2024-46745.html
* https://www.suse.com/security/cve/CVE-2024-46746.html
* https://www.suse.com/security/cve/CVE-2024-46747.html
* https://www.suse.com/security/cve/CVE-2024-46750.html
* https://www.suse.com/security/cve/CVE-2024-46751.html
* https://www.suse.com/security/cve/CVE-2024-46752.html
* https://www.suse.com/security/cve/CVE-2024-46753.html
* https://www.suse.com/security/cve/CVE-2024-46755.html
* https://www.suse.com/security/cve/CVE-2024-46756.html
* https://www.suse.com/security/cve/CVE-2024-46758.html
* https://www.suse.com/security/cve/CVE-2024-46759.html
* https://www.suse.com/security/cve/CVE-2024-46761.html
* https://www.suse.com/security/cve/CVE-2024-46771.html
* https://www.suse.com/security/cve/CVE-2024-46772.html
* https://www.suse.com/security/cve/CVE-2024-46773.html
* https://www.suse.com/security/cve/CVE-2024-46774.html
* https://www.suse.com/security/cve/CVE-2024-46778.html
* https://www.suse.com/security/cve/CVE-2024-46780.html
* https://www.suse.com/security/cve/CVE-2024-46781.html
* https://www.suse.com/security/cve/CVE-2024-46783.html
* https://www.suse.com/security/cve/CVE-2024-46784.html
* https://www.suse.com/security/cve/CVE-2024-46786.html
* https://www.suse.com/security/cve/CVE-2024-46787.html
* https://www.suse.com/security/cve/CVE-2024-46791.html
* https://www.suse.com/security/cve/CVE-2024-46794.html
* https://www.suse.com/security/cve/CVE-2024-46798.html
* https://www.suse.com/security/cve/CVE-2024-46822.html
* https://www.suse.com/security/cve/CVE-2024-46830.html
* https://bugzilla.suse.com/show_bug.cgi?id=1199769
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221610
* https://bugzilla.suse.com/show_bug.cgi?id=1221650
* https://bugzilla.suse.com/show_bug.cgi?id=1222629
* https://bugzilla.suse.com/show_bug.cgi?id=1222973
* https://bugzilla.suse.com/show_bug.cgi?id=1223600
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1224085
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226606
* https://bugzilla.suse.com/show_bug.cgi?id=1226662
* https://bugzilla.suse.com/show_bug.cgi?id=1226666
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1226860
* https://bugzilla.suse.com/show_bug.cgi?id=1226875
* https://bugzilla.suse.com/show_bug.cgi?id=1226915
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227819
* https://bugzilla.suse.com/show_bug.cgi?id=1227832
* https://bugzilla.suse.com/show_bug.cgi?id=1227890
* https://bugzilla.suse.com/show_bug.cgi?id=1228507
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228620
* https://bugzilla.suse.com/show_bug.cgi?id=1228771
* https://bugzilla.suse.com/show_bug.cgi?id=1229031
* https://bugzilla.suse.com/show_bug.cgi?id=1229034
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229156
* https://bugzilla.suse.com/show_bug.cgi?id=1229289
* https://bugzilla.suse.com/show_bug.cgi?id=1229334
* https://bugzilla.suse.com/show_bug.cgi?id=1229362
* https://bugzilla.suse.com/show_bug.cgi?id=1229363
* https://bugzilla.suse.com/show_bug.cgi?id=1229364
* https://bugzilla.suse.com/show_bug.cgi?id=1229394
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229453
* https://bugzilla.suse.com/show_bug.cgi?id=1229572
* https://bugzilla.suse.com/show_bug.cgi?id=1229573
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229607
* https://bugzilla.suse.com/show_bug.cgi?id=1229619
* https://bugzilla.suse.com/show_bug.cgi?id=1229633
* https://bugzilla.suse.com/show_bug.cgi?id=1229662
* https://bugzilla.suse.com/show_bug.cgi?id=1229753
* https://bugzilla.suse.com/show_bug.cgi?id=1229764
* https://bugzilla.suse.com/show_bug.cgi?id=1229790
* https://bugzilla.suse.com/show_bug.cgi?id=1229810
* https://bugzilla.suse.com/show_bug.cgi?id=1229830
* https://bugzilla.suse.com/show_bug.cgi?id=1229899
* https://bugzilla.suse.com/show_bug.cgi?id=1229928
* https://bugzilla.suse.com/show_bug.cgi?id=1229947
* https://bugzilla.suse.com/show_bug.cgi?id=1230015
* https://bugzilla.suse.com/show_bug.cgi?id=1230129
* https://bugzilla.suse.com/show_bug.cgi?id=1230130
* https://bugzilla.suse.com/show_bug.cgi?id=1230170
* https://bugzilla.suse.com/show_bug.cgi?id=1230171
* https://bugzilla.suse.com/show_bug.cgi?id=1230174
* https://bugzilla.suse.com/show_bug.cgi?id=1230175
* https://bugzilla.suse.com/show_bug.cgi?id=1230176
* https://bugzilla.suse.com/show_bug.cgi?id=1230178
* https://bugzilla.suse.com/show_bug.cgi?id=1230180
* https://bugzilla.suse.com/show_bug.cgi?id=1230185
* https://bugzilla.suse.com/show_bug.cgi?id=1230192
* https://bugzilla.suse.com/show_bug.cgi?id=1230193
* https://bugzilla.suse.com/show_bug.cgi?id=1230194
* https://bugzilla.suse.com/show_bug.cgi?id=1230200
* https://bugzilla.suse.com/show_bug.cgi?id=1230204
* https://bugzilla.suse.com/show_bug.cgi?id=1230209
* https://bugzilla.suse.com/show_bug.cgi?id=1230211
* https://bugzilla.suse.com/show_bug.cgi?id=1230212
* https://bugzilla.suse.com/show_bug.cgi?id=1230217
* https://bugzilla.suse.com/show_bug.cgi?id=1230224
* https://bugzilla.suse.com/show_bug.cgi?id=1230230
* https://bugzilla.suse.com/show_bug.cgi?id=1230233
* https://bugzilla.suse.com/show_bug.cgi?id=1230244
* https://bugzilla.suse.com/show_bug.cgi?id=1230245
* https://bugzilla.suse.com/show_bug.cgi?id=1230247
* https://bugzilla.suse.com/show_bug.cgi?id=1230248
* https://bugzilla.suse.com/show_bug.cgi?id=1230269
* https://bugzilla.suse.com/show_bug.cgi?id=1230339
* https://bugzilla.suse.com/show_bug.cgi?id=1230340
* https://bugzilla.suse.com/show_bug.cgi?id=1230392
* https://bugzilla.suse.com/show_bug.cgi?id=1230398
* https://bugzilla.suse.com/show_bug.cgi?id=1230431
* https://bugzilla.suse.com/show_bug.cgi?id=1230433
* https://bugzilla.suse.com/show_bug.cgi?id=1230434
* https://bugzilla.suse.com/show_bug.cgi?id=1230440
* https://bugzilla.suse.com/show_bug.cgi?id=1230442
* https://bugzilla.suse.com/show_bug.cgi?id=1230444
* https://bugzilla.suse.com/show_bug.cgi?id=1230450
* https://bugzilla.suse.com/show_bug.cgi?id=1230451
* https://bugzilla.suse.com/show_bug.cgi?id=1230454
* https://bugzilla.suse.com/show_bug.cgi?id=1230506
* https://bugzilla.suse.com/show_bug.cgi?id=1230507
* https://bugzilla.suse.com/show_bug.cgi?id=1230511
* https://bugzilla.suse.com/show_bug.cgi?id=1230515
* https://bugzilla.suse.com/show_bug.cgi?id=1230517
* https://bugzilla.suse.com/show_bug.cgi?id=1230524
* https://bugzilla.suse.com/show_bug.cgi?id=1230533
* https://bugzilla.suse.com/show_bug.cgi?id=1230535
* https://bugzilla.suse.com/show_bug.cgi?id=1230549
* https://bugzilla.suse.com/show_bug.cgi?id=1230556
* https://bugzilla.suse.com/show_bug.cgi?id=1230582
* https://bugzilla.suse.com/show_bug.cgi?id=1230589
* https://bugzilla.suse.com/show_bug.cgi?id=1230591
* https://bugzilla.suse.com/show_bug.cgi?id=1230592
* https://bugzilla.suse.com/show_bug.cgi?id=1230699
* https://bugzilla.suse.com/show_bug.cgi?id=1230700
* https://bugzilla.suse.com/show_bug.cgi?id=1230701
* https://bugzilla.suse.com/show_bug.cgi?id=1230702
* https://bugzilla.suse.com/show_bug.cgi?id=1230703
* https://bugzilla.suse.com/show_bug.cgi?id=1230705
* https://bugzilla.suse.com/show_bug.cgi?id=1230706
* https://bugzilla.suse.com/show_bug.cgi?id=1230707
* https://bugzilla.suse.com/show_bug.cgi?id=1230709
* https://bugzilla.suse.com/show_bug.cgi?id=1230710
* https://bugzilla.suse.com/show_bug.cgi?id=1230711
* https://bugzilla.suse.com/show_bug.cgi?id=1230712
* https://bugzilla.suse.com/show_bug.cgi?id=1230719
* https://bugzilla.suse.com/show_bug.cgi?id=1230724
* https://bugzilla.suse.com/show_bug.cgi?id=1230725
* https://bugzilla.suse.com/show_bug.cgi?id=1230730
* https://bugzilla.suse.com/show_bug.cgi?id=1230731
* https://bugzilla.suse.com/show_bug.cgi?id=1230732
* https://bugzilla.suse.com/show_bug.cgi?id=1230733
* https://bugzilla.suse.com/show_bug.cgi?id=1230747
* https://bugzilla.suse.com/show_bug.cgi?id=1230748
* https://bugzilla.suse.com/show_bug.cgi?id=1230751
* https://bugzilla.suse.com/show_bug.cgi?id=1230752
* https://bugzilla.suse.com/show_bug.cgi?id=1230756
* https://bugzilla.suse.com/show_bug.cgi?id=1230761
* https://bugzilla.suse.com/show_bug.cgi?id=1230766
* https://bugzilla.suse.com/show_bug.cgi?id=1230767
* https://bugzilla.suse.com/show_bug.cgi?id=1230768
* https://bugzilla.suse.com/show_bug.cgi?id=1230771
* https://bugzilla.suse.com/show_bug.cgi?id=1230772
* https://bugzilla.suse.com/show_bug.cgi?id=1230776
* https://bugzilla.suse.com/show_bug.cgi?id=1230783
* https://bugzilla.suse.com/show_bug.cgi?id=1230786
* https://bugzilla.suse.com/show_bug.cgi?id=1230791
* https://bugzilla.suse.com/show_bug.cgi?id=1230794
* https://bugzilla.suse.com/show_bug.cgi?id=1230796
* https://bugzilla.suse.com/show_bug.cgi?id=1230802
* https://bugzilla.suse.com/show_bug.cgi?id=1230806
* https://bugzilla.suse.com/show_bug.cgi?id=1230808
* https://bugzilla.suse.com/show_bug.cgi?id=1230810
* https://bugzilla.suse.com/show_bug.cgi?id=1230812
* https://bugzilla.suse.com/show_bug.cgi?id=1230813
* https://bugzilla.suse.com/show_bug.cgi?id=1230814
* https://bugzilla.suse.com/show_bug.cgi?id=1230815
* https://bugzilla.suse.com/show_bug.cgi?id=1230821
* https://bugzilla.suse.com/show_bug.cgi?id=1230825
* https://bugzilla.suse.com/show_bug.cgi?id=1230830
* https://bugzilla.suse.com/show_bug.cgi?id=1231013
* https://bugzilla.suse.com/show_bug.cgi?id=1231017
* https://bugzilla.suse.com/show_bug.cgi?id=1231116
* https://bugzilla.suse.com/show_bug.cgi?id=1231120
* https://bugzilla.suse.com/show_bug.cgi?id=1231146
* https://bugzilla.suse.com/show_bug.cgi?id=1231180
* https://bugzilla.suse.com/show_bug.cgi?id=1231181
1
0
09 Oct '24
# Recommended update for lttng-tools
Announcement ID: SUSE-RU-2024:3568-1
Release Date: 2024-10-09T10:42:18Z
Rating: important
References:
* bsc#1230128
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for lttng-tools fixes the following issues:
* Fix crash when unregistering UST apps during shutdown (bsc#1230128)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3568=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3568=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3568=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3568=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3568=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3568=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3568=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3568=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3568=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3568=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3568=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3568=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3568=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3568=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3568=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3568=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3568=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3568=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3568=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3568=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3568=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le x86_64 i586)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* openSUSE Leap Micro 5.5 (aarch64 x86_64)
* lttng-tools-2.12.2-150300.3.6.1
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* lttng-tools-2.12.2-150300.3.6.1
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* Development Tools Module 15-SP5 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* Development Tools Module 15-SP6 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
* SUSE Manager Proxy 4.3 (x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* liblttng-ctl0-2.12.2-150300.3.6.1
* lttng-tools-debugsource-2.12.2-150300.3.6.1
* liblttng-ctl0-debuginfo-2.12.2-150300.3.6.1
* lttng-tools-debuginfo-2.12.2-150300.3.6.1
* SUSE Enterprise Storage 7.1 (x86_64)
* lttng-tools-devel-2.12.2-150300.3.6.1
* lttng-tools-2.12.2-150300.3.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230128
1
0
09 Oct '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3564-1
Release Date: 2024-10-09T09:09:07Z
Rating: important
References:
* bsc#1012628
* bsc#1183045
* bsc#1215199
* bsc#1216223
* bsc#1216776
* bsc#1220382
* bsc#1221527
* bsc#1221610
* bsc#1221650
* bsc#1222629
* bsc#1223600
* bsc#1223848
* bsc#1225487
* bsc#1225812
* bsc#1225903
* bsc#1226003
* bsc#1226507
* bsc#1226606
* bsc#1226666
* bsc#1226846
* bsc#1226860
* bsc#1227487
* bsc#1227694
* bsc#1227726
* bsc#1227819
* bsc#1227885
* bsc#1227890
* bsc#1227962
* bsc#1228090
* bsc#1228140
* bsc#1228244
* bsc#1228507
* bsc#1228771
* bsc#1229001
* bsc#1229004
* bsc#1229019
* bsc#1229086
* bsc#1229167
* bsc#1229169
* bsc#1229289
* bsc#1229334
* bsc#1229362
* bsc#1229363
* bsc#1229364
* bsc#1229371
* bsc#1229380
* bsc#1229389
* bsc#1229394
* bsc#1229429
* bsc#1229443
* bsc#1229452
* bsc#1229455
* bsc#1229456
* bsc#1229494
* bsc#1229585
* bsc#1229753
* bsc#1229764
* bsc#1229768
* bsc#1229790
* bsc#1229810
* bsc#1229899
* bsc#1229928
* bsc#1230015
* bsc#1230119
* bsc#1230123
* bsc#1230124
* bsc#1230125
* bsc#1230169
* bsc#1230170
* bsc#1230171
* bsc#1230173
* bsc#1230174
* bsc#1230175
* bsc#1230176
* bsc#1230178
* bsc#1230180
* bsc#1230181
* bsc#1230185
* bsc#1230191
* bsc#1230192
* bsc#1230193
* bsc#1230194
* bsc#1230195
* bsc#1230200
* bsc#1230204
* bsc#1230206
* bsc#1230207
* bsc#1230209
* bsc#1230211
* bsc#1230213
* bsc#1230217
* bsc#1230221
* bsc#1230224
* bsc#1230230
* bsc#1230232
* bsc#1230233
* bsc#1230240
* bsc#1230244
* bsc#1230245
* bsc#1230247
* bsc#1230248
* bsc#1230269
* bsc#1230270
* bsc#1230295
* bsc#1230340
* bsc#1230426
* bsc#1230430
* bsc#1230431
* bsc#1230432
* bsc#1230433
* bsc#1230434
* bsc#1230435
* bsc#1230440
* bsc#1230441
* bsc#1230442
* bsc#1230444
* bsc#1230450
* bsc#1230451
* bsc#1230454
* bsc#1230455
* bsc#1230457
* bsc#1230459
* bsc#1230506
* bsc#1230507
* bsc#1230511
* bsc#1230515
* bsc#1230517
* bsc#1230518
* bsc#1230519
* bsc#1230520
* bsc#1230521
* bsc#1230524
* bsc#1230526
* bsc#1230533
* bsc#1230535
* bsc#1230539
* bsc#1230540
* bsc#1230549
* bsc#1230556
* bsc#1230562
* bsc#1230563
* bsc#1230564
* bsc#1230580
* bsc#1230582
* bsc#1230589
* bsc#1230602
* bsc#1230699
* bsc#1230700
* bsc#1230701
* bsc#1230702
* bsc#1230703
* bsc#1230704
* bsc#1230705
* bsc#1230706
* bsc#1230709
* bsc#1230711
* bsc#1230712
* bsc#1230715
* bsc#1230719
* bsc#1230722
* bsc#1230724
* bsc#1230725
* bsc#1230726
* bsc#1230727
* bsc#1230730
* bsc#1230731
* bsc#1230732
* bsc#1230747
* bsc#1230748
* bsc#1230749
* bsc#1230751
* bsc#1230752
* bsc#1230753
* bsc#1230756
* bsc#1230761
* bsc#1230766
* bsc#1230767
* bsc#1230768
* bsc#1230771
* bsc#1230772
* bsc#1230775
* bsc#1230776
* bsc#1230780
* bsc#1230783
* bsc#1230786
* bsc#1230787
* bsc#1230791
* bsc#1230794
* bsc#1230796
* bsc#1230802
* bsc#1230806
* bsc#1230808
* bsc#1230809
* bsc#1230810
* bsc#1230812
* bsc#1230813
* bsc#1230814
* bsc#1230815
* bsc#1230821
* bsc#1230825
* bsc#1230830
* bsc#1230831
* bsc#1230854
* bsc#1230948
* bsc#1231008
* bsc#1231035
* bsc#1231120
* bsc#1231146
* bsc#1231182
* bsc#1231183
* jsc#PED-10954
* jsc#PED-9899
Cross-References:
* CVE-2023-52610
* CVE-2023-52752
* CVE-2023-52915
* CVE-2023-52916
* CVE-2024-26640
* CVE-2024-26759
* CVE-2024-26804
* CVE-2024-36953
* CVE-2024-38538
* CVE-2024-38596
* CVE-2024-38632
* CVE-2024-40965
* CVE-2024-40973
* CVE-2024-40983
* CVE-2024-42154
* CVE-2024-42243
* CVE-2024-42252
* CVE-2024-42265
* CVE-2024-42294
* CVE-2024-42304
* CVE-2024-42305
* CVE-2024-42306
* CVE-2024-43828
* CVE-2024-43832
* CVE-2024-43835
* CVE-2024-43845
* CVE-2024-43870
* CVE-2024-43890
* CVE-2024-43898
* CVE-2024-43904
* CVE-2024-43914
* CVE-2024-44935
* CVE-2024-44944
* CVE-2024-44946
* CVE-2024-44947
* CVE-2024-44948
* CVE-2024-44950
* CVE-2024-44951
* CVE-2024-44952
* CVE-2024-44954
* CVE-2024-44960
* CVE-2024-44961
* CVE-2024-44962
* CVE-2024-44965
* CVE-2024-44967
* CVE-2024-44969
* CVE-2024-44970
* CVE-2024-44971
* CVE-2024-44977
* CVE-2024-44982
* CVE-2024-44984
* CVE-2024-44985
* CVE-2024-44986
* CVE-2024-44987
* CVE-2024-44988
* CVE-2024-44989
* CVE-2024-44990
* CVE-2024-44991
* CVE-2024-44997
* CVE-2024-44998
* CVE-2024-44999
* CVE-2024-45000
* CVE-2024-45001
* CVE-2024-45002
* CVE-2024-45003
* CVE-2024-45005
* CVE-2024-45006
* CVE-2024-45007
* CVE-2024-45008
* CVE-2024-45011
* CVE-2024-45012
* CVE-2024-45013
* CVE-2024-45015
* CVE-2024-45017
* CVE-2024-45018
* CVE-2024-45019
* CVE-2024-45020
* CVE-2024-45021
* CVE-2024-45022
* CVE-2024-45023
* CVE-2024-45026
* CVE-2024-45028
* CVE-2024-45029
* CVE-2024-45030
* CVE-2024-46672
* CVE-2024-46673
* CVE-2024-46674
* CVE-2024-46675
* CVE-2024-46676
* CVE-2024-46677
* CVE-2024-46679
* CVE-2024-46685
* CVE-2024-46686
* CVE-2024-46687
* CVE-2024-46689
* CVE-2024-46691
* CVE-2024-46692
* CVE-2024-46693
* CVE-2024-46694
* CVE-2024-46695
* CVE-2024-46702
* CVE-2024-46706
* CVE-2024-46707
* CVE-2024-46709
* CVE-2024-46710
* CVE-2024-46714
* CVE-2024-46715
* CVE-2024-46716
* CVE-2024-46717
* CVE-2024-46719
* CVE-2024-46720
* CVE-2024-46722
* CVE-2024-46723
* CVE-2024-46724
* CVE-2024-46725
* CVE-2024-46726
* CVE-2024-46728
* CVE-2024-46729
* CVE-2024-46730
* CVE-2024-46731
* CVE-2024-46732
* CVE-2024-46734
* CVE-2024-46735
* CVE-2024-46737
* CVE-2024-46738
* CVE-2024-46739
* CVE-2024-46741
* CVE-2024-46743
* CVE-2024-46744
* CVE-2024-46745
* CVE-2024-46746
* CVE-2024-46747
* CVE-2024-46749
* CVE-2024-46750
* CVE-2024-46751
* CVE-2024-46752
* CVE-2024-46753
* CVE-2024-46755
* CVE-2024-46756
* CVE-2024-46757
* CVE-2024-46758
* CVE-2024-46759
* CVE-2024-46760
* CVE-2024-46761
* CVE-2024-46767
* CVE-2024-46771
* CVE-2024-46772
* CVE-2024-46773
* CVE-2024-46774
* CVE-2024-46776
* CVE-2024-46778
* CVE-2024-46780
* CVE-2024-46781
* CVE-2024-46783
* CVE-2024-46784
* CVE-2024-46786
* CVE-2024-46787
* CVE-2024-46791
* CVE-2024-46794
* CVE-2024-46797
* CVE-2024-46798
* CVE-2024-46822
CVSS scores:
* CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-42243 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42252 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43890 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44960 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44961 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44977 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46675 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
* CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46676 ( SUSE ): 2.4
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-46702 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46724 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46734 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46735 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46738 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46739 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46741 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46743 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46744 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46747 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46749 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46752 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46753 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46756 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46757 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46758 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46759 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46760 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46780 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46783 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46786 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46787 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46794 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-46797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6
An update that solves 162 vulnerabilities, contains two features and has 48
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags
(bsc#1221610).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225487).
* CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900
(bsc#1230269).
* CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
* CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
* CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth
(bsc#1222629).
* CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len
bytes (bsc#1226606).
* CVE-2024-38596: af_unix: Fix data races in
unix_release_sock/unix_stream_sendmsg (bsc#1226846).
* CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
(bsc#1227885).
* CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP
(bsc#1227890).
* CVE-2024-40983: tipc: force a dst refcount before doing decryption
(bsc#1227819).
* CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
* CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray
(bsc#1229001).
* CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004).
* CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from
mispredictions (bsc#1229334).
* CVE-2024-42294: block: fix deadlock between sd_remove & sd_release
(bsc#1229371).
* CVE-2024-42304: ext4: make sure the first directory block is not a hole
(bsc#1229364).
* CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir
indexed (bsc#1229363).
* CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer
(bsc#1229362).
* CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit
(bsc#1229394).
* CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio
reference (bsc#1229380).
* CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename()
(bsc#1229389).
* CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
* CVE-2024-43898: ext4: sanity check for NULL pointer after
ext4_force_shutdown (bsc#1229753).
* CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after
reassembling (bsc#1229790).
* CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock()
(bsc#1229810).
* CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate
expect ID (bsc#1229899).
* CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
(bsc#1230015).
* CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special
register set (bsc#1230180).
* CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181).
* CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
(bsc#1230209).
* CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in
bcm_sf2_mdio_register() (bsc#1230211).
* CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
(bsc#1230240).
* CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206).
* CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
* CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
* CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference
(bsc#1230193).
* CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok
(bsc#1230194).
* CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch
(bsc#1230195).
* CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx()
(bsc#1230171).
* CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
* CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling
(bsc#1230169).
* CVE-2024-45003: Don't evict inode under the inode lru traversing context
(bsc#1230245).
* CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl()
(bsc#1230442).
* CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430).
* CVE-2024-45018: netfilter: flowtable: initialise extack before use
(bsc#1230431).
* CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter
(bsc#1230432).
* CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops
(bsc#1230434).
* CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with
high order fallback to order 0 (bsc#1230435).
* CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow
disk (bsc#1230455).
* CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe
(bsc#1230451).
* CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457).
* CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure
(bsc#1230506).
* CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
* CVE-2024-46679: ethtool: check device is present when getting link settings
(bsc#1230556).
* CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in
smb2_new_read_req() (bsc#1230517).
* CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside
btrfs_submit_chunk() (bsc#1230518).
* CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section
(bsc#1230526).
* CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call
(bsc#1230520).
* CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes
(bsc#1230521).
* CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers
(bsc#1230540).
* CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
* CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop
(bsc#1230704).
* CVE-2024-46735: ublk_drv: fix NULL pointer dereference in
ublk_ctrl_start_recovery() (bsc#1230727).
* CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in
interrupt map walk (bsc#1230756).
* CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at
btrfs_lookup_extent_info() (bsc#1230786).
* CVE-2024-46752: btrfs: reduce nesting for extent processing at
btrfs_lookup_extent_info() (bsc#1230794).
* CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly
(bsc#1230796).
* CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used
(bsc#1230772).
* CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg()
(bsc#1230810).
* CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
* CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
* CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing
CPU entry (bsc#1231120).
The following non-security bugs were fixed:
* ABI: testing: fix admv8818 attr description (git-fixes).
* ACPI: CPPC: Add helper to get the highest performance value (stable-fixes).
* ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
* ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-
fixes).
* ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-
fixes).
* ACPI: processor: Return an error if acpi_processor_get_info() fails in
processor_add() (stable-fixes).
* ACPI: sysfs: validate return type of _STR method (git-fixes).
* ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes).
* ACPICA: executer/exsystem: Do not nag user about every Stall() violating the
spec (git-fixes).
* ALSA: control: Apply sanity check of input values for user elements (stable-
fixes).
* ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius
devices (stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15
X1504VAP (stable-fixes).
* ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes).
* ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
* ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes).
* ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes).
* ALSA: hda: Add input value sanity checks to HDMI channel map controls
(stable-fixes).
* ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes).
* ALSA: hda: cs35l41: fix module autoloading (git-fixes).
* ARM: 9406/1: Fix callchain_trace() return value (git-fixes).
* ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(stable-fixes).
* ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes).
* ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git-
fixes).
* ASoC: cs42l42: Convert comma to semicolon (git-fixes).
* ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
* ASoC: intel: fix module autoloading (stable-fixes).
* ASoC: meson: Remove unused declartion in header file (git-fixes).
* ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
* ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
fixes).
* ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error
(git-fixes).
* ASoC: soc-ac97: Fix the incorrect description (git-fixes).
* ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
* ASoC: tas2781-i2c: Get the right GPIO line (git-fixes).
* ASoC: tda7419: fix module autoloading (stable-fixes).
* ASoC: tegra: Fix CBB error during probe() (git-fixes).
* ASoC: topology: Properly initialize soc_enum values (stable-fixes).
* ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
* ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially
broken alignment (stable-fixes).
* Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
* Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush()
(stable-fixes).
* Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
* Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
* Bluetooth: hci_event: Use HCI error defines instead of magic values (stable-
fixes).
* Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue
(stable-fixes).
* Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-
fixes).
* Detect memory allocation failure in annotated_source__alloc_histograms
(bsc#1227962).
* Documentation: ioctl: document 0x07 ioctl code (git-fixes).
* Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
* Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
* HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
* HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-
fixes).
* HID: multitouch: Add support for GT7868Q (stable-fixes).
* HID: wacom: Do not warn about dropped packets for first packet (git-fixes).
* HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes).
* IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
* Input: adp5588-keys - fix check on return code (git-fixes).
* Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
* Input: ili210x - use kvmalloc() to allocate buffer for firmware update
(stable-fixes).
* Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
* Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
* Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes).
* Input: tsc2004/5 - fix reset handling on probe (git-fixes).
* Input: tsc2004/5 - use device core to create driver-specific device
attributes (git-fixes).
* Input: uinput - reject requests with unreasonable number of slots (stable-
fixes).
* KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes).
* KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
missing (git-fixes).
* KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
(git-fixes).
* KVM: arm64: Block unsafe FF-A calls from the host (git-fixes).
* KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging
(git-fixes).
* KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git-
fixes).
* KVM: arm64: Do not re-initialize the KVM lock (git-fixes).
* KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
(git-fixes).
* KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git-
fixes).
* KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
(git-fixes).
* KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes).
* KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
fixes).
* KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes).
* Merge branch 'SLE15-SP6' (ea7c56db3e5d) into 'SLE15-SP6-RT'
* NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
* NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
* NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
* NFSv4: Add missing rescheduling points in
nfs_client_return_marked_delegations (git-fixes).
* No -rt specific changes this merge.
* PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
* PCI: Wait for Link before restoring Downstream Buses (git-fixes).
* PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes).
* PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
* PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git-
fixes).
* PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
* PCI: imx6: Fix missing call to phy_power_off() in error handling (git-
fixes).
* PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-
fixes).
* PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
* PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes).
* PCI: qcom-ep: Enable controller resources like PHY only after refclk is
available (git-fixes).
* PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
* PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
* PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
* RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
* RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
* RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
* RDMA/erdma: Return QP state in erdma_query_qp (git-fixes)
* RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
* RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes)
* RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes)
* RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-
fixes)
* RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes)
* RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes)
* RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
* RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
* RDMA/hns: Optimize hem allocation performance (git-fixes)
* RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
* RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-
fixes)
* RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes)
* RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes)
* RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes)
* RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes)
* RDMA/mlx5: Obtain upper net device only when needed (git-fixes)
* RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
* RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-
fixes)
* Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
* Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE"
(git-fixes).
* Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019)
* Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable-
fixes).
* Revert "media: tuners: fix error return code of
hybrid_tuner_request_state()" (git-fixes).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
* Squashfs: sanity check symbolic link size (git-fixes).
* USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
* USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
* USB: serial: option: add MeiG Smart SRM825L (git-fixes).
* USB: serial: option: add MeiG Smart SRM825L (stable-fixes).
* USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
* USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
* VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
(git-fixes).
* afs: Do not cross .backup mountpoint from backup volume (git-fixes).
* afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
* arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
* arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
* arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
* arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes).
* arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git-
fixes).
* arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes).
* arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-
fixes).
* arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git-
fixes).
* arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency
(git-fixes).
* arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-
fixes).
* arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on
RK3399 Puma (git-fixes).
* arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
Puma (git-fixes).
* arm64: signal: Fix some under-bracketed UAPI macros (git-fixes).
* arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
* arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
* arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
* ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes).
* ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git-
fixes).
* ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
* ata: pata_macio: Use WARN instead of BUG (stable-fixes).
* blk-mq: add helper for checking if one CPU is mapped to specified hctx
(bsc#1223600).
* blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
* bpf, events: Use prog to emit ksymbol event for main program (git-fixes).
* bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes).
* btrfs: fix race between direct IO write and fsync when using same fd (git-
fixes).
* btrfs: send: allow cloning non-aligned extent if it ends at i_size
(bsc#1230854).
* bus: integrator-lm: fix OF node leak in probe() (git-fixes).
* cachefiles: Fix non-taking of sb_writers around set/removexattr
(bsc#1231008).
* cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183).
* can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes).
* can: bcm: Remove proc entry when dev is unregistered (git-fixes).
* can: j1939: use correct function name in comment (git-fixes).
* can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes).
* can: m_can: Release irq on error in m_can_open (git-fixes).
* can: m_can: enable NAPI before enabling interrupts (git-fixes).
* can: m_can: m_can_close(): stop clocks after device has been shut down (git-
fixes).
* can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-
fixes).
* can: mcp251xfd: clarify the meaning of timestamp (stable-fixes).
* can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD
mode (git-fixes).
* can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate
function (stable-fixes).
* can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration
(stable-fixes).
* can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into
mcp251xfd_chip_start/stop() (stable-fixes).
* can: mcp251xfd: properly indent labels (stable-fixes).
* can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd
(stable-fixes).
* can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum
(stable-fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable-
fixes).
* ceph: remove the incorrect Fw reference check when dirtying pages
(bsc#1231182).
* clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
* clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
(bsc#1227885).
* clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
* clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-
fixes).
* clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled
(git-fixes).
* clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes).
* clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git-
fixes).
* clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes).
* clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes).
* clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes).
* clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git-
fixes).
* clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX
(git-fixes).
* clocksource/drivers/qcom: Add missing iounmap() on errors in
msm_dt_timer_init() (git-fixes).
* cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable-
fixes).
* cpufreq: amd-pstate: fix the highest frequency issue which limits
performance (git-fixes).
* cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes).
* cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately
(git-fixes).
* crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure
(git-fixes).
* crypto: ccp - do not request interrupt on cmd completion when irqs disabled
(git-fixes).
* crypto: iaa - Fix potential use after free bug (git-fixes).
* crypto: qat - fix unintentional re-enabling of error interrupts (stable-
fixes).
* crypto: xor - fix template benchmarking (git-fixes).
* cxl/core: Fix incorrect vendor debug UUID define (git-fixes).
* cxl/pci: Fix to record only non-zero ranges (git-fixes).
* devres: Initialize an uninitialized struct member (stable-fixes).
* dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes).
* dma-debug: avoid deadlock between dma debug vs printk and netconsole
(stable-fixes).
* dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor
(stable-fixes).
* dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking
callbacks (stable-fixes).
* driver core: Fix a potential null-ptr-deref in module_add_driver() (git-
fixes).
* driver core: Fix error handling in driver API device_rename() (git-fixes).
* driver: iio: add missing checks on iio_info's callback access (stable-
fixes).
* drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
(git-fixes).
* drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
(git-fixes).
* drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
* drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
* drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
* drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
* drm/amd/display: Add null check for set_output_gamma in
dcn30_set_output_transfer_func (git-fixes).
* drm/amd/display: Add null checks for 'stream' and 'plane' before
dereferencing (stable-fixes).
* drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
* drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes).
* drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct()
(git-fixes).
* drm/amd/display: Check BIOS images before it is used (stable-fixes).
* drm/amd/display: Check HDCP returned status (stable-fixes).
* drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes).
* drm/amd/display: Check denominator pbn_div before used (stable-fixes).
* drm/amd/display: Check gpio_id before used as array index (stable-fixes).
* drm/amd/display: Check index for aux_rd_interval before using (stable-
fixes).
* drm/amd/display: Check msg_id before processing transcation (stable-fixes).
* drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
(stable-fixes).
* drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
(stable-fixes).
* drm/amd/display: Defer handling mst up request in resume (stable-fixes).
* drm/amd/display: Disable error correction if it's not supported (stable-
fixes).
* drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay
(stable-fixes).
* drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes).
* drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
dal_gpio_service_create (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
decide_fallback_link_setting_max_bw_policy (stable-fixes).
* drm/amd/display: Fix Coverity INTERGER_OVERFLOW within
construct_integrated_info (stable-fixes).
* drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes).
* drm/amd/display: Fix index may exceed array range within
fpu_update_bw_bounding_box (stable-fixes).
* drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35
(stable-fixes).
* drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes).
* drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection
(stable-fixes).
* drm/amd/display: Replace dm_execute_dmub_cmd with
dc_wake_and_execute_dmub_cmd (git-fixes).
* drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes).
* drm/amd/display: Skip inactive planes within
ModeSupportAndSystemConfiguration (stable-fixes).
* drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-
fixes).
* drm/amd/display: Solve mst monitors blank out problem after resume (git-
fixes).
* drm/amd/display: Spinlock before reading event (stable-fixes).
* drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
(stable-fixes).
* drm/amd/display: Wake DMCUB before sending a command for replay feature
(stable-fixes).
* drm/amd/display: added NULL check at start of dc_validate_stream (stable-
fixes).
* drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git-
fixes).
* drm/amd/display: use preferred link settings for dp signal only (stable-
fixes).
* drm/amd/pm: Fix negative array index read (stable-fixes).
* drm/amd/pm: check negtive return for table entries (stable-fixes).
* drm/amd/pm: check specific index for aldebaran (stable-fixes).
* drm/amd/pm: check specific index for smu13 (stable-fixes).
* drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-
fixes).
* drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-
fixes).
* drm/amd: Add gfx12 swizzle mode defs (stable-fixes).
* drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
* drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported
(stable-fixes).
* drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy
SOCs (stable-fixes).
* drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-
fixes).
* drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
* drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
* drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes).
* drm/amdgpu: Fix get each xcp macro (git-fixes).
* drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
* drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
* drm/amdgpu: Fix smatch static checker warning (stable-fixes).
* drm/amdgpu: Fix the uninitialized variable warning (stable-fixes).
* drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-
fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable-
fixes).
* drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes).
* drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
* drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes).
* drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes).
* drm/amdgpu: add missing error handling in function
amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes).
* drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes).
* drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes).
* drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
* drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6
(stable-fixes).
* drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
* drm/amdgpu: fix a possible null pointer dereference (git-fixes).
* drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes).
* drm/amdgpu: fix dereference after null check (stable-fixes).
* drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
* drm/amdgpu: fix overflowed array index read warning (stable-fixes).
* drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating()
(stable-fixes).
* drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
* drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
* drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
* drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes).
* drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
* drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes).
* drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
* drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-
fixes).
* drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes).
* drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes).
* drm/amdkfd: Reconcile the definition and use of oem_id in struct
kfd_topology_device (stable-fixes).
* drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid()
(git-fixes).
* drm/bridge: tc358767: Check if fully initialized before signalling HPD event
via IRQ (stable-fixes).
* drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes).
* drm/fb-helper: Do not schedule_work() to flush frame buffer during panic()
(stable-fixes).
* drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes).
* drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
* drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-
fixes).
* drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
* drm/i915: Do not attempt to load the GSC multiple times (git-fixes).
* drm/kfd: Correct pinned buffer handling at kfd restore and validate process
(stable-fixes).
* drm/mediatek: Set sensible cursor width/height values to fix crash (stable-
fixes).
* drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes).
* drm/meson: plane: Add error handling (stable-fixes).
* drm/msm/a5xx: disable preemption in submits by default (git-fixes).
* drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
* drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
* drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
* drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
* drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes).
* drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
* drm/msm: fix %s null argument error (git-fixes).
* drm/nouveau/fb: restore init() for ramgp102 (git-fixes).
* drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-
fixes).
* drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-
fixes).
* drm/radeon: properly handle vbios fake edid sizing (git-fixes).
* drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-
fixes).
* drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
* drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes).
* drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes).
* drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes).
* drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
* drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes).
* drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes).
* drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
* drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
* ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes).
* erofs: fix incorrect symlink detection in fast symlink (git-fixes).
* exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
* fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
* firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes).
* firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
* firmware_loader: Block path traversal (git-fixes).
* fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
(bsc#1230602).
* fuse: fix memory leak in fuse_create_open (bsc#1230124).
* fuse: update stats for pages in dropped aux writeback list (bsc#1230125).
* fuse: use unsigned type for getxattr/listxattr size truncation
(bsc#1230123).
* gpio: modepin: Enable module autoloading (git-fixes).
* gpio: rockchip: fix OF node leak in probe() (git-fixes).
* hwmon: (adc128d818) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes).
* hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes).
* hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-
fixes).
* hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
* hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
* hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >=
1.2 (git-fixes).
* hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-
fixes).
* hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-
fixes).
* hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
* i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-
fixes).
* i2c: designware: fix controller is holding SCL low while ENABLE bit is
disabled (git-fixes).
* i2c: isch: Add missed 'else' (git-fixes).
* i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
* i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver
Due to Race Condition (git-fixes).
* i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-
fixes).
* iio: adc: ad7124: fix chip ID mismatch (git-fixes).
* iio: adc: ad7124: fix config comparison (git-fixes).
* iio: adc: ad7606: fix oversampling gpio array (git-fixes).
* iio: adc: ad7606: fix standby gpio state to match the documentation (git-
fixes).
* iio: adc: ad7606: remove frstdata check for serial mode (git-fixes).
* iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
* iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-
fixes).
* iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-
fixes).
* iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
* ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206)
* jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
* kABI workaround for cros_ec stuff (git-fixes).
* kABI: Split kABI out of 'io_uring/kbuf: get rid of bl->is_ready'
* kABI: Split kABI out of 'io_uring: Re-add dummy_ubuf for kABI purposes'
* kABI: Split kABI out of io_uring/kbuf: protect io_buffer_list teardown with
a reference
* kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045,
bsc#1216776).
* kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable-
fixes).
* kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
* leds: spi-byte: Call of_node_put() on error path (stable-fixes).
* lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable-
fixes).
* lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
* mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
* mailbox: rockchip: fix a typo in module autoloading (git-fixes).
* media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes).
* media: ov5675: Fix power on/off delay timings (git-fixes).
* media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE
(git-fixes).
* media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
* media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes).
* media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
* media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
* media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
* media: venus: fix use after free bug in venus_remove due to race condition
(git-fixes).
* media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
* media: vivid: do not set HDMI TX controls if there are no HDMI outputs
(stable-fixes).
* media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
* memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes).
* memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes).
* minmax: reduce min/max macro expansion in atomisp driver (git-fixes).
* misc: fastrpc: Fix double free of 'buf' in error path (git-fixes).
* mmc: core: apply SD quirks earlier during probe (git-fixes).
* mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
* mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
* mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
* module: Fix KCOV-ignored file name (git-fixes).
* mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
* mtd: slram: insert break after errors in parsing the map (git-fixes).
* net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-
fixes).
* net: phy: Fix missing of_node_put() for leds (git-fixes).
* net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes).
* net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
* net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes).
* nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
* nilfs2: determine empty node blocks as corrupted (git-fixes).
* nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
* nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
* nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
* nilfs2: fix state management in error path of log writing function (git-
fixes).
* nilfs2: protect references to superblock parameters exposed in sysfs (git-
fixes).
* nouveau: fix the fwsec sb verification register (git-fixes).
* nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244).
* nvme-multipath: system fails to create generic nvme device (bsc#1228244).
* nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
* nvme-pci: allocate tagset on reset if necessary (git-fixes).
* nvme-tcp: fix link failure for TCP auth (git-fixes).
* nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
* nvme: clear caller pointer on identify failure (git-fixes).
* nvme: fix namespace removal list (git-fixes).
* nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
* nvmet-tcp: do not continue for invalid icreq (git-fixes).
* nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
* nvmet-trace: avoid dereferencing pointer too early (git-fixes).
* nvmet: Identify-Active Namespace ID List command should reject invalid nsid
(git-fixes).
* ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
* ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
* ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
* ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
* pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
* pcmcia: Use resource_size function on resource object (stable-fixes).
* perf annotate: Introduce global annotation_options (git-fixes).
* perf annotate: Split branch stack cycles information out of 'struct
annotation_line' (git-fixes).
* perf annotate: Use global annotation_options (git-fixes).
* perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes).
* perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes).
* perf intel-pt: Fix exclude_guest setting (git-fixes).
* perf machine thread: Remove exited threads by default (git-fixes).
* perf maps: Move symbol maps functions to maps.c (git-fixes).
* perf pmu: Assume sysfs events are always the same case (git-fixes).
* perf pmus: Fixes always false when compare duplicates aliases (git-fixes).
* perf record: Lazy load kernel symbols (git-fixes).
* perf report: Convert to the global annotation_options (git-fixes).
* perf report: Fix condition in sort__sym_cmp() (git-fixes).
* perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes).
* perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes).
* perf tool: fix dereferencing NULL al->maps (git-fixes).
* perf tools: Add/use PMU reverse lookup from config to name (git-fixes).
* perf tools: Use pmus to describe type from attribute (git-fixes).
* perf top: Convert to the global annotation_options (git-fixes).
* perf/core: Fix missing wakeup when waiting for context reference (git-
fixes).
* perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git-
fixes).
* perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes).
* perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes).
* perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes).
* perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git-
fixes).
* perf/x86/intel/pt: Fix topa_entry base length (git-fixes).
* perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git-
fixes).
* perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119).
* perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes).
* perf/x86/intel: Factor out the initialization code for SPR (git fixes).
* perf/x86/intel: Limit the period on Haswell (git-fixes).
* perf/x86/intel: Use the common uarch name for the shared functions (git
fixes).
* perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units
(bsc#1230119).
* perf/x86/uncore: Apply the unit control RB tree to MSR uncore units
(bsc#1230119).
* perf/x86/uncore: Apply the unit control RB tree to PCI uncore units
(bsc#1230119).
* perf/x86/uncore: Cleanup unused unit structure (bsc#1230119).
* perf/x86/uncore: Retrieve the unit ID from the unit control RB tree
(bsc#1230119).
* perf/x86/uncore: Save the unit control address of all units (bsc#1230119).
* perf/x86/uncore: Support per PMU cpumask (bsc#1230119).
* perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes).
* perf/x86: Serialize set_attr_rdpmc() (git-fixes).
* perf: Fix default aux_watermark calculation (git-fixes).
* perf: Fix event leak upon exit (git-fixes).
* perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes).
* perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes).
* perf: script: add raw|disasm arguments to --insn-trace option (git-fixes).
* phy: zynqmp: Take the phy mutex in xlate (stable-fixes).
* pinctrl: at91: make it work with current gpiolib (stable-fixes).
* pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes).
* pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
* platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable-
fixes).
* platform/surface: aggregator_registry: Add Support for Surface Pro 10
(stable-fixes).
* platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
(stable-fixes).
* platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
* platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array
(git-fixes).
* platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-
fixes).
* platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match
less strict (stable-fixes).
* power: supply: Drop use_cnt check from power_supply_property_is_writeable()
(git-fixes).
* power: supply: axp20x_battery: Remove design from min and max voltage (git-
fixes).
* power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
* power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense
(git-fixes).
* powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes).
* powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656).
* pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes).
* r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
* regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes).
* regmap: spi: Fix potential off-by-one when calculating reserved size
(stable-fixes).
* regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes).
* regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value
(git-fixes).
* regulator: core: Fix short description for _regulator_check_status_enabled()
(git-fixes).
* regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR
(git-fixes).
* regulator: rt5120: Convert comma to semicolon (git-fixes).
* regulator: wm831x-isink: Convert comma to semicolon (git-fixes).
* remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes).
* remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes).
* remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes).
* reset: berlin: fix OF node leak in probe() error path (git-fixes).
* reset: k210: fix OF node leak in probe() error path (git-fixes).
* resource: fix region_intersects() vs add_memory_driver_managed() (git-
fixes).
* rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY
gcc version dependent, at least on ppc
* rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
* s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694).
* s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes).
* s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562).
* s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563).
* s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564).
* scripts: kconfig: merge_config: config files: add a trailing newline
(stable-fixes).
* scripts: sphinx-pre-install: remove unnecessary double check for
$cur_version (git-fixes).
* scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
* scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds
(bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429
jsc#PED-9899).
* scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached
topology (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Remove redundant vport assignment when building an abort request
(bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429
jsc#PED-9899).
* scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata
paths (bsc#1229429 jsc#PED-9899).
* scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
(bsc#1223848).
* selftests: lib: remove strscpy test (git-fixes).
* selinux,smack: do not bypass permissions check in inode_setsecctx hook
(stable-fixes).
* soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes).
* soc: versatile: integrator: fix OF node leak in probe() error path (git-
fixes).
* spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes).
* spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: bcm63xx: Enable module autoloading (stable-fixes).
* spi: bcm63xx: Fix module autoloading (git-fixes).
* spi: meson-spicc: convert comma to semicolon (git-fixes).
* spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
* spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
* spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
* spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git-
fixes).
* spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
* spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes).
* spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
* staging: iio: frequency: ad9834: Validate frequency parameter value (git-
fixes).
* supported.conf: mark adiantum and xctr crypto modules as supported
(bsc#1231035)
* thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes).
* thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git-
fixes).
* thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git-
fixes).
* thunderbolt: There are only 5 basic router registers in pre-USB4 routers
(git-fixes).
* tomoyo: fallback to realpath if symlink's pathname does not exist (git-
fixes).
* tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load
(git-fixes).
* tpm: Clean up TPM space after command failure (git-fixes).
* tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
* tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
* uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-
fixes).
* usb: cdnsp: Fix incorrect usb_request status (git-fixes).
* usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
* usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
* usb: dwc3: Avoid waking up gadget during startxfer (git-fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access (git-
fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access
(stable-fixes).
* usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).
* usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes).
* usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
* usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes).
* usb: uas: set host status byte on data completion error (stable-fixes).
* usbip: Do not submit special requests twice (stable-fixes).
* usbnet: ipheth: add CDC NCM support (git-fixes).
* usbnet: ipheth: do not stop RX on failing RX callback (git-fixes).
* usbnet: ipheth: drop RX URBs with no payload (git-fixes).
* usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes).
* usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes).
* usbnet: ipheth: race between ipheth_close and error handling (stable-fixes).
* usbnet: ipheth: remove extraneous rx URB length check (git-fixes).
* usbnet: ipheth: transmit URBs without trailing padding (git-fixes).
* usbnet: modern method to get random MAC (git-fixes).
* virtio-net: synchronize probe with ndo_set_features (git-fixes).
* virtio_net: Fix napi_skb_cache_put warning (git-fixes).
* virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
* watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
* wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable-
fixes).
* wifi: ath12k: fix BSS chan info request WMI command (git-fixes).
* wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes).
* wifi: ath12k: fix invalid AMPDU factor calculation in
ath12k_peer_assoc_h_he() (git-fixes).
* wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he()
(stable-fixes).
* wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850()
(stable-fixes).
* wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable-
fixes).
* wifi: ath12k: match WMI BSS chan info structure with firmware definition
(git-fixes).
* wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
* wifi: brcmfmac: introducing fwil query functions (git-fixes).
* wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
* wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
* wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git-
fixes).
* wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-
fixes).
* wifi: cfg80211: make hash table duplicates more survivable (stable-fixes).
* wifi: cfg80211: restrict operation during radar detection (stable-fixes).
* wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
* wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
* wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable-
fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
* wifi: iwlwifi: mvm: increase the time between ranging measurements (git-
fixes).
* wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes).
* wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes).
* wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD
(stable-fixes).
* wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes).
* wifi: mac80211: fix the comeback long retry times (git-fixes).
* wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable-
fixes).
* wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-
fixes).
* wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes).
* wifi: mt76: mt7603: fix mixed declarations and code (git-fixes).
* wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes).
* wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-
fixes).
* wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change
(stable-fixes).
* wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage
(git-fixes).
* wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc
(git-fixes).
* wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes).
* wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes).
* wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he
(git-fixes).
* wifi: mt76: mt7996: fix traffic delay when switching back to working channel
(git-fixes).
* wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes).
* wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes).
* wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes).
* wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
(stable-fixes).
* wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
* wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
* wifi: rtw88: remove CPT execution branch never used (git-fixes).
* wifi: rtw88: usb: schedule rx work after everything is set up (stable-
fixes).
* wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes).
* wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware
(stable-fixes).
* wifi: wilc1000: fix potential RCU dereference issue in
wilc_parse_join_bss_param (git-fixes).
* x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
* x86/kaslr: Expose and use the end of the physical memory address space
(bsc#1229443).
* x86/kexec: Add EFI config table identity mapping for kexec kernel
(bsc#1220382).
* x86/mm/ident_map: Use gbpages only where full GB page should be mapped
(bsc#1220382).
* x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527).
* x86/pat: Fix W^X violation false-positives when running as Xen PV guest
(bsc#1221527).
* x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527).
* x86/pat: Restructure _lookup_address_cpa() (bsc#1221527).
* xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
* xen/swiotlb: fix allocated size (git-fixes).
* xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
* xen: allow mapping ACPI data using a different physical address
(bsc#1226003).
* xen: introduce generic helper checking for memory map conflicts
(bsc#1226003).
* xen: move checks for e820 conflicts further up (bsc#1226003).
* xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
* xen: tolerate ACPI NVS memory overlapping with Xen allocated memory
(bsc#1226003).
* xen: use correct end address of kernel for conflict checking (bsc#1226003).
* xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git-
fixes).
* xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-
fixes).
* xz: cleanup CRC32 edits from 2018 (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3564=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3564=1
* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2024-3564=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* ocfs2-kmp-rt-6.4.0-150600.10.14.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* reiserfs-kmp-rt-6.4.0-150600.10.14.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.14.1
* kernel-syms-rt-6.4.0-150600.10.14.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-optional-6.4.0-150600.10.14.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.14.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.14.1
* dlm-kmp-rt-6.4.0-150600.10.14.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-devel-6.4.0-150600.10.14.1
* kernel-rt_debug-livepatch-devel-6.4.0-150600.10.14.1
* kernel-rt-extra-6.4.0-150600.10.14.1
* kernel-rt-vdso-6.4.0-150600.10.14.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.14.1
* gfs2-kmp-rt-6.4.0-150600.10.14.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.14.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.14.1
* cluster-md-kmp-rt-6.4.0-150600.10.14.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* kselftests-kmp-rt-6.4.0-150600.10.14.1
* kernel-rt-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-debugsource-6.4.0-150600.10.14.1
* kernel-rt_debug-vdso-6.4.0-150600.10.14.1
* kernel-rt_debug-devel-6.4.0-150600.10.14.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.14.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.14.1
* kernel-source-rt-6.4.0-150600.10.14.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt_debug-6.4.0-150600.10.14.1
* kernel-rt-6.4.0-150600.10.14.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-6_4_0-150600_10_14-rt-debuginfo-1-150600.1.3.1
* kernel-livepatch-6_4_0-150600_10_14-rt-1-150600.1.3.1
* kernel-livepatch-SLE15-SP6-RT_Update_4-debugsource-1-150600.1.3.1
* SUSE Real Time Module 15-SP6 (x86_64)
* dlm-kmp-rt-6.4.0-150600.10.14.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* ocfs2-kmp-rt-6.4.0-150600.10.14.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* gfs2-kmp-rt-6.4.0-150600.10.14.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.14.1
* kernel-syms-rt-6.4.0-150600.10.14.1
* kernel-rt-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-debugsource-6.4.0-150600.10.14.1
* kernel-rt-devel-6.4.0-150600.10.14.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.14.1
* cluster-md-kmp-rt-6.4.0-150600.10.14.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.14.1
* kernel-rt_debug-devel-6.4.0-150600.10.14.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.14.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.14.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.14.1
* kernel-source-rt-6.4.0-150600.10.14.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt_debug-6.4.0-150600.10.14.1
* kernel-rt-6.4.0-150600.10.14.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52610.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52916.html
* https://www.suse.com/security/cve/CVE-2024-26640.html
* https://www.suse.com/security/cve/CVE-2024-26759.html
* https://www.suse.com/security/cve/CVE-2024-26804.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-38538.html
* https://www.suse.com/security/cve/CVE-2024-38596.html
* https://www.suse.com/security/cve/CVE-2024-38632.html
* https://www.suse.com/security/cve/CVE-2024-40965.html
* https://www.suse.com/security/cve/CVE-2024-40973.html
* https://www.suse.com/security/cve/CVE-2024-40983.html
* https://www.suse.com/security/cve/CVE-2024-42154.html
* https://www.suse.com/security/cve/CVE-2024-42243.html
* https://www.suse.com/security/cve/CVE-2024-42252.html
* https://www.suse.com/security/cve/CVE-2024-42265.html
* https://www.suse.com/security/cve/CVE-2024-42294.html
* https://www.suse.com/security/cve/CVE-2024-42304.html
* https://www.suse.com/security/cve/CVE-2024-42305.html
* https://www.suse.com/security/cve/CVE-2024-42306.html
* https://www.suse.com/security/cve/CVE-2024-43828.html
* https://www.suse.com/security/cve/CVE-2024-43832.html
* https://www.suse.com/security/cve/CVE-2024-43835.html
* https://www.suse.com/security/cve/CVE-2024-43845.html
* https://www.suse.com/security/cve/CVE-2024-43870.html
* https://www.suse.com/security/cve/CVE-2024-43890.html
* https://www.suse.com/security/cve/CVE-2024-43898.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43914.html
* https://www.suse.com/security/cve/CVE-2024-44935.html
* https://www.suse.com/security/cve/CVE-2024-44944.html
* https://www.suse.com/security/cve/CVE-2024-44946.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-44948.html
* https://www.suse.com/security/cve/CVE-2024-44950.html
* https://www.suse.com/security/cve/CVE-2024-44951.html
* https://www.suse.com/security/cve/CVE-2024-44952.html
* https://www.suse.com/security/cve/CVE-2024-44954.html
* https://www.suse.com/security/cve/CVE-2024-44960.html
* https://www.suse.com/security/cve/CVE-2024-44961.html
* https://www.suse.com/security/cve/CVE-2024-44962.html
* https://www.suse.com/security/cve/CVE-2024-44965.html
* https://www.suse.com/security/cve/CVE-2024-44967.html
* https://www.suse.com/security/cve/CVE-2024-44969.html
* https://www.suse.com/security/cve/CVE-2024-44970.html
* https://www.suse.com/security/cve/CVE-2024-44971.html
* https://www.suse.com/security/cve/CVE-2024-44977.html
* https://www.suse.com/security/cve/CVE-2024-44982.html
* https://www.suse.com/security/cve/CVE-2024-44984.html
* https://www.suse.com/security/cve/CVE-2024-44985.html
* https://www.suse.com/security/cve/CVE-2024-44986.html
* https://www.suse.com/security/cve/CVE-2024-44987.html
* https://www.suse.com/security/cve/CVE-2024-44988.html
* https://www.suse.com/security/cve/CVE-2024-44989.html
* https://www.suse.com/security/cve/CVE-2024-44990.html
* https://www.suse.com/security/cve/CVE-2024-44991.html
* https://www.suse.com/security/cve/CVE-2024-44997.html
* https://www.suse.com/security/cve/CVE-2024-44998.html
* https://www.suse.com/security/cve/CVE-2024-44999.html
* https://www.suse.com/security/cve/CVE-2024-45000.html
* https://www.suse.com/security/cve/CVE-2024-45001.html
* https://www.suse.com/security/cve/CVE-2024-45002.html
* https://www.suse.com/security/cve/CVE-2024-45003.html
* https://www.suse.com/security/cve/CVE-2024-45005.html
* https://www.suse.com/security/cve/CVE-2024-45006.html
* https://www.suse.com/security/cve/CVE-2024-45007.html
* https://www.suse.com/security/cve/CVE-2024-45008.html
* https://www.suse.com/security/cve/CVE-2024-45011.html
* https://www.suse.com/security/cve/CVE-2024-45012.html
* https://www.suse.com/security/cve/CVE-2024-45013.html
* https://www.suse.com/security/cve/CVE-2024-45015.html
* https://www.suse.com/security/cve/CVE-2024-45017.html
* https://www.suse.com/security/cve/CVE-2024-45018.html
* https://www.suse.com/security/cve/CVE-2024-45019.html
* https://www.suse.com/security/cve/CVE-2024-45020.html
* https://www.suse.com/security/cve/CVE-2024-45021.html
* https://www.suse.com/security/cve/CVE-2024-45022.html
* https://www.suse.com/security/cve/CVE-2024-45023.html
* https://www.suse.com/security/cve/CVE-2024-45026.html
* https://www.suse.com/security/cve/CVE-2024-45028.html
* https://www.suse.com/security/cve/CVE-2024-45029.html
* https://www.suse.com/security/cve/CVE-2024-45030.html
* https://www.suse.com/security/cve/CVE-2024-46672.html
* https://www.suse.com/security/cve/CVE-2024-46673.html
* https://www.suse.com/security/cve/CVE-2024-46674.html
* https://www.suse.com/security/cve/CVE-2024-46675.html
* https://www.suse.com/security/cve/CVE-2024-46676.html
* https://www.suse.com/security/cve/CVE-2024-46677.html
* https://www.suse.com/security/cve/CVE-2024-46679.html
* https://www.suse.com/security/cve/CVE-2024-46685.html
* https://www.suse.com/security/cve/CVE-2024-46686.html
* https://www.suse.com/security/cve/CVE-2024-46687.html
* https://www.suse.com/security/cve/CVE-2024-46689.html
* https://www.suse.com/security/cve/CVE-2024-46691.html
* https://www.suse.com/security/cve/CVE-2024-46692.html
* https://www.suse.com/security/cve/CVE-2024-46693.html
* https://www.suse.com/security/cve/CVE-2024-46694.html
* https://www.suse.com/security/cve/CVE-2024-46695.html
* https://www.suse.com/security/cve/CVE-2024-46702.html
* https://www.suse.com/security/cve/CVE-2024-46706.html
* https://www.suse.com/security/cve/CVE-2024-46707.html
* https://www.suse.com/security/cve/CVE-2024-46709.html
* https://www.suse.com/security/cve/CVE-2024-46710.html
* https://www.suse.com/security/cve/CVE-2024-46714.html
* https://www.suse.com/security/cve/CVE-2024-46715.html
* https://www.suse.com/security/cve/CVE-2024-46716.html
* https://www.suse.com/security/cve/CVE-2024-46717.html
* https://www.suse.com/security/cve/CVE-2024-46719.html
* https://www.suse.com/security/cve/CVE-2024-46720.html
* https://www.suse.com/security/cve/CVE-2024-46722.html
* https://www.suse.com/security/cve/CVE-2024-46723.html
* https://www.suse.com/security/cve/CVE-2024-46724.html
* https://www.suse.com/security/cve/CVE-2024-46725.html
* https://www.suse.com/security/cve/CVE-2024-46726.html
* https://www.suse.com/security/cve/CVE-2024-46728.html
* https://www.suse.com/security/cve/CVE-2024-46729.html
* https://www.suse.com/security/cve/CVE-2024-46730.html
* https://www.suse.com/security/cve/CVE-2024-46731.html
* https://www.suse.com/security/cve/CVE-2024-46732.html
* https://www.suse.com/security/cve/CVE-2024-46734.html
* https://www.suse.com/security/cve/CVE-2024-46735.html
* https://www.suse.com/security/cve/CVE-2024-46737.html
* https://www.suse.com/security/cve/CVE-2024-46738.html
* https://www.suse.com/security/cve/CVE-2024-46739.html
* https://www.suse.com/security/cve/CVE-2024-46741.html
* https://www.suse.com/security/cve/CVE-2024-46743.html
* https://www.suse.com/security/cve/CVE-2024-46744.html
* https://www.suse.com/security/cve/CVE-2024-46745.html
* https://www.suse.com/security/cve/CVE-2024-46746.html
* https://www.suse.com/security/cve/CVE-2024-46747.html
* https://www.suse.com/security/cve/CVE-2024-46749.html
* https://www.suse.com/security/cve/CVE-2024-46750.html
* https://www.suse.com/security/cve/CVE-2024-46751.html
* https://www.suse.com/security/cve/CVE-2024-46752.html
* https://www.suse.com/security/cve/CVE-2024-46753.html
* https://www.suse.com/security/cve/CVE-2024-46755.html
* https://www.suse.com/security/cve/CVE-2024-46756.html
* https://www.suse.com/security/cve/CVE-2024-46757.html
* https://www.suse.com/security/cve/CVE-2024-46758.html
* https://www.suse.com/security/cve/CVE-2024-46759.html
* https://www.suse.com/security/cve/CVE-2024-46760.html
* https://www.suse.com/security/cve/CVE-2024-46761.html
* https://www.suse.com/security/cve/CVE-2024-46767.html
* https://www.suse.com/security/cve/CVE-2024-46771.html
* https://www.suse.com/security/cve/CVE-2024-46772.html
* https://www.suse.com/security/cve/CVE-2024-46773.html
* https://www.suse.com/security/cve/CVE-2024-46774.html
* https://www.suse.com/security/cve/CVE-2024-46776.html
* https://www.suse.com/security/cve/CVE-2024-46778.html
* https://www.suse.com/security/cve/CVE-2024-46780.html
* https://www.suse.com/security/cve/CVE-2024-46781.html
* https://www.suse.com/security/cve/CVE-2024-46783.html
* https://www.suse.com/security/cve/CVE-2024-46784.html
* https://www.suse.com/security/cve/CVE-2024-46786.html
* https://www.suse.com/security/cve/CVE-2024-46787.html
* https://www.suse.com/security/cve/CVE-2024-46791.html
* https://www.suse.com/security/cve/CVE-2024-46794.html
* https://www.suse.com/security/cve/CVE-2024-46797.html
* https://www.suse.com/security/cve/CVE-2024-46798.html
* https://www.suse.com/security/cve/CVE-2024-46822.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1183045
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1216776
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221527
* https://bugzilla.suse.com/show_bug.cgi?id=1221610
* https://bugzilla.suse.com/show_bug.cgi?id=1221650
* https://bugzilla.suse.com/show_bug.cgi?id=1222629
* https://bugzilla.suse.com/show_bug.cgi?id=1223600
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1225487
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226507
* https://bugzilla.suse.com/show_bug.cgi?id=1226606
* https://bugzilla.suse.com/show_bug.cgi?id=1226666
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1226860
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227694
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227819
* https://bugzilla.suse.com/show_bug.cgi?id=1227885
* https://bugzilla.suse.com/show_bug.cgi?id=1227890
* https://bugzilla.suse.com/show_bug.cgi?id=1227962
* https://bugzilla.suse.com/show_bug.cgi?id=1228090
* https://bugzilla.suse.com/show_bug.cgi?id=1228140
* https://bugzilla.suse.com/show_bug.cgi?id=1228244
* https://bugzilla.suse.com/show_bug.cgi?id=1228507
* https://bugzilla.suse.com/show_bug.cgi?id=1228771
* https://bugzilla.suse.com/show_bug.cgi?id=1229001
* https://bugzilla.suse.com/show_bug.cgi?id=1229004
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229167
* https://bugzilla.suse.com/show_bug.cgi?id=1229169
* https://bugzilla.suse.com/show_bug.cgi?id=1229289
* https://bugzilla.suse.com/show_bug.cgi?id=1229334
* https://bugzilla.suse.com/show_bug.cgi?id=1229362
* https://bugzilla.suse.com/show_bug.cgi?id=1229363
* https://bugzilla.suse.com/show_bug.cgi?id=1229364
* https://bugzilla.suse.com/show_bug.cgi?id=1229371
* https://bugzilla.suse.com/show_bug.cgi?id=1229380
* https://bugzilla.suse.com/show_bug.cgi?id=1229389
* https://bugzilla.suse.com/show_bug.cgi?id=1229394
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229443
* https://bugzilla.suse.com/show_bug.cgi?id=1229452
* https://bugzilla.suse.com/show_bug.cgi?id=1229455
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229494
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229753
* https://bugzilla.suse.com/show_bug.cgi?id=1229764
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229790
* https://bugzilla.suse.com/show_bug.cgi?id=1229810
* https://bugzilla.suse.com/show_bug.cgi?id=1229899
* https://bugzilla.suse.com/show_bug.cgi?id=1229928
* https://bugzilla.suse.com/show_bug.cgi?id=1230015
* https://bugzilla.suse.com/show_bug.cgi?id=1230119
* https://bugzilla.suse.com/show_bug.cgi?id=1230123
* https://bugzilla.suse.com/show_bug.cgi?id=1230124
* https://bugzilla.suse.com/show_bug.cgi?id=1230125
* https://bugzilla.suse.com/show_bug.cgi?id=1230169
* https://bugzilla.suse.com/show_bug.cgi?id=1230170
* https://bugzilla.suse.com/show_bug.cgi?id=1230171
* https://bugzilla.suse.com/show_bug.cgi?id=1230173
* https://bugzilla.suse.com/show_bug.cgi?id=1230174
* https://bugzilla.suse.com/show_bug.cgi?id=1230175
* https://bugzilla.suse.com/show_bug.cgi?id=1230176
* https://bugzilla.suse.com/show_bug.cgi?id=1230178
* https://bugzilla.suse.com/show_bug.cgi?id=1230180
* https://bugzilla.suse.com/show_bug.cgi?id=1230181
* https://bugzilla.suse.com/show_bug.cgi?id=1230185
* https://bugzilla.suse.com/show_bug.cgi?id=1230191
* https://bugzilla.suse.com/show_bug.cgi?id=1230192
* https://bugzilla.suse.com/show_bug.cgi?id=1230193
* https://bugzilla.suse.com/show_bug.cgi?id=1230194
* https://bugzilla.suse.com/show_bug.cgi?id=1230195
* https://bugzilla.suse.com/show_bug.cgi?id=1230200
* https://bugzilla.suse.com/show_bug.cgi?id=1230204
* https://bugzilla.suse.com/show_bug.cgi?id=1230206
* https://bugzilla.suse.com/show_bug.cgi?id=1230207
* https://bugzilla.suse.com/show_bug.cgi?id=1230209
* https://bugzilla.suse.com/show_bug.cgi?id=1230211
* https://bugzilla.suse.com/show_bug.cgi?id=1230213
* https://bugzilla.suse.com/show_bug.cgi?id=1230217
* https://bugzilla.suse.com/show_bug.cgi?id=1230221
* https://bugzilla.suse.com/show_bug.cgi?id=1230224
* https://bugzilla.suse.com/show_bug.cgi?id=1230230
* https://bugzilla.suse.com/show_bug.cgi?id=1230232
* https://bugzilla.suse.com/show_bug.cgi?id=1230233
* https://bugzilla.suse.com/show_bug.cgi?id=1230240
* https://bugzilla.suse.com/show_bug.cgi?id=1230244
* https://bugzilla.suse.com/show_bug.cgi?id=1230245
* https://bugzilla.suse.com/show_bug.cgi?id=1230247
* https://bugzilla.suse.com/show_bug.cgi?id=1230248
* https://bugzilla.suse.com/show_bug.cgi?id=1230269
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230295
* https://bugzilla.suse.com/show_bug.cgi?id=1230340
* https://bugzilla.suse.com/show_bug.cgi?id=1230426
* https://bugzilla.suse.com/show_bug.cgi?id=1230430
* https://bugzilla.suse.com/show_bug.cgi?id=1230431
* https://bugzilla.suse.com/show_bug.cgi?id=1230432
* https://bugzilla.suse.com/show_bug.cgi?id=1230433
* https://bugzilla.suse.com/show_bug.cgi?id=1230434
* https://bugzilla.suse.com/show_bug.cgi?id=1230435
* https://bugzilla.suse.com/show_bug.cgi?id=1230440
* https://bugzilla.suse.com/show_bug.cgi?id=1230441
* https://bugzilla.suse.com/show_bug.cgi?id=1230442
* https://bugzilla.suse.com/show_bug.cgi?id=1230444
* https://bugzilla.suse.com/show_bug.cgi?id=1230450
* https://bugzilla.suse.com/show_bug.cgi?id=1230451
* https://bugzilla.suse.com/show_bug.cgi?id=1230454
* https://bugzilla.suse.com/show_bug.cgi?id=1230455
* https://bugzilla.suse.com/show_bug.cgi?id=1230457
* https://bugzilla.suse.com/show_bug.cgi?id=1230459
* https://bugzilla.suse.com/show_bug.cgi?id=1230506
* https://bugzilla.suse.com/show_bug.cgi?id=1230507
* https://bugzilla.suse.com/show_bug.cgi?id=1230511
* https://bugzilla.suse.com/show_bug.cgi?id=1230515
* https://bugzilla.suse.com/show_bug.cgi?id=1230517
* https://bugzilla.suse.com/show_bug.cgi?id=1230518
* https://bugzilla.suse.com/show_bug.cgi?id=1230519
* https://bugzilla.suse.com/show_bug.cgi?id=1230520
* https://bugzilla.suse.com/show_bug.cgi?id=1230521
* https://bugzilla.suse.com/show_bug.cgi?id=1230524
* https://bugzilla.suse.com/show_bug.cgi?id=1230526
* https://bugzilla.suse.com/show_bug.cgi?id=1230533
* https://bugzilla.suse.com/show_bug.cgi?id=1230535
* https://bugzilla.suse.com/show_bug.cgi?id=1230539
* https://bugzilla.suse.com/show_bug.cgi?id=1230540
* https://bugzilla.suse.com/show_bug.cgi?id=1230549
* https://bugzilla.suse.com/show_bug.cgi?id=1230556
* https://bugzilla.suse.com/show_bug.cgi?id=1230562
* https://bugzilla.suse.com/show_bug.cgi?id=1230563
* https://bugzilla.suse.com/show_bug.cgi?id=1230564
* https://bugzilla.suse.com/show_bug.cgi?id=1230580
* https://bugzilla.suse.com/show_bug.cgi?id=1230582
* https://bugzilla.suse.com/show_bug.cgi?id=1230589
* https://bugzilla.suse.com/show_bug.cgi?id=1230602
* https://bugzilla.suse.com/show_bug.cgi?id=1230699
* https://bugzilla.suse.com/show_bug.cgi?id=1230700
* https://bugzilla.suse.com/show_bug.cgi?id=1230701
* https://bugzilla.suse.com/show_bug.cgi?id=1230702
* https://bugzilla.suse.com/show_bug.cgi?id=1230703
* https://bugzilla.suse.com/show_bug.cgi?id=1230704
* https://bugzilla.suse.com/show_bug.cgi?id=1230705
* https://bugzilla.suse.com/show_bug.cgi?id=1230706
* https://bugzilla.suse.com/show_bug.cgi?id=1230709
* https://bugzilla.suse.com/show_bug.cgi?id=1230711
* https://bugzilla.suse.com/show_bug.cgi?id=1230712
* https://bugzilla.suse.com/show_bug.cgi?id=1230715
* https://bugzilla.suse.com/show_bug.cgi?id=1230719
* https://bugzilla.suse.com/show_bug.cgi?id=1230722
* https://bugzilla.suse.com/show_bug.cgi?id=1230724
* https://bugzilla.suse.com/show_bug.cgi?id=1230725
* https://bugzilla.suse.com/show_bug.cgi?id=1230726
* https://bugzilla.suse.com/show_bug.cgi?id=1230727
* https://bugzilla.suse.com/show_bug.cgi?id=1230730
* https://bugzilla.suse.com/show_bug.cgi?id=1230731
* https://bugzilla.suse.com/show_bug.cgi?id=1230732
* https://bugzilla.suse.com/show_bug.cgi?id=1230747
* https://bugzilla.suse.com/show_bug.cgi?id=1230748
* https://bugzilla.suse.com/show_bug.cgi?id=1230749
* https://bugzilla.suse.com/show_bug.cgi?id=1230751
* https://bugzilla.suse.com/show_bug.cgi?id=1230752
* https://bugzilla.suse.com/show_bug.cgi?id=1230753
* https://bugzilla.suse.com/show_bug.cgi?id=1230756
* https://bugzilla.suse.com/show_bug.cgi?id=1230761
* https://bugzilla.suse.com/show_bug.cgi?id=1230766
* https://bugzilla.suse.com/show_bug.cgi?id=1230767
* https://bugzilla.suse.com/show_bug.cgi?id=1230768
* https://bugzilla.suse.com/show_bug.cgi?id=1230771
* https://bugzilla.suse.com/show_bug.cgi?id=1230772
* https://bugzilla.suse.com/show_bug.cgi?id=1230775
* https://bugzilla.suse.com/show_bug.cgi?id=1230776
* https://bugzilla.suse.com/show_bug.cgi?id=1230780
* https://bugzilla.suse.com/show_bug.cgi?id=1230783
* https://bugzilla.suse.com/show_bug.cgi?id=1230786
* https://bugzilla.suse.com/show_bug.cgi?id=1230787
* https://bugzilla.suse.com/show_bug.cgi?id=1230791
* https://bugzilla.suse.com/show_bug.cgi?id=1230794
* https://bugzilla.suse.com/show_bug.cgi?id=1230796
* https://bugzilla.suse.com/show_bug.cgi?id=1230802
* https://bugzilla.suse.com/show_bug.cgi?id=1230806
* https://bugzilla.suse.com/show_bug.cgi?id=1230808
* https://bugzilla.suse.com/show_bug.cgi?id=1230809
* https://bugzilla.suse.com/show_bug.cgi?id=1230810
* https://bugzilla.suse.com/show_bug.cgi?id=1230812
* https://bugzilla.suse.com/show_bug.cgi?id=1230813
* https://bugzilla.suse.com/show_bug.cgi?id=1230814
* https://bugzilla.suse.com/show_bug.cgi?id=1230815
* https://bugzilla.suse.com/show_bug.cgi?id=1230821
* https://bugzilla.suse.com/show_bug.cgi?id=1230825
* https://bugzilla.suse.com/show_bug.cgi?id=1230830
* https://bugzilla.suse.com/show_bug.cgi?id=1230831
* https://bugzilla.suse.com/show_bug.cgi?id=1230854
* https://bugzilla.suse.com/show_bug.cgi?id=1230948
* https://bugzilla.suse.com/show_bug.cgi?id=1231008
* https://bugzilla.suse.com/show_bug.cgi?id=1231035
* https://bugzilla.suse.com/show_bug.cgi?id=1231120
* https://bugzilla.suse.com/show_bug.cgi?id=1231146
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231183
* https://jira.suse.com/browse/PED-10954
* https://jira.suse.com/browse/PED-9899
1
0
09 Oct '24
# Security update for mozjs78
Announcement ID: SUSE-SU-2024:3554-1
Release Date: 2024-10-09T06:17:18Z
Rating: moderate
References:
* bsc#1230036
* bsc#1230037
* bsc#1230038
Cross-References:
* CVE-2024-45490
* CVE-2024-45491
* CVE-2024-45492
CVSS scores:
* CVE-2024-45490 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45491 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45492 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for mozjs78 fixes the following issues:
* CVE-2024-45490: Fixed negative len for XML_ParseBuffer in embedded expat
(bnc#1230036)
* CVE-2024-45491: Fixed integer overflow in dtdCopy in embedded expat
(bnc#1230037)
* CVE-2024-45492: Fixed integer overflow in function nextScaffoldPart in
embedded expat (bnc#1230038)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3554=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3554=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3554=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3554=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3554=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3554=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2
* libmozjs-78-0-78.15.0-150400.3.6.2
* mozjs78-debuginfo-78.15.0-150400.3.6.2
* mozjs78-78.15.0-150400.3.6.2
* mozjs78-debugsource-78.15.0-150400.3.6.2
* mozjs78-devel-78.15.0-150400.3.6.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2
* libmozjs-78-0-78.15.0-150400.3.6.2
* mozjs78-debuginfo-78.15.0-150400.3.6.2
* mozjs78-78.15.0-150400.3.6.2
* mozjs78-debugsource-78.15.0-150400.3.6.2
* mozjs78-devel-78.15.0-150400.3.6.2
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2
* libmozjs-78-0-78.15.0-150400.3.6.2
* mozjs78-debuginfo-78.15.0-150400.3.6.2
* mozjs78-debugsource-78.15.0-150400.3.6.2
* mozjs78-devel-78.15.0-150400.3.6.2
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* libmozjs-78-0-78.15.0-150400.3.6.2
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* mozjs78-debugsource-78.15.0-150400.3.6.2
* libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2
* mozjs78-debuginfo-78.15.0-150400.3.6.2
* libmozjs-78-0-78.15.0-150400.3.6.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i686)
* libmozjs-78-0-debuginfo-78.15.0-150400.3.6.2
* libmozjs-78-0-78.15.0-150400.3.6.2
* mozjs78-debuginfo-78.15.0-150400.3.6.2
* mozjs78-78.15.0-150400.3.6.2
* mozjs78-debugsource-78.15.0-150400.3.6.2
* mozjs78-devel-78.15.0-150400.3.6.2
## References:
* https://www.suse.com/security/cve/CVE-2024-45490.html
* https://www.suse.com/security/cve/CVE-2024-45491.html
* https://www.suse.com/security/cve/CVE-2024-45492.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230036
* https://bugzilla.suse.com/show_bug.cgi?id=1230037
* https://bugzilla.suse.com/show_bug.cgi?id=1230038
1
0
09 Oct '24
# Recommended update for s390-tools
Announcement ID: SUSE-RU-2024:3555-1
Release Date: 2024-10-09T06:33:36Z
Rating: moderate
References:
* bsc#1231002
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for s390-tools fixes the following issue:
* ziomon/ziorep_config: fix warning when multipath device is not there
(bsc#1231002).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3555=1 openSUSE-SLE-15.6-2024-3555=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3555=1
## Package List:
* openSUSE Leap 15.6 (s390x x86_64)
* s390-tools-debugsource-2.31.0-150600.8.9.3
* s390-tools-debuginfo-2.31.0-150600.8.9.3
* s390-tools-2.31.0-150600.8.9.3
* openSUSE Leap 15.6 (s390x)
* s390-tools-hmcdrvfs-2.31.0-150600.8.9.3
* s390-tools-zdsfs-debuginfo-2.31.0-150600.8.9.3
* libkmipclient1-2.31.0-150600.8.9.3
* osasnmpd-2.31.0-150600.8.9.3
* osasnmpd-debuginfo-2.31.0-150600.8.9.3
* libekmfweb1-devel-2.31.0-150600.8.9.3
* libkmipclient1-devel-2.31.0-150600.8.9.3
* s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.9.3
* s390-tools-zdsfs-2.31.0-150600.8.9.3
* libkmipclient1-debuginfo-2.31.0-150600.8.9.3
* libekmfweb1-debuginfo-2.31.0-150600.8.9.3
* libekmfweb1-2.31.0-150600.8.9.3
* s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.9.3
* openSUSE Leap 15.6 (noarch)
* s390-tools-genprotimg-data-2.31.0-150600.8.9.3
* Basesystem Module 15-SP6 (s390x)
* s390-tools-hmcdrvfs-2.31.0-150600.8.9.3
* s390-tools-zdsfs-debuginfo-2.31.0-150600.8.9.3
* libkmipclient1-2.31.0-150600.8.9.3
* osasnmpd-2.31.0-150600.8.9.3
* osasnmpd-debuginfo-2.31.0-150600.8.9.3
* libekmfweb1-devel-2.31.0-150600.8.9.3
* s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.9.3
* s390-tools-zdsfs-2.31.0-150600.8.9.3
* libkmipclient1-debuginfo-2.31.0-150600.8.9.3
* libekmfweb1-debuginfo-2.31.0-150600.8.9.3
* libekmfweb1-2.31.0-150600.8.9.3
* s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.9.3
* Basesystem Module 15-SP6 (s390x x86_64)
* s390-tools-debugsource-2.31.0-150600.8.9.3
* s390-tools-debuginfo-2.31.0-150600.8.9.3
* s390-tools-2.31.0-150600.8.9.3
* Basesystem Module 15-SP6 (noarch)
* s390-tools-genprotimg-data-2.31.0-150600.8.9.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231002
1
0
09 Oct '24
# Recommended update for s390-tools
Announcement ID: SUSE-RU-2024:3557-1
Release Date: 2024-10-09T06:50:06Z
Rating: moderate
References:
* bsc#1231003
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for s390-tools fixes the following issue:
* ziomon/ziorep_config: fix warning when multipath device is not there
(bsc#1231003).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3557=1 openSUSE-SLE-15.5-2024-3557=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3557=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3557=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3557=1
## Package List:
* openSUSE Leap 15.5 (s390x x86_64)
* s390-tools-2.31.0-150500.9.25.2
* s390-tools-debuginfo-2.31.0-150500.9.25.2
* s390-tools-debugsource-2.31.0-150500.9.25.2
* openSUSE Leap 15.5 (s390x)
* libkmipclient1-2.31.0-150500.9.25.2
* libekmfweb1-debuginfo-2.31.0-150500.9.25.2
* s390-tools-hmcdrvfs-debuginfo-2.31.0-150500.9.25.2
* libkmipclient1-debuginfo-2.31.0-150500.9.25.2
* s390-tools-hmcdrvfs-2.31.0-150500.9.25.2
* s390-tools-chreipl-fcp-mpath-2.31.0-150500.9.25.2
* s390-tools-zdsfs-2.31.0-150500.9.25.2
* libekmfweb1-2.31.0-150500.9.25.2
* s390-tools-zdsfs-debuginfo-2.31.0-150500.9.25.2
* osasnmpd-2.31.0-150500.9.25.2
* libkmipclient1-devel-2.31.0-150500.9.25.2
* libekmfweb1-devel-2.31.0-150500.9.25.2
* osasnmpd-debuginfo-2.31.0-150500.9.25.2
* openSUSE Leap 15.5 (noarch)
* s390-tools-genprotimg-data-2.31.0-150500.9.25.2
* openSUSE Leap Micro 5.5 (s390x x86_64)
* s390-tools-2.31.0-150500.9.25.2
* s390-tools-debuginfo-2.31.0-150500.9.25.2
* s390-tools-debugsource-2.31.0-150500.9.25.2
* openSUSE Leap Micro 5.5 (s390x)
* libekmfweb1-2.31.0-150500.9.25.2
* libekmfweb1-debuginfo-2.31.0-150500.9.25.2
* libkmipclient1-debuginfo-2.31.0-150500.9.25.2
* libkmipclient1-2.31.0-150500.9.25.2
* openSUSE Leap Micro 5.5 (noarch)
* s390-tools-genprotimg-data-2.31.0-150500.9.25.2
* SUSE Linux Enterprise Micro 5.5 (s390x)
* libekmfweb1-2.31.0-150500.9.25.2
* libekmfweb1-debuginfo-2.31.0-150500.9.25.2
* libkmipclient1-debuginfo-2.31.0-150500.9.25.2
* libkmipclient1-2.31.0-150500.9.25.2
* SUSE Linux Enterprise Micro 5.5 (s390x x86_64)
* s390-tools-2.31.0-150500.9.25.2
* s390-tools-debuginfo-2.31.0-150500.9.25.2
* s390-tools-debugsource-2.31.0-150500.9.25.2
* SUSE Linux Enterprise Micro 5.5 (noarch)
* s390-tools-genprotimg-data-2.31.0-150500.9.25.2
* Basesystem Module 15-SP5 (s390x)
* libkmipclient1-2.31.0-150500.9.25.2
* libekmfweb1-debuginfo-2.31.0-150500.9.25.2
* s390-tools-hmcdrvfs-debuginfo-2.31.0-150500.9.25.2
* libkmipclient1-debuginfo-2.31.0-150500.9.25.2
* s390-tools-hmcdrvfs-2.31.0-150500.9.25.2
* s390-tools-chreipl-fcp-mpath-2.31.0-150500.9.25.2
* s390-tools-zdsfs-2.31.0-150500.9.25.2
* libekmfweb1-2.31.0-150500.9.25.2
* s390-tools-zdsfs-debuginfo-2.31.0-150500.9.25.2
* osasnmpd-2.31.0-150500.9.25.2
* osasnmpd-debuginfo-2.31.0-150500.9.25.2
* libekmfweb1-devel-2.31.0-150500.9.25.2
* Basesystem Module 15-SP5 (s390x x86_64)
* s390-tools-2.31.0-150500.9.25.2
* s390-tools-debuginfo-2.31.0-150500.9.25.2
* s390-tools-debugsource-2.31.0-150500.9.25.2
* Basesystem Module 15-SP5 (noarch)
* s390-tools-genprotimg-data-2.31.0-150500.9.25.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1231003
1
0
# Security update for qatlib
Announcement ID: SUSE-SU-2024:3558-1
Release Date: 2024-10-09T07:26:05Z
Rating: low
References:
* bsc#1217158
Cross-References:
* CVE-2023-22313
CVSS scores:
* CVE-2023-22313 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-22313 ( NVD ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Affected Products:
* openSUSE Leap 15.4
An update that solves one vulnerability can now be installed.
## Description:
This update for qatlib fixes the following issues:
* CVE-2023-22313: Fixed a local information disclosure due to improper buffer
restrictions (bsc#1217158).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3558=1
## Package List:
* openSUSE Leap 15.4 (x86_64)
* qatlib-debugsource-21.08.0-150400.3.3.3
* qatlib-debuginfo-21.08.0-150400.3.3.3
* qatlib-devel-21.08.0-150400.3.3.3
* qatlib-21.08.0-150400.3.3.3
## References:
* https://www.suse.com/security/cve/CVE-2023-22313.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217158
1
0
08 Oct '24
# Security update for json-lib
Announcement ID: SUSE-SU-2024:3543-1
Release Date: 2024-10-08T13:33:40Z
Rating: moderate
References:
* bsc#1231295
Cross-References:
* CVE-2024-47855
CVSS scores:
* CVE-2024-47855 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-47855 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for json-lib fixes the following issues:
* CVE-2024-47855: Fixed mishandled unbalanced comment string (bsc#1231295)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3543=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3543=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* jenkins-json-lib-2.4-150200.3.7.1
* json-lib-2.4-150200.3.7.1
* json-lib-javadoc-2.4-150200.3.7.1
* openSUSE Leap 15.6 (noarch)
* jenkins-json-lib-2.4-150200.3.7.1
* json-lib-2.4-150200.3.7.1
* json-lib-javadoc-2.4-150200.3.7.1
## References:
* https://www.suse.com/security/cve/CVE-2024-47855.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231295
1
0
# Security update for Mesa
Announcement ID: SUSE-SU-2024:3544-1
Release Date: 2024-10-08T14:04:06Z
Rating: moderate
References:
* bsc#1222040
* bsc#1222041
* bsc#1222042
Cross-References:
* CVE-2023-45913
* CVE-2023-45919
* CVE-2023-45922
CVSS scores:
* CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H
* CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for Mesa fixes the following issues:
* CVE-2023-45919: Fixed buffer over-read in glXQueryServerString()
(bsc#1222041).
* CVE-2023-45913: Fixed NULL pointer dereference via
dri2GetGlxDrawableFromXDrawableId() (bsc#1222040).
* CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute()
(bsc#CVE-2023-45922).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3544=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3544=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3544=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3544=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3544=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3544=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3544=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3544=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3544=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* Mesa-libGLESv1_CM-devel-21.2.4-150400.68.15.1
* Mesa-KHR-devel-21.2.4-150400.68.15.1
* libOSMesa8-debuginfo-21.2.4-150400.68.15.1
* Mesa-libEGL1-21.2.4-150400.68.15.1
* libgbm-devel-21.2.4-150400.68.15.1
* Mesa-libglapi0-21.2.4-150400.68.15.1
* Mesa-libGLESv3-devel-21.2.4-150400.68.15.1
* Mesa-libGL1-21.2.4-150400.68.15.1
* Mesa-devel-21.2.4-150400.68.15.1
* Mesa-dri-debuginfo-21.2.4-150400.68.15.1
* libgbm1-debuginfo-21.2.4-150400.68.15.1
* Mesa-libEGL1-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGL1-debuginfo-21.2.4-150400.68.15.1
* libOSMesa8-21.2.4-150400.68.15.1
* Mesa-libglapi0-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGLESv2-devel-21.2.4-150400.68.15.1
* Mesa-21.2.4-150400.68.15.1
* Mesa-libGL-devel-21.2.4-150400.68.15.1
* Mesa-dri-devel-21.2.4-150400.68.15.1
* libOSMesa-devel-21.2.4-150400.68.15.1
* Mesa-dri-21.2.4-150400.68.15.1
* Mesa-libglapi-devel-21.2.4-150400.68.15.1
* Mesa-drivers-debugsource-21.2.4-150400.68.15.1
* Mesa-libEGL-devel-21.2.4-150400.68.15.1
* libgbm1-21.2.4-150400.68.15.1
* Mesa-debugsource-21.2.4-150400.68.15.1
* openSUSE Leap 15.4 (x86_64)
* libvulkan_intel-32bit-21.2.4-150400.68.15.1
* Mesa-vulkan-overlay-32bit-21.2.4-150400.68.15.1
* libgbm-devel-32bit-21.2.4-150400.68.15.1
* libgbm1-32bit-debuginfo-21.2.4-150400.68.15.1
* libvulkan_radeon-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-dri-32bit-21.2.4-150400.68.15.1
* libvdpau_radeonsi-32bit-21.2.4-150400.68.15.1
* libgbm1-32bit-21.2.4-150400.68.15.1
* libXvMC_nouveau-32bit-21.2.4-150400.68.15.1
* Mesa-libGL-devel-32bit-21.2.4-150400.68.15.1
* Mesa-libd3d-devel-32bit-21.2.4-150400.68.15.1
* Mesa-libglapi-devel-32bit-21.2.4-150400.68.15.1
* Mesa-libGLESv2-devel-32bit-21.2.4-150400.68.15.1
* Mesa-dri-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGLESv1_CM-devel-32bit-21.2.4-150400.68.15.1
* libXvMC_nouveau-32bit-debuginfo-21.2.4-150400.68.15.1
* libvulkan_radeon-32bit-21.2.4-150400.68.15.1
* Mesa-libd3d-32bit-21.2.4-150400.68.15.1
* Mesa-libGL1-32bit-21.2.4-150400.68.15.1
* Mesa-libglapi0-32bit-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r600-32bit-debuginfo-21.2.4-150400.68.15.1
* libvdpau_radeonsi-32bit-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r600-32bit-21.2.4-150400.68.15.1
* Mesa-vulkan-overlay-32bit-debuginfo-21.2.4-150400.68.15.1
* libvdpau_nouveau-32bit-debuginfo-21.2.4-150400.68.15.1
* libOSMesa-devel-32bit-21.2.4-150400.68.15.1
* libOSMesa8-32bit-21.2.4-150400.68.15.1
* Mesa-dri-nouveau-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-32bit-21.2.4-150400.68.15.1
* libvdpau_r300-32bit-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r300-32bit-21.2.4-150400.68.15.1
* Mesa-libEGL1-32bit-21.2.4-150400.68.15.1
* Mesa-libGL1-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libglapi0-32bit-21.2.4-150400.68.15.1
* Mesa-gallium-32bit-21.2.4-150400.68.15.1
* Mesa-libEGL-devel-32bit-21.2.4-150400.68.15.1
* Mesa-dri-nouveau-32bit-21.2.4-150400.68.15.1
* Mesa-vulkan-device-select-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-vulkan-device-select-32bit-21.2.4-150400.68.15.1
* libvdpau_nouveau-32bit-21.2.4-150400.68.15.1
* Mesa-gallium-32bit-debuginfo-21.2.4-150400.68.15.1
* libXvMC_r600-32bit-21.2.4-150400.68.15.1
* libvulkan_intel-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libEGL1-32bit-debuginfo-21.2.4-150400.68.15.1
* libOSMesa8-32bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libd3d-32bit-debuginfo-21.2.4-150400.68.15.1
* libXvMC_r600-32bit-debuginfo-21.2.4-150400.68.15.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64 i586)
* libvdpau_nouveau-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r300-21.2.4-150400.68.15.1
* libvdpau_radeonsi-21.2.4-150400.68.15.1
* Mesa-libva-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r600-debuginfo-21.2.4-150400.68.15.1
* libXvMC_nouveau-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r600-21.2.4-150400.68.15.1
* libvdpau_r300-debuginfo-21.2.4-150400.68.15.1
* libXvMC_r600-21.2.4-150400.68.15.1
* libvdpau_radeonsi-debuginfo-21.2.4-150400.68.15.1
* libXvMC_nouveau-21.2.4-150400.68.15.1
* Mesa-libOpenCL-21.2.4-150400.68.15.1
* libxatracker2-debuginfo-1.0.0-150400.68.15.1
* libXvMC_r600-debuginfo-21.2.4-150400.68.15.1
* Mesa-libva-21.2.4-150400.68.15.1
* Mesa-dri-nouveau-21.2.4-150400.68.15.1
* Mesa-libOpenCL-debuginfo-21.2.4-150400.68.15.1
* libxatracker2-1.0.0-150400.68.15.1
* Mesa-gallium-debuginfo-21.2.4-150400.68.15.1
* libxatracker-devel-1.0.0-150400.68.15.1
* Mesa-gallium-21.2.4-150400.68.15.1
* Mesa-dri-nouveau-debuginfo-21.2.4-150400.68.15.1
* libvdpau_nouveau-21.2.4-150400.68.15.1
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* libvulkan_lvp-21.2.4-150400.68.15.1
* Mesa-libVulkan-devel-21.2.4-150400.68.15.1
* Mesa-vulkan-overlay-21.2.4-150400.68.15.1
* Mesa-libd3d-devel-21.2.4-150400.68.15.1
* Mesa-vulkan-overlay-debuginfo-21.2.4-150400.68.15.1
* libvulkan_lvp-debuginfo-21.2.4-150400.68.15.1
* Mesa-libd3d-debuginfo-21.2.4-150400.68.15.1
* libvulkan_radeon-debuginfo-21.2.4-150400.68.15.1
* Mesa-vulkan-device-select-21.2.4-150400.68.15.1
* Mesa-libd3d-21.2.4-150400.68.15.1
* libvulkan_radeon-21.2.4-150400.68.15.1
* Mesa-vulkan-device-select-debuginfo-21.2.4-150400.68.15.1
* openSUSE Leap 15.4 (x86_64 i586)
* libvulkan_intel-21.2.4-150400.68.15.1
* libvulkan_intel-debuginfo-21.2.4-150400.68.15.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libXvMC_nouveau-64bit-21.2.4-150400.68.15.1
* libvdpau_radeonsi-64bit-21.2.4-150400.68.15.1
* libvdpau_r600-64bit-21.2.4-150400.68.15.1
* libOSMesa8-64bit-21.2.4-150400.68.15.1
* Mesa-libEGL-devel-64bit-21.2.4-150400.68.15.1
* Mesa-64bit-21.2.4-150400.68.15.1
* Mesa-libglapi0-64bit-debuginfo-21.2.4-150400.68.15.1
* libXvMC_r600-64bit-21.2.4-150400.68.15.1
* libvdpau_r300-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGLESv1_CM-devel-64bit-21.2.4-150400.68.15.1
* libvdpau_nouveau-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGL-devel-64bit-21.2.4-150400.68.15.1
* libvdpau_radeonsi-64bit-debuginfo-21.2.4-150400.68.15.1
* libvulkan_radeon-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libd3d-devel-64bit-21.2.4-150400.68.15.1
* libXvMC_r600-64bit-debuginfo-21.2.4-150400.68.15.1
* libgbm-devel-64bit-21.2.4-150400.68.15.1
* libgbm1-64bit-21.2.4-150400.68.15.1
* Mesa-dri-vc4-64bit-21.2.4-150400.68.15.1
* Mesa-dri-vc4-64bit-debuginfo-21.2.4-150400.68.15.1
* libvdpau_r600-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGL1-64bit-21.2.4-150400.68.15.1
* libOSMesa-devel-64bit-21.2.4-150400.68.15.1
* Mesa-libGLESv2-devel-64bit-21.2.4-150400.68.15.1
* libOSMesa8-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libGL1-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libglapi-devel-64bit-21.2.4-150400.68.15.1
* Mesa-libEGL1-64bit-21.2.4-150400.68.15.1
* Mesa-libglapi0-64bit-21.2.4-150400.68.15.1
* libvulkan_radeon-64bit-21.2.4-150400.68.15.1
* Mesa-dri-64bit-21.2.4-150400.68.15.1
* libvdpau_r300-64bit-21.2.4-150400.68.15.1
* Mesa-dri-nouveau-64bit-21.2.4-150400.68.15.1
* Mesa-libEGL1-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-vulkan-overlay-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-dri-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-vulkan-device-select-64bit-21.2.4-150400.68.15.1
* Mesa-dri-nouveau-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-gallium-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-vulkan-device-select-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libd3d-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-vulkan-overlay-64bit-21.2.4-150400.68.15.1
* libgbm1-64bit-debuginfo-21.2.4-150400.68.15.1
* Mesa-libd3d-64bit-21.2.4-150400.68.15.1
* libvdpau_nouveau-64bit-21.2.4-150400.68.15.1
* Mesa-gallium-64bit-21.2.4-150400.68.15.1
* libXvMC_nouveau-64bit-debuginfo-21.2.4-150400.68.15.1
* openSUSE Leap 15.4 (aarch64)
* libvulkan_freedreno-21.2.4-150400.68.15.1
* libvulkan_broadcom-21.2.4-150400.68.15.1
* Mesa-dri-vc4-21.2.4-150400.68.15.1
* Mesa-dri-vc4-debuginfo-21.2.4-150400.68.15.1
* libvulkan_freedreno-debuginfo-21.2.4-150400.68.15.1
* libvulkan_broadcom-debuginfo-21.2.4-150400.68.15.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libgbm1-debuginfo-21.2.4-150400.68.15.1
* libgbm1-21.2.4-150400.68.15.1
* Mesa-debugsource-21.2.4-150400.68.15.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libgbm1-debuginfo-21.2.4-150400.68.15.1
* libgbm1-21.2.4-150400.68.15.1
* Mesa-debugsource-21.2.4-150400.68.15.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libgbm1-debuginfo-21.2.4-150400.68.15.1
* libgbm1-21.2.4-150400.68.15.1
* Mesa-debugsource-21.2.4-150400.68.15.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libgbm1-debuginfo-21.2.4-150400.68.15.1
* libgbm1-21.2.4-150400.68.15.1
* Mesa-debugsource-21.2.4-150400.68.15.1
* Basesystem Module 15-SP5 (x86_64)
* Mesa-drivers-debugsource-21.2.4-150400.68.15.1
* Mesa-libVulkan-devel-21.2.4-150400.68.15.1
* Basesystem Module 15-SP6 (x86_64)
* Mesa-drivers-debugsource-21.2.4-150400.68.15.1
* Mesa-libVulkan-devel-21.2.4-150400.68.15.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* Mesa-drivers-debugsource-21.2.4-150400.68.15.1
* libXvMC_nouveau-debuginfo-21.2.4-150400.68.15.1
* libXvMC_nouveau-21.2.4-150400.68.15.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* Mesa-drivers-debugsource-21.2.4-150400.68.15.1
* libXvMC_nouveau-debuginfo-21.2.4-150400.68.15.1
* libXvMC_nouveau-21.2.4-150400.68.15.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45913.html
* https://www.suse.com/security/cve/CVE-2023-45919.html
* https://www.suse.com/security/cve/CVE-2023-45922.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222040
* https://bugzilla.suse.com/show_bug.cgi?id=1222041
* https://bugzilla.suse.com/show_bug.cgi?id=1222042
1
0
08 Oct '24
# Security update for buildah
Announcement ID: SUSE-SU-2024:3545-1
Release Date: 2024-10-08T14:04:24Z
Rating: moderate
References:
* bsc#1231208
* bsc#1231230
Cross-References:
* CVE-2024-9341
* CVE-2024-9407
CVSS scores:
* CVE-2024-9341 ( SUSE ): 5.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9407 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9407 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:N
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for buildah fixes the following issues:
* CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of
Dockerfile RUN --mount Instruction (bsc#1231208).
* CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in
containers/common Go Library in cri-o (nsc#1231230).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3545=1 openSUSE-SLE-15.5-2024-3545=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3545=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3545=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3545=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.4-150500.3.13.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150500.3.13.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150500.3.13.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.4-150500.3.13.1
## References:
* https://www.suse.com/security/cve/CVE-2024-9341.html
* https://www.suse.com/security/cve/CVE-2024-9407.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231208
* https://bugzilla.suse.com/show_bug.cgi?id=1231230
1
0
# Security update for podman
Announcement ID: SUSE-SU-2024:3546-1
Release Date: 2024-10-08T14:04:55Z
Rating: moderate
References:
* bsc#1231230
Cross-References:
* CVE-2024-6104
* CVE-2024-9341
CVSS scores:
* CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-9341 ( SUSE ): 5.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-9341 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
* CVE-2024-9341 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for podman fixes the following issues:
* CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in
containers/common Go Library (bsc#1231230)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3546=1 openSUSE-SLE-15.5-2024-3546=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3546=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3546=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3546=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3546=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3546=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* podman-remote-4.9.5-150500.3.18.1
* podman-debuginfo-4.9.5-150500.3.18.1
* podmansh-4.9.5-150500.3.18.1
* podman-4.9.5-150500.3.18.1
* podman-remote-debuginfo-4.9.5-150500.3.18.1
* openSUSE Leap 15.5 (noarch)
* podman-docker-4.9.5-150500.3.18.1
* openSUSE Leap Micro 5.5 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.18.1
* podman-debuginfo-4.9.5-150500.3.18.1
* podmansh-4.9.5-150500.3.18.1
* podman-4.9.5-150500.3.18.1
* podman-remote-debuginfo-4.9.5-150500.3.18.1
* openSUSE Leap Micro 5.5 (noarch)
* podman-docker-4.9.5-150500.3.18.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.18.1
* podman-debuginfo-4.9.5-150500.3.18.1
* podmansh-4.9.5-150500.3.18.1
* podman-4.9.5-150500.3.18.1
* podman-remote-debuginfo-4.9.5-150500.3.18.1
* openSUSE Leap 15.6 (noarch)
* podman-docker-4.9.5-150500.3.18.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.18.1
* podman-debuginfo-4.9.5-150500.3.18.1
* podmansh-4.9.5-150500.3.18.1
* podman-4.9.5-150500.3.18.1
* podman-remote-debuginfo-4.9.5-150500.3.18.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* podman-docker-4.9.5-150500.3.18.1
* Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.18.1
* podman-debuginfo-4.9.5-150500.3.18.1
* podmansh-4.9.5-150500.3.18.1
* podman-4.9.5-150500.3.18.1
* podman-remote-debuginfo-4.9.5-150500.3.18.1
* Containers Module 15-SP5 (noarch)
* podman-docker-4.9.5-150500.3.18.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* podman-remote-4.9.5-150500.3.18.1
* podman-debuginfo-4.9.5-150500.3.18.1
* podmansh-4.9.5-150500.3.18.1
* podman-4.9.5-150500.3.18.1
* podman-remote-debuginfo-4.9.5-150500.3.18.1
* Containers Module 15-SP6 (noarch)
* podman-docker-4.9.5-150500.3.18.1
## References:
* https://www.suse.com/security/cve/CVE-2024-6104.html
* https://www.suse.com/security/cve/CVE-2024-9341.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231230
1
0
08 Oct '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3547-1
Release Date: 2024-10-08T14:06:34Z
Rating: important
References:
* bsc#1216223
* bsc#1223600
* bsc#1223958
* bsc#1225272
* bsc#1227487
* bsc#1228466
* bsc#1229407
* bsc#1229633
* bsc#1229662
* bsc#1229947
* bsc#1230015
* bsc#1230398
* bsc#1230434
* bsc#1230507
* bsc#1230767
* bsc#1231016
Cross-References:
* CVE-2022-48911
* CVE-2022-48923
* CVE-2022-48944
* CVE-2022-48945
* CVE-2024-41087
* CVE-2024-42301
* CVE-2024-44946
* CVE-2024-45021
* CVE-2024-46674
* CVE-2024-46774
CVSS scores:
* CVE-2022-48911 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48923 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48944 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48944 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves 10 vulnerabilities and has six security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.
(bsc#1229633).
* CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment
(bsc#1229662)
* CVE-2024-41087: Fix double free on error (bsc#1228466).
* CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
* CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
(bsc#1230015).
* CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops
(bsc#1230434).
* CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe
error path (bsc#1230507).
The following non-security bugs were fixed:
* blk-mq: add helper for checking if one CPU is mapped to specified hctx
(bsc#1223600).
* blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
* kabi: add __nf_queue_get_refs() for kabi compliance.
* scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
* scsi: smartpqi: Expose SAS address for SATA drives (bsc#1223958).
* SUNRPC: avoid soft lockup when transmitting UDP to reachable server
(bsc#1225272 bsc#1231016).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3547=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3547=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3547=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3547=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3547=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3547=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3547=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3547=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3547=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3547=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3547=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-3547=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3547=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3547=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3547=1
## Package List:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* kernel-default-extra-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64)
* kernel-64kb-debugsource-5.14.21-150400.24.136.1
* kernel-64kb-devel-5.14.21-150400.24.136.1
* kernel-64kb-debuginfo-5.14.21-150400.24.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-obs-build-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* reiserfs-kmp-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* reiserfs-kmp-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.136.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* SUSE Manager Server 4.3 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.136.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (noarch)
* kernel-docs-html-5.14.21-150400.24.136.1
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* kernel-source-vanilla-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debugsource-5.14.21-150400.24.136.1
* kernel-debug-livepatch-devel-5.14.21-150400.24.136.1
* kernel-debug-devel-5.14.21-150400.24.136.1
* kernel-debug-debuginfo-5.14.21-150400.24.136.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.136.1
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.136.1
* kernel-kvmsmall-devel-5.14.21-150400.24.136.1
* kernel-default-base-rebuild-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.136.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kselftests-kmp-default-5.14.21-150400.24.136.1
* kernel-obs-qa-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* reiserfs-kmp-default-5.14.21-150400.24.136.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.136.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.136.1
* dlm-kmp-default-5.14.21-150400.24.136.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-debugsource-5.14.21-150400.24.136.1
* kernel-default-livepatch-devel-5.14.21-150400.24.136.1
* ocfs2-kmp-default-5.14.21-150400.24.136.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.136.1
* kernel-default-livepatch-5.14.21-150400.24.136.1
* kernel-obs-build-5.14.21-150400.24.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1
* cluster-md-kmp-default-5.14.21-150400.24.136.1
* kernel-default-extra-5.14.21-150400.24.136.1
* gfs2-kmp-default-5.14.21-150400.24.136.1
* kernel-default-optional-5.14.21-150400.24.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_32-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_136-default-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-1-150400.9.3.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.136.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (aarch64)
* dtb-mediatek-5.14.21-150400.24.136.1
* dtb-sprd-5.14.21-150400.24.136.1
* dtb-qcom-5.14.21-150400.24.136.1
* dtb-broadcom-5.14.21-150400.24.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1
* dtb-allwinner-5.14.21-150400.24.136.1
* cluster-md-kmp-64kb-5.14.21-150400.24.136.1
* dtb-altera-5.14.21-150400.24.136.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.136.1
* dtb-arm-5.14.21-150400.24.136.1
* ocfs2-kmp-64kb-5.14.21-150400.24.136.1
* dtb-rockchip-5.14.21-150400.24.136.1
* dtb-apm-5.14.21-150400.24.136.1
* kernel-64kb-debugsource-5.14.21-150400.24.136.1
* dtb-hisilicon-5.14.21-150400.24.136.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.136.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.136.1
* dtb-amlogic-5.14.21-150400.24.136.1
* kernel-64kb-livepatch-devel-5.14.21-150400.24.136.1
* dtb-freescale-5.14.21-150400.24.136.1
* dtb-exynos-5.14.21-150400.24.136.1
* dtb-lg-5.14.21-150400.24.136.1
* kernel-64kb-extra-5.14.21-150400.24.136.1
* dtb-amazon-5.14.21-150400.24.136.1
* kernel-64kb-devel-5.14.21-150400.24.136.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.136.1
* kselftests-kmp-64kb-5.14.21-150400.24.136.1
* dtb-xilinx-5.14.21-150400.24.136.1
* reiserfs-kmp-64kb-5.14.21-150400.24.136.1
* dtb-cavium-5.14.21-150400.24.136.1
* dtb-marvell-5.14.21-150400.24.136.1
* dlm-kmp-64kb-5.14.21-150400.24.136.1
* gfs2-kmp-64kb-5.14.21-150400.24.136.1
* dtb-apple-5.14.21-150400.24.136.1
* dtb-amd-5.14.21-150400.24.136.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.136.1
* dtb-socionext-5.14.21-150400.24.136.1
* dtb-renesas-5.14.21-150400.24.136.1
* kernel-64kb-debuginfo-5.14.21-150400.24.136.1
* dtb-nvidia-5.14.21-150400.24.136.1
* kernel-64kb-optional-5.14.21-150400.24.136.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.136.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.136.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.136.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_136-default-1-150400.9.3.1
* kernel-default-livepatch-5.14.21-150400.24.136.1
* kernel-livepatch-SLE15-SP4_Update_32-debugsource-1-150400.9.3.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-5.14.21-150400.24.136.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* ocfs2-kmp-default-5.14.21-150400.24.136.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.136.1
* dlm-kmp-default-5.14.21-150400.24.136.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.136.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* gfs2-kmp-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-debugsource-5.14.21-150400.24.136.1
* kernel-64kb-devel-5.14.21-150400.24.136.1
* kernel-64kb-debuginfo-5.14.21-150400.24.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* reiserfs-kmp-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-debugsource-5.14.21-150400.24.136.1
* kernel-64kb-devel-5.14.21-150400.24.136.1
* kernel-64kb-debuginfo-5.14.21-150400.24.136.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-default-base-5.14.21-150400.24.136.1.150400.24.66.1
* kernel-default-debugsource-5.14.21-150400.24.136.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-5.14.21-150400.24.136.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.136.1
* kernel-syms-5.14.21-150400.24.136.1
* kernel-default-debuginfo-5.14.21-150400.24.136.1
* kernel-obs-build-debugsource-5.14.21-150400.24.136.1
* kernel-default-devel-5.14.21-150400.24.136.1
* reiserfs-kmp-default-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.136.1
* kernel-macros-5.14.21-150400.24.136.1
* kernel-devel-5.14.21-150400.24.136.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.136.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48911.html
* https://www.suse.com/security/cve/CVE-2022-48923.html
* https://www.suse.com/security/cve/CVE-2022-48944.html
* https://www.suse.com/security/cve/CVE-2022-48945.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-44946.html
* https://www.suse.com/security/cve/CVE-2024-45021.html
* https://www.suse.com/security/cve/CVE-2024-46674.html
* https://www.suse.com/security/cve/CVE-2024-46774.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1223600
* https://bugzilla.suse.com/show_bug.cgi?id=1223958
* https://bugzilla.suse.com/show_bug.cgi?id=1225272
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229633
* https://bugzilla.suse.com/show_bug.cgi?id=1229662
* https://bugzilla.suse.com/show_bug.cgi?id=1229947
* https://bugzilla.suse.com/show_bug.cgi?id=1230015
* https://bugzilla.suse.com/show_bug.cgi?id=1230398
* https://bugzilla.suse.com/show_bug.cgi?id=1230434
* https://bugzilla.suse.com/show_bug.cgi?id=1230507
* https://bugzilla.suse.com/show_bug.cgi?id=1230767
* https://bugzilla.suse.com/show_bug.cgi?id=1231016
1
0
# Security update for Mesa
Announcement ID: SUSE-SU-2024:3548-1
Release Date: 2024-10-08T14:07:13Z
Rating: moderate
References:
* bsc#1222040
* bsc#1222041
* bsc#1222042
Cross-References:
* CVE-2023-45913
* CVE-2023-45919
* CVE-2023-45922
CVSS scores:
* CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H
* CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for Mesa fixes the following issues:
* CVE-2023-45913: Fixed NULL pointer dereference via
dri2GetGlxDrawableFromXDrawableId() (bsc#1222040)
* CVE-2023-45919: Fixed buffer over-read in glXQueryServerString()
(bsc#1222041)
* CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute()
(bsc#1222042)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3548=1 SUSE-2024-3548=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3548=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3548=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3548=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3548=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3548=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3548=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3548=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* Mesa-libglapi-devel-22.3.5-150500.77.5.1
* libOSMesa8-debuginfo-22.3.5-150500.77.5.1
* libgbm1-22.3.5-150500.77.5.1
* Mesa-debugsource-22.3.5-150500.77.5.1
* Mesa-libEGL1-22.3.5-150500.77.5.1
* libOSMesa-devel-22.3.5-150500.77.5.1
* Mesa-libGL-devel-22.3.5-150500.77.5.1
* Mesa-22.3.5-150500.77.5.1
* Mesa-libGLESv3-devel-22.3.5-150500.77.5.1
* Mesa-drivers-debugsource-22.3.5-150500.77.5.1
* libgbm-devel-22.3.5-150500.77.5.1
* libgbm1-debuginfo-22.3.5-150500.77.5.1
* Mesa-devel-22.3.5-150500.77.5.1
* Mesa-libGL1-22.3.5-150500.77.5.1
* Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGLESv1_CM-devel-22.3.5-150500.77.5.1
* Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1
* Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-KHR-devel-22.3.5-150500.77.5.1
* Mesa-libglapi0-22.3.5-150500.77.5.1
* Mesa-libGLESv2-devel-22.3.5-150500.77.5.1
* Mesa-dri-devel-22.3.5-150500.77.5.1
* Mesa-dri-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-22.3.5-150500.77.5.1
* libOSMesa8-22.3.5-150500.77.5.1
* Mesa-libEGL-devel-22.3.5-150500.77.5.1
* openSUSE Leap 15.5 (x86_64)
* Mesa-dri-32bit-22.3.5-150500.77.5.1
* libOSMesa8-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-32bit-22.3.5-150500.77.5.1
* Mesa-libEGL1-32bit-22.3.5-150500.77.5.1
* libgbm-devel-32bit-22.3.5-150500.77.5.1
* libvulkan_intel-32bit-22.3.5-150500.77.5.1
* Mesa-libGLESv2-devel-32bit-22.3.5-150500.77.5.1
* Mesa-libd3d-32bit-debuginfo-22.3.5-150500.77.5.1
* libvulkan_radeon-32bit-22.3.5-150500.77.5.1
* Mesa-libglapi-devel-32bit-22.3.5-150500.77.5.1
* libvulkan_intel-32bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r300-32bit-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-32bit-debuginfo-22.3.5-150500.77.5.1
* libOSMesa8-32bit-22.3.5-150500.77.5.1
* Mesa-32bit-22.3.5-150500.77.5.1
* libgbm1-32bit-22.3.5-150500.77.5.1
* libvdpau_r600-32bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-32bit-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-32bit-debuginfo-22.3.5-150500.77.5.1
* libOSMesa-devel-32bit-22.3.5-150500.77.5.1
* libvulkan_radeon-32bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_radeonsi-32bit-22.3.5-150500.77.5.1
* Mesa-libglapi0-32bit-22.3.5-150500.77.5.1
* libgbm1-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-devel-32bit-22.3.5-150500.77.5.1
* Mesa-libEGL-devel-32bit-22.3.5-150500.77.5.1
* libvdpau_radeonsi-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-32bit-22.3.5-150500.77.5.1
* libvdpau_r600-32bit-22.3.5-150500.77.5.1
* Mesa-libEGL1-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGL1-32bit-22.3.5-150500.77.5.1
* libvdpau_r300-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-gallium-32bit-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-gallium-32bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_nouveau-32bit-22.3.5-150500.77.5.1
* Mesa-libGLESv1_CM-devel-32bit-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-32bit-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-32bit-22.3.5-150500.77.5.1
* Mesa-libGL1-32bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_nouveau-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libglapi0-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGL-devel-32bit-22.3.5-150500.77.5.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64 i586)
* libvdpau_r300-22.3.5-150500.77.5.1
* libvdpau_nouveau-22.3.5-150500.77.5.1
* libxatracker2-1.0.0-150500.77.5.1
* Mesa-gallium-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-22.3.5-150500.77.5.1
* libvdpau_radeonsi-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-22.3.5-150500.77.5.1
* libvdpau_radeonsi-debuginfo-22.3.5-150500.77.5.1
* Mesa-gallium-debuginfo-22.3.5-150500.77.5.1
* Mesa-libva-debuginfo-22.3.5-150500.77.5.1
* libxatracker2-debuginfo-1.0.0-150500.77.5.1
* libvdpau_r600-debuginfo-22.3.5-150500.77.5.1
* libvdpau_nouveau-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r600-22.3.5-150500.77.5.1
* libxatracker-devel-1.0.0-150500.77.5.1
* Mesa-libva-22.3.5-150500.77.5.1
* Mesa-libOpenCL-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-debuginfo-22.3.5-150500.77.5.1
* Mesa-libOpenCL-debuginfo-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r300-debuginfo-22.3.5-150500.77.5.1
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* Mesa-vulkan-device-select-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-22.3.5-150500.77.5.1
* libvulkan_lvp-22.3.5-150500.77.5.1
* libvulkan_radeon-22.3.5-150500.77.5.1
* libvulkan_radeon-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-devel-22.3.5-150500.77.5.1
* libvulkan_lvp-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-22.3.5-150500.77.5.1
* openSUSE Leap 15.5 (x86_64 i586)
* libvulkan_intel-debuginfo-22.3.5-150500.77.5.1
* libvulkan_intel-22.3.5-150500.77.5.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* Mesa-libglapi0-64bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libEGL1-64bit-debuginfo-22.3.5-150500.77.5.1
* libgbm-devel-64bit-22.3.5-150500.77.5.1
* Mesa-libGL-devel-64bit-22.3.5-150500.77.5.1
* libgbm1-64bit-22.3.5-150500.77.5.1
* libvdpau_r300-64bit-22.3.5-150500.77.5.1
* libvdpau_radeonsi-64bit-debuginfo-22.3.5-150500.77.5.1
* libOSMesa8-64bit-22.3.5-150500.77.5.1
* libOSMesa8-64bit-debuginfo-22.3.5-150500.77.5.1
* libgbm1-64bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r300-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGLESv1_CM-devel-64bit-22.3.5-150500.77.5.1
* Mesa-libGL1-64bit-22.3.5-150500.77.5.1
* Mesa-gallium-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-64bit-22.3.5-150500.77.5.1
* libvdpau_nouveau-64bit-22.3.5-150500.77.5.1
* Mesa-gallium-64bit-22.3.5-150500.77.5.1
* Mesa-libd3d-devel-64bit-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-64bit-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-64bit-22.3.5-150500.77.5.1
* libvdpau_nouveau-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-vc4-64bit-debuginfo-22.3.5-150500.77.5.1
* libOSMesa-devel-64bit-22.3.5-150500.77.5.1
* Mesa-libGL1-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-vc4-64bit-22.3.5-150500.77.5.1
* Mesa-libEGL-devel-64bit-22.3.5-150500.77.5.1
* Mesa-libd3d-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-64bit-22.3.5-150500.77.5.1
* Mesa-64bit-22.3.5-150500.77.5.1
* Mesa-libEGL1-64bit-22.3.5-150500.77.5.1
* Mesa-libglapi-devel-64bit-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-64bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGLESv2-devel-64bit-22.3.5-150500.77.5.1
* Mesa-libglapi0-64bit-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-64bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r600-64bit-22.3.5-150500.77.5.1
* libvdpau_r600-64bit-debuginfo-22.3.5-150500.77.5.1
* libvdpau_radeonsi-64bit-22.3.5-150500.77.5.1
* libvulkan_radeon-64bit-debuginfo-22.3.5-150500.77.5.1
* libvulkan_radeon-64bit-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-64bit-22.3.5-150500.77.5.1
* Mesa-dri-64bit-22.3.5-150500.77.5.1
* openSUSE Leap 15.5 (aarch64)
* libvulkan_broadcom-debuginfo-22.3.5-150500.77.5.1
* libvulkan_freedreno-22.3.5-150500.77.5.1
* Mesa-dri-vc4-22.3.5-150500.77.5.1
* libvulkan_broadcom-22.3.5-150500.77.5.1
* libvulkan_freedreno-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-vc4-debuginfo-22.3.5-150500.77.5.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* Mesa-22.3.5-150500.77.5.1
* Mesa-libGL1-22.3.5-150500.77.5.1
* Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-libglapi0-22.3.5-150500.77.5.1
* Mesa-drivers-debugsource-22.3.5-150500.77.5.1
* libgbm1-debuginfo-22.3.5-150500.77.5.1
* libgbm1-22.3.5-150500.77.5.1
* Mesa-debugsource-22.3.5-150500.77.5.1
* Mesa-libEGL1-22.3.5-150500.77.5.1
* Mesa-dri-debuginfo-22.3.5-150500.77.5.1
* Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1
* Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-22.3.5-150500.77.5.1
* openSUSE Leap Micro 5.5 (aarch64 x86_64)
* Mesa-gallium-22.3.5-150500.77.5.1
* Mesa-gallium-debuginfo-22.3.5-150500.77.5.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* Mesa-22.3.5-150500.77.5.1
* Mesa-libGL1-22.3.5-150500.77.5.1
* Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-libglapi0-22.3.5-150500.77.5.1
* Mesa-drivers-debugsource-22.3.5-150500.77.5.1
* libgbm1-debuginfo-22.3.5-150500.77.5.1
* libgbm1-22.3.5-150500.77.5.1
* Mesa-debugsource-22.3.5-150500.77.5.1
* Mesa-libEGL1-22.3.5-150500.77.5.1
* Mesa-dri-debuginfo-22.3.5-150500.77.5.1
* Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1
* Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-22.3.5-150500.77.5.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le x86_64)
* Mesa-gallium-22.3.5-150500.77.5.1
* Mesa-gallium-debuginfo-22.3.5-150500.77.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* Mesa-libglapi-devel-22.3.5-150500.77.5.1
* libOSMesa8-debuginfo-22.3.5-150500.77.5.1
* libgbm1-22.3.5-150500.77.5.1
* Mesa-debugsource-22.3.5-150500.77.5.1
* Mesa-libEGL1-22.3.5-150500.77.5.1
* libOSMesa-devel-22.3.5-150500.77.5.1
* Mesa-libGL-devel-22.3.5-150500.77.5.1
* Mesa-22.3.5-150500.77.5.1
* Mesa-libGLESv3-devel-22.3.5-150500.77.5.1
* Mesa-drivers-debugsource-22.3.5-150500.77.5.1
* libgbm-devel-22.3.5-150500.77.5.1
* libgbm1-debuginfo-22.3.5-150500.77.5.1
* libOSMesa8-22.3.5-150500.77.5.1
* Mesa-devel-22.3.5-150500.77.5.1
* Mesa-libGL1-22.3.5-150500.77.5.1
* Mesa-libGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGLESv1_CM-devel-22.3.5-150500.77.5.1
* Mesa-libglapi0-debuginfo-22.3.5-150500.77.5.1
* Mesa-libEGL1-debuginfo-22.3.5-150500.77.5.1
* Mesa-KHR-devel-22.3.5-150500.77.5.1
* Mesa-libglapi0-22.3.5-150500.77.5.1
* Mesa-libGLESv2-devel-22.3.5-150500.77.5.1
* Mesa-dri-devel-22.3.5-150500.77.5.1
* Mesa-dri-debuginfo-22.3.5-150500.77.5.1
* Mesa-dri-22.3.5-150500.77.5.1
* Mesa-libEGL-devel-22.3.5-150500.77.5.1
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* libvdpau_r600-22.3.5-150500.77.5.1
* Mesa-libva-22.3.5-150500.77.5.1
* libvdpau_r300-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-22.3.5-150500.77.5.1
* libxatracker2-1.0.0-150500.77.5.1
* Mesa-gallium-debuginfo-22.3.5-150500.77.5.1
* Mesa-gallium-22.3.5-150500.77.5.1
* Mesa-libva-debuginfo-22.3.5-150500.77.5.1
* libvdpau_virtio_gpu-debuginfo-22.3.5-150500.77.5.1
* libxatracker2-debuginfo-1.0.0-150500.77.5.1
* libxatracker-devel-1.0.0-150500.77.5.1
* libvdpau_r300-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r600-debuginfo-22.3.5-150500.77.5.1
* Basesystem Module 15-SP5 (aarch64 x86_64)
* Mesa-vulkan-device-select-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-22.3.5-150500.77.5.1
* libvulkan_lvp-22.3.5-150500.77.5.1
* libvulkan_radeon-22.3.5-150500.77.5.1
* libvulkan_radeon-debuginfo-22.3.5-150500.77.5.1
* libvulkan_lvp-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-overlay-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-22.3.5-150500.77.5.1
* Basesystem Module 15-SP5 (x86_64)
* libgbm1-32bit-22.3.5-150500.77.5.1
* Mesa-dri-32bit-22.3.5-150500.77.5.1
* libvdpau_radeonsi-22.3.5-150500.77.5.1
* Mesa-dri-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libEGL1-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGL1-32bit-22.3.5-150500.77.5.1
* Mesa-libEGL1-32bit-22.3.5-150500.77.5.1
* Mesa-gallium-32bit-22.3.5-150500.77.5.1
* libvulkan_intel-22.3.5-150500.77.5.1
* libvdpau_radeonsi-debuginfo-22.3.5-150500.77.5.1
* Mesa-gallium-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libGL1-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-debuginfo-22.3.5-150500.77.5.1
* Mesa-libd3d-devel-22.3.5-150500.77.5.1
* Mesa-libglapi0-32bit-22.3.5-150500.77.5.1
* Mesa-libd3d-22.3.5-150500.77.5.1
* Mesa-libglapi0-32bit-debuginfo-22.3.5-150500.77.5.1
* libgbm1-32bit-debuginfo-22.3.5-150500.77.5.1
* libvulkan_intel-debuginfo-22.3.5-150500.77.5.1
* Mesa-32bit-22.3.5-150500.77.5.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* libvdpau_r300-debuginfo-22.3.5-150500.77.5.1
* libvdpau_r300-22.3.5-150500.77.5.1
* Mesa-drivers-debugsource-22.3.5-150500.77.5.1
* SUSE Package Hub 15 15-SP5 (x86_64)
* libOSMesa8-32bit-debuginfo-22.3.5-150500.77.5.1
* libOSMesa8-32bit-22.3.5-150500.77.5.1
* Mesa-debugsource-22.3.5-150500.77.5.1
* SUSE Package Hub 15 15-SP6 (x86_64)
* Mesa-vulkan-device-select-32bit-22.3.5-150500.77.5.1
* libvulkan_radeon-32bit-22.3.5-150500.77.5.1
* libvulkan_intel-32bit-22.3.5-150500.77.5.1
* libvulkan_radeon-32bit-debuginfo-22.3.5-150500.77.5.1
* libvulkan_intel-32bit-debuginfo-22.3.5-150500.77.5.1
* Mesa-vulkan-device-select-32bit-debuginfo-22.3.5-150500.77.5.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* Mesa-drivers-debugsource-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-debuginfo-22.3.5-150500.77.5.1
* libvdpau_nouveau-22.3.5-150500.77.5.1
* Mesa-dri-nouveau-22.3.5-150500.77.5.1
* libvdpau_nouveau-debuginfo-22.3.5-150500.77.5.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45913.html
* https://www.suse.com/security/cve/CVE-2023-45919.html
* https://www.suse.com/security/cve/CVE-2023-45922.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222040
* https://bugzilla.suse.com/show_bug.cgi?id=1222041
* https://bugzilla.suse.com/show_bug.cgi?id=1222042
1
0
08 Oct '24
# Security update for redis7
Announcement ID: SUSE-SU-2024:3549-1
Release Date: 2024-10-08T14:07:24Z
Rating: important
References:
* bsc#1231264
* bsc#1231265
* bsc#1231266
Cross-References:
* CVE-2024-31227
* CVE-2024-31228
* CVE-2024-31449
CVSS scores:
* CVE-2024-31227 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-31227 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-31449 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves three vulnerabilities can now be installed.
## Description:
This update for redis7 fixes the following issues:
* CVE-2024-31227: Fixed parsing issue leading to denail of service
(bsc#1231266)
* CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265)
* CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3549=1 SUSE-2024-3549=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3549=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* redis7-7.0.8-150500.3.12.1
* redis7-debugsource-7.0.8-150500.3.12.1
* redis7-debuginfo-7.0.8-150500.3.12.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* redis7-7.0.8-150500.3.12.1
* redis7-debugsource-7.0.8-150500.3.12.1
* redis7-debuginfo-7.0.8-150500.3.12.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31227.html
* https://www.suse.com/security/cve/CVE-2024-31228.html
* https://www.suse.com/security/cve/CVE-2024-31449.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231264
* https://bugzilla.suse.com/show_bug.cgi?id=1231265
* https://bugzilla.suse.com/show_bug.cgi?id=1231266
1
0
# Security update for podofo
Announcement ID: SUSE-SU-2024:3550-1
Release Date: 2024-10-08T14:08:01Z
Rating: moderate
References:
* bsc#1023072
* bsc#1023190
* bsc#1027776
* bsc#1027779
* bsc#1027785
* bsc#1027786
* bsc#1027787
* bsc#1037000
* bsc#1075322
* bsc#1084894
Cross-References:
* CVE-2015-8981
* CVE-2017-6840
* CVE-2017-6841
* CVE-2017-6842
* CVE-2017-6845
* CVE-2017-6849
* CVE-2017-8378
* CVE-2018-5309
* CVE-2018-8001
CVSS scores:
* CVE-2017-6840 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2017-6841 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2017-6842 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2017-6845 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2017-6849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2017-6849 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2017-8378 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2017-8378 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2018-5309 ( SUSE ): 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2018-5309 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2018-8001 ( SUSE ): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2018-8001 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves nine vulnerabilities and has one security fix can now be
installed.
## Description:
This update for podofo fixes the following issues:
* CVE-2015-8981: Fixed heap overflow in the function ReadXRefSubsection
(bsc#1023190)
* CVE-2017-6840: Fixed invalid memory read in ColorChanger::GetColorFromStack
(colorchanger.cpp) (bsc#1027787)
* CVE-2017-6841: Fixed NULL pointer dereference in
GraphicsStack::TGraphicsStackElement::~TGraphicsStackElement
(graphicsstack.h) (bsc#1027786)
* CVE-2017-6842: Fixed NULL pointer dereference in
ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027785)
* CVE-2017-6845: Fixed NULL pointer dereference in
GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace
(graphicsstack.h) (bsc#1027779)
* CVE-2017-6849: Fixed NULL pointer dereference in
PoDoFo::PdfColorGray::~PdfColorGray (PdfColor.cpp) (bsc#1027776)
* CVE-2017-8378: Fixed denial of service (application crash) vectors related
to m_offsets.size (PdfParser::ReadObjects func in base/PdfParser.cpp)
(bsc#1037000)
* Fixed NULL pointer dereference in PdfInfo::GuessFormat (pdfinfo.cpp)
(bsc#1023072)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3550=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3550=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3550=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3550=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3550=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* podofo-debugsource-0.9.6-150300.3.15.1
* libpodofo0_9_6-0.9.6-150300.3.15.1
* podofo-debuginfo-0.9.6-150300.3.15.1
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1
* podofo-0.9.6-150300.3.15.1
* libpodofo-devel-0.9.6-150300.3.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* podofo-debugsource-0.9.6-150300.3.15.1
* libpodofo0_9_6-0.9.6-150300.3.15.1
* podofo-debuginfo-0.9.6-150300.3.15.1
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1
* podofo-0.9.6-150300.3.15.1
* libpodofo-devel-0.9.6-150300.3.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* podofo-debugsource-0.9.6-150300.3.15.1
* libpodofo0_9_6-0.9.6-150300.3.15.1
* podofo-debuginfo-0.9.6-150300.3.15.1
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1
* podofo-0.9.6-150300.3.15.1
* libpodofo-devel-0.9.6-150300.3.15.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* podofo-debugsource-0.9.6-150300.3.15.1
* libpodofo0_9_6-0.9.6-150300.3.15.1
* podofo-debuginfo-0.9.6-150300.3.15.1
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1
* podofo-0.9.6-150300.3.15.1
* libpodofo-devel-0.9.6-150300.3.15.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* podofo-debugsource-0.9.6-150300.3.15.1
* libpodofo0_9_6-0.9.6-150300.3.15.1
* podofo-debuginfo-0.9.6-150300.3.15.1
* libpodofo0_9_6-debuginfo-0.9.6-150300.3.15.1
* podofo-0.9.6-150300.3.15.1
* libpodofo-devel-0.9.6-150300.3.15.1
## References:
* https://www.suse.com/security/cve/CVE-2015-8981.html
* https://www.suse.com/security/cve/CVE-2017-6840.html
* https://www.suse.com/security/cve/CVE-2017-6841.html
* https://www.suse.com/security/cve/CVE-2017-6842.html
* https://www.suse.com/security/cve/CVE-2017-6845.html
* https://www.suse.com/security/cve/CVE-2017-6849.html
* https://www.suse.com/security/cve/CVE-2017-8378.html
* https://www.suse.com/security/cve/CVE-2018-5309.html
* https://www.suse.com/security/cve/CVE-2018-8001.html
* https://bugzilla.suse.com/show_bug.cgi?id=1023072
* https://bugzilla.suse.com/show_bug.cgi?id=1023190
* https://bugzilla.suse.com/show_bug.cgi?id=1027776
* https://bugzilla.suse.com/show_bug.cgi?id=1027779
* https://bugzilla.suse.com/show_bug.cgi?id=1027785
* https://bugzilla.suse.com/show_bug.cgi?id=1027786
* https://bugzilla.suse.com/show_bug.cgi?id=1027787
* https://bugzilla.suse.com/show_bug.cgi?id=1037000
* https://bugzilla.suse.com/show_bug.cgi?id=1075322
* https://bugzilla.suse.com/show_bug.cgi?id=1084894
1
0
08 Oct '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3551-1
Release Date: 2024-10-08T15:03:18Z
Rating: important
References:
* bsc#1012628
* bsc#1183045
* bsc#1215199
* bsc#1216223
* bsc#1216776
* bsc#1220382
* bsc#1221527
* bsc#1221610
* bsc#1221650
* bsc#1222629
* bsc#1223600
* bsc#1223848
* bsc#1225487
* bsc#1225812
* bsc#1225903
* bsc#1226003
* bsc#1226507
* bsc#1226606
* bsc#1226666
* bsc#1226846
* bsc#1226860
* bsc#1227487
* bsc#1227694
* bsc#1227726
* bsc#1227819
* bsc#1227885
* bsc#1227890
* bsc#1227962
* bsc#1228090
* bsc#1228140
* bsc#1228244
* bsc#1228507
* bsc#1228771
* bsc#1229001
* bsc#1229004
* bsc#1229019
* bsc#1229086
* bsc#1229167
* bsc#1229169
* bsc#1229289
* bsc#1229334
* bsc#1229362
* bsc#1229363
* bsc#1229364
* bsc#1229371
* bsc#1229380
* bsc#1229389
* bsc#1229394
* bsc#1229429
* bsc#1229443
* bsc#1229452
* bsc#1229455
* bsc#1229456
* bsc#1229494
* bsc#1229585
* bsc#1229753
* bsc#1229764
* bsc#1229768
* bsc#1229790
* bsc#1229810
* bsc#1229899
* bsc#1229928
* bsc#1230015
* bsc#1230119
* bsc#1230123
* bsc#1230124
* bsc#1230125
* bsc#1230169
* bsc#1230170
* bsc#1230171
* bsc#1230173
* bsc#1230174
* bsc#1230175
* bsc#1230176
* bsc#1230178
* bsc#1230180
* bsc#1230181
* bsc#1230185
* bsc#1230191
* bsc#1230192
* bsc#1230193
* bsc#1230194
* bsc#1230195
* bsc#1230200
* bsc#1230204
* bsc#1230206
* bsc#1230207
* bsc#1230209
* bsc#1230211
* bsc#1230213
* bsc#1230217
* bsc#1230221
* bsc#1230224
* bsc#1230230
* bsc#1230232
* bsc#1230233
* bsc#1230240
* bsc#1230244
* bsc#1230245
* bsc#1230247
* bsc#1230248
* bsc#1230269
* bsc#1230270
* bsc#1230295
* bsc#1230340
* bsc#1230350
* bsc#1230413
* bsc#1230426
* bsc#1230430
* bsc#1230431
* bsc#1230432
* bsc#1230433
* bsc#1230434
* bsc#1230435
* bsc#1230440
* bsc#1230441
* bsc#1230442
* bsc#1230444
* bsc#1230450
* bsc#1230451
* bsc#1230454
* bsc#1230455
* bsc#1230457
* bsc#1230459
* bsc#1230506
* bsc#1230507
* bsc#1230511
* bsc#1230515
* bsc#1230517
* bsc#1230518
* bsc#1230519
* bsc#1230520
* bsc#1230521
* bsc#1230524
* bsc#1230526
* bsc#1230533
* bsc#1230535
* bsc#1230539
* bsc#1230540
* bsc#1230549
* bsc#1230556
* bsc#1230562
* bsc#1230563
* bsc#1230564
* bsc#1230580
* bsc#1230582
* bsc#1230589
* bsc#1230602
* bsc#1230699
* bsc#1230700
* bsc#1230701
* bsc#1230702
* bsc#1230703
* bsc#1230704
* bsc#1230705
* bsc#1230706
* bsc#1230709
* bsc#1230711
* bsc#1230712
* bsc#1230715
* bsc#1230719
* bsc#1230722
* bsc#1230724
* bsc#1230725
* bsc#1230726
* bsc#1230727
* bsc#1230730
* bsc#1230731
* bsc#1230732
* bsc#1230747
* bsc#1230748
* bsc#1230749
* bsc#1230751
* bsc#1230752
* bsc#1230753
* bsc#1230756
* bsc#1230761
* bsc#1230766
* bsc#1230767
* bsc#1230768
* bsc#1230771
* bsc#1230772
* bsc#1230775
* bsc#1230776
* bsc#1230780
* bsc#1230783
* bsc#1230786
* bsc#1230787
* bsc#1230791
* bsc#1230794
* bsc#1230796
* bsc#1230802
* bsc#1230806
* bsc#1230808
* bsc#1230809
* bsc#1230810
* bsc#1230812
* bsc#1230813
* bsc#1230814
* bsc#1230815
* bsc#1230821
* bsc#1230825
* bsc#1230830
* bsc#1230831
* bsc#1230854
* bsc#1230948
* bsc#1231008
* bsc#1231035
* bsc#1231120
* bsc#1231146
* bsc#1231182
* bsc#1231183
* jsc#PED-10954
* jsc#PED-9899
Cross-References:
* CVE-2023-52610
* CVE-2023-52752
* CVE-2023-52915
* CVE-2023-52916
* CVE-2024-26640
* CVE-2024-26759
* CVE-2024-26804
* CVE-2024-36953
* CVE-2024-38538
* CVE-2024-38596
* CVE-2024-38632
* CVE-2024-40965
* CVE-2024-40973
* CVE-2024-40983
* CVE-2024-42154
* CVE-2024-42243
* CVE-2024-42252
* CVE-2024-42265
* CVE-2024-42294
* CVE-2024-42304
* CVE-2024-42305
* CVE-2024-42306
* CVE-2024-43828
* CVE-2024-43832
* CVE-2024-43835
* CVE-2024-43845
* CVE-2024-43870
* CVE-2024-43890
* CVE-2024-43898
* CVE-2024-43904
* CVE-2024-43914
* CVE-2024-44935
* CVE-2024-44944
* CVE-2024-44946
* CVE-2024-44947
* CVE-2024-44948
* CVE-2024-44950
* CVE-2024-44951
* CVE-2024-44952
* CVE-2024-44954
* CVE-2024-44960
* CVE-2024-44961
* CVE-2024-44962
* CVE-2024-44965
* CVE-2024-44967
* CVE-2024-44969
* CVE-2024-44970
* CVE-2024-44971
* CVE-2024-44977
* CVE-2024-44982
* CVE-2024-44984
* CVE-2024-44985
* CVE-2024-44986
* CVE-2024-44987
* CVE-2024-44988
* CVE-2024-44989
* CVE-2024-44990
* CVE-2024-44991
* CVE-2024-44997
* CVE-2024-44998
* CVE-2024-44999
* CVE-2024-45000
* CVE-2024-45001
* CVE-2024-45002
* CVE-2024-45003
* CVE-2024-45005
* CVE-2024-45006
* CVE-2024-45007
* CVE-2024-45008
* CVE-2024-45011
* CVE-2024-45012
* CVE-2024-45013
* CVE-2024-45015
* CVE-2024-45017
* CVE-2024-45018
* CVE-2024-45019
* CVE-2024-45020
* CVE-2024-45021
* CVE-2024-45022
* CVE-2024-45023
* CVE-2024-45026
* CVE-2024-45028
* CVE-2024-45029
* CVE-2024-45030
* CVE-2024-46672
* CVE-2024-46673
* CVE-2024-46674
* CVE-2024-46675
* CVE-2024-46676
* CVE-2024-46677
* CVE-2024-46679
* CVE-2024-46685
* CVE-2024-46686
* CVE-2024-46687
* CVE-2024-46689
* CVE-2024-46691
* CVE-2024-46692
* CVE-2024-46693
* CVE-2024-46694
* CVE-2024-46695
* CVE-2024-46702
* CVE-2024-46706
* CVE-2024-46707
* CVE-2024-46709
* CVE-2024-46710
* CVE-2024-46714
* CVE-2024-46715
* CVE-2024-46716
* CVE-2024-46717
* CVE-2024-46719
* CVE-2024-46720
* CVE-2024-46722
* CVE-2024-46723
* CVE-2024-46724
* CVE-2024-46725
* CVE-2024-46726
* CVE-2024-46728
* CVE-2024-46729
* CVE-2024-46730
* CVE-2024-46731
* CVE-2024-46732
* CVE-2024-46734
* CVE-2024-46735
* CVE-2024-46737
* CVE-2024-46738
* CVE-2024-46739
* CVE-2024-46741
* CVE-2024-46743
* CVE-2024-46744
* CVE-2024-46745
* CVE-2024-46746
* CVE-2024-46747
* CVE-2024-46749
* CVE-2024-46750
* CVE-2024-46751
* CVE-2024-46752
* CVE-2024-46753
* CVE-2024-46755
* CVE-2024-46756
* CVE-2024-46757
* CVE-2024-46758
* CVE-2024-46759
* CVE-2024-46760
* CVE-2024-46761
* CVE-2024-46767
* CVE-2024-46771
* CVE-2024-46772
* CVE-2024-46773
* CVE-2024-46774
* CVE-2024-46776
* CVE-2024-46778
* CVE-2024-46780
* CVE-2024-46781
* CVE-2024-46783
* CVE-2024-46784
* CVE-2024-46786
* CVE-2024-46787
* CVE-2024-46791
* CVE-2024-46794
* CVE-2024-46797
* CVE-2024-46798
* CVE-2024-46822
CVSS scores:
* CVE-2023-52610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36953 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38538 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-38538 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-38596 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-38632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-40973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42154 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-42243 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42252 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42252 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42265 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-42294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42294 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43828 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43890 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-43890 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-43890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43898 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44946 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44960 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-44960 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-44960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44961 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44961 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44961 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44962 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44962 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44965 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44967 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44969 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44970 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44971 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44977 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44977 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44984 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-44985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44985 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44986 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44987 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44997 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44998 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44999 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-45000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45002 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45012 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-45012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45013 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45017 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-45018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45021 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45022 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45023 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-45026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45026 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45030 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46672 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46673 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46673 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46674 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46675 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L
* CVE-2024-46675 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-46675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46676 ( SUSE ): 2.4
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46676 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46679 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46679 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46687 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46687 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46693 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46695 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-46702 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L
* CVE-2024-46702 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46706 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46710 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-46717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46720 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46722 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46723 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46724 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46724 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46725 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46726 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46730 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46731 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46734 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46734 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46735 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46735 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( SUSE ): 7.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46737 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46737 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46738 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2024-46738 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46739 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-46739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46741 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46741 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46741 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46743 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46743 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46744 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46746 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46747 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-46747 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46749 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46749 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46750 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46750 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46752 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46753 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46755 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46756 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46756 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46757 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46757 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46757 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46758 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46758 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46758 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46759 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46759 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-46759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46760 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46760 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46761 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46774 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46780 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46780 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46781 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46783 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46786 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46786 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-46786 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46787 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46794 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-46794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-46797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46798 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 162 vulnerabilities, contains two features and has 50
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags
(bsc#1221610).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225487).
* CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900
(bsc#1230269).
* CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
* CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
* CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth
(bsc#1222629).
* CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len
bytes (bsc#1226606).
* CVE-2024-38596: af_unix: Fix data races in
unix_release_sock/unix_stream_sendmsg (bsc#1226846).
* CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer
(bsc#1227885).
* CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP
(bsc#1227890).
* CVE-2024-40983: tipc: force a dst refcount before doing decryption
(bsc#1227819).
* CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
* CVE-2024-42243: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray
(bsc#1229001).
* CVE-2024-42252: closures: Change BUG_ON() to WARN_ON() (bsc#1229004).
* CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from
mispredictions (bsc#1229334).
* CVE-2024-42294: block: fix deadlock between sd_remove & sd_release
(bsc#1229371).
* CVE-2024-42304: ext4: make sure the first directory block is not a hole
(bsc#1229364).
* CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir
indexed (bsc#1229363).
* CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer
(bsc#1229362).
* CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit
(bsc#1229394).
* CVE-2024-43832: s390/uv: Do not call folio_wait_writeback() without a folio
reference (bsc#1229380).
* CVE-2024-43845: udf: Fix bogus checksum computation in udf_rename()
(bsc#1229389).
* CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
* CVE-2024-43898: ext4: sanity check for NULL pointer after
ext4_force_shutdown (bsc#1229753).
* CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after
reassembling (bsc#1229790).
* CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock()
(bsc#1229810).
* CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate
expect ID (bsc#1229899).
* CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket
(bsc#1230015).
* CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special
register set (bsc#1230180).
* CVE-2024-44951: serial: sc16is7xx: fix TX fifo corruption (bsc#1230181).
* CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink
(bsc#1230209).
* CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in
bcm_sf2_mdio_register() (bsc#1230211).
* CVE-2024-44984: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
(bsc#1230240).
* CVE-2024-44985: ipv6: prevent possible UAF in ip6_xmit() (bsc#1230206).
* CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
* CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
* CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference
(bsc#1230193).
* CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok
(bsc#1230194).
* CVE-2024-44991: tcp: prevent concurrent execution of tcp_sk_exit_batch
(bsc#1230195).
* CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx()
(bsc#1230171).
* CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
* CVE-2024-45002: rtla/osnoise: Prevent NULL dereference in error handling
(bsc#1230169).
* CVE-2024-45003: Don't evict inode under the inode lru traversing context
(bsc#1230245).
* CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl()
(bsc#1230442).
* CVE-2024-45017: net/mlx5: Fix IPsec RoCE MPV trace call (bsc#1230430).
* CVE-2024-45018: netfilter: flowtable: initialise extack before use
(bsc#1230431).
* CVE-2024-45019: net/mlx5e: Take state lock during tx timeout reporter
(bsc#1230432).
* CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops
(bsc#1230434).
* CVE-2024-45022: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with
high order fallback to order 0 (bsc#1230435).
* CVE-2024-45023: md/raid1: Fix data corruption for degraded array with slow
disk (bsc#1230455).
* CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe
(bsc#1230451).
* CVE-2024-45030: igb: cope with large MAX_SKB_FRAGS (bsc#1230457).
* CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure
(bsc#1230506).
* CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
* CVE-2024-46679: ethtool: check device is present when getting link settings
(bsc#1230556).
* CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in
smb2_new_read_req() (bsc#1230517).
* CVE-2024-46687: btrfs: fix a use-after-free when hitting errors inside
btrfs_submit_chunk() (bsc#1230518).
* CVE-2024-46691: usb: typec: ucsi: Move unregister out of atomic section
(bsc#1230526).
* CVE-2024-46692: firmware: qcom: scm: Mark get_wq_ctx() as atomic call
(bsc#1230520).
* CVE-2024-46693: kABI workaround for soc-qcom pmic_glink changes
(bsc#1230521).
* CVE-2024-46710: drm/vmwgfx: Prevent unmapping active read buffers
(bsc#1230540).
* CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
* CVE-2024-46729: drm/amd/display: Fix incorrect size calculation for loop
(bsc#1230704).
* CVE-2024-46735: ublk_drv: fix NULL pointer dereference in
ublk_ctrl_start_recovery() (bsc#1230727).
* CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in
interrupt map walk (bsc#1230756).
* CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at
btrfs_lookup_extent_info() (bsc#1230786).
* CVE-2024-46752: btrfs: reduce nesting for extent processing at
btrfs_lookup_extent_info() (bsc#1230794).
* CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly
(bsc#1230796).
* CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used
(bsc#1230772).
* CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg()
(bsc#1230810).
* CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
* CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
* CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing
CPU entry (bsc#1231120).
The following non-security bugs were fixed:
* ABI: testing: fix admv8818 attr description (git-fixes).
* ACPI: CPPC: Add helper to get the highest performance value (stable-fixes).
* ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
* ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-
fixes).
* ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-
fixes).
* ACPI: processor: Return an error if acpi_processor_get_info() fails in
processor_add() (stable-fixes).
* ACPI: sysfs: validate return type of _STR method (git-fixes).
* ACPICA: Implement ACPI_WARNING_ONCE and ACPI_ERROR_ONCE (stable-fixes).
* ACPICA: executer/exsystem: Do not nag user about every Stall() violating the
spec (git-fixes).
* ALSA: control: Apply sanity check of input values for user elements (stable-
fixes).
* ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius
devices (stable-fixes).
* ALSA: hda/realtek - Fix inactive headset mic jack for ASUS Vivobook 15
X1504VAP (stable-fixes).
* ALSA: hda/realtek: Enable Mute Led for HP Victus 15-fb1xxx (stable-fixes).
* ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
* ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes).
* ALSA: hda/realtek: extend quirks for Clevo V5[46]0 (stable-fixes).
* ALSA: hda: Add input value sanity checks to HDMI channel map controls
(stable-fixes).
* ALSA: hda: add HDMI codec ID for Intel PTL (stable-fixes).
* ALSA: hda: cs35l41: fix module autoloading (git-fixes).
* ARM: 9406/1: Fix callchain_trace() return value (git-fixes).
* ASoC: Intel: soc-acpi-cht: Make Lenovo Yoga Tab 3 X90F DMI match less strict
(stable-fixes).
* ASoC: amd: yc: Add a quirk for MSI Bravo 17 (D7VEK) (stable-fixes).
* ASoC: codecs: avoid possible garbage value in peb2466_reg_read() (git-
fixes).
* ASoC: cs42l42: Convert comma to semicolon (git-fixes).
* ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
* ASoC: intel: fix module autoloading (stable-fixes).
* ASoC: meson: Remove unused declartion in header file (git-fixes).
* ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
* ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-
fixes).
* ASoC: rt5682s: Return devm_of_clk_add_hw_provider to transfer the error
(git-fixes).
* ASoC: soc-ac97: Fix the incorrect description (git-fixes).
* ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
* ASoC: tas2781-i2c: Get the right GPIO line (git-fixes).
* ASoC: tda7419: fix module autoloading (stable-fixes).
* ASoC: tegra: Fix CBB error during probe() (git-fixes).
* ASoC: topology: Properly initialize soc_enum values (stable-fixes).
* ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
* ASoc: TAS2781: replace beXX_to_cpup with get_unaligned_beXX for potentially
broken alignment (stable-fixes).
* Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
* Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush()
(stable-fixes).
* Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
* Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
* Bluetooth: hci_event: Use HCI error defines instead of magic values (stable-
fixes).
* Bluetooth: hci_sync: Add helper functions to manipulate cmd_sync queue
(stable-fixes).
* Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-
fixes).
* Detect memory allocation failure in annotated_source__alloc_histograms
(bsc#1227962).
* Documentation: ioctl: document 0x07 ioctl code (git-fixes).
* Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
* Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
* Drop soundwire patch that caused a regression (bsc#1230350)
* HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
* HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-
fixes).
* HID: multitouch: Add support for GT7868Q (stable-fixes).
* HID: wacom: Do not warn about dropped packets for first packet (git-fixes).
* HID: wacom: Support sequence numbers smaller than 16-bit (git-fixes).
* IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
* Input: adp5588-keys - fix check on return code (git-fixes).
* Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
* Input: ili210x - use kvmalloc() to allocate buffer for firmware update
(stable-fixes).
* Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
* Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
* Input: tsc2004/5 - do not hard code interrupt trigger (git-fixes).
* Input: tsc2004/5 - fix reset handling on probe (git-fixes).
* Input: tsc2004/5 - use device core to create driver-specific device
attributes (git-fixes).
* Input: uinput - reject requests with unreasonable number of slots (stable-
fixes).
* KEYS: prevent NULL pointer dereference in find_asymmetric_key() (git-fixes).
* KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is
missing (git-fixes).
* KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
(git-fixes).
* KVM: arm64: Block unsafe FF-A calls from the host (git-fixes).
* KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging
(git-fixes).
* KVM: arm64: Do not pass a TLBI level hint when zapping table entries (git-
fixes).
* KVM: arm64: Do not re-initialize the KVM lock (git-fixes).
* KVM: arm64: Invalidate EL1&0 TLB entries for all VMIDs in nvhe hyp init
(git-fixes).
* KVM: arm64: Make ICC_ _SGI_ _EL1 undef in the absence of a vGICv3 (git-
fixes).
* KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
(git-fixes).
* KVM: arm64: nvhe: Ignore SVE hint in SMCCC function ID (git-fixes).
* KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-
fixes).
* KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS (git-fixes).
* Move fixes into sorted section (bsc#1230119)
* Move s390 kabi patch into the kabi section
* NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
* NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
* NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
* NFSv4: Add missing rescheduling points in
nfs_client_return_marked_delegations (git-fixes).
* PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
* PCI: Wait for Link before restoring Downstream Buses (git-fixes).
* PCI: al: Check IORESOURCE_BUS existence during probe (stable-fixes).
* PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
* PCI: dra7xx: Fix threaded IRQ request for "dra7xx-pcie-main" IRQ (git-
fixes).
* PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
* PCI: imx6: Fix missing call to phy_power_off() in error handling (git-
fixes).
* PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-
fixes).
* PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
* PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() (git-fixes).
* PCI: qcom-ep: Enable controller resources like PHY only after refclk is
available (git-fixes).
* PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
* PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
* PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
* RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
* RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
* RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
* RDMA/erdma: Return QP state in erdma_query_qp (git-fixes)
* RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
* RDMA/hns: Fix 1bit-ECC recovery address in non-4K OS (git-fixes)
* RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 (git-fixes)
* RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-
fixes)
* RDMA/hns: Fix ah error counter in sw stat not increasing (git-fixes)
* RDMA/hns: Fix restricted __le16 degrades to integer issue (git-fixes)
* RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
* RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
* RDMA/hns: Optimize hem allocation performance (git-fixes)
* RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
* RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-
fixes)
* RDMA/mlx5: Drop redundant work canceling from clean_keys() (git-fixes)
* RDMA/mlx5: Fix MR cache temp entries cleanup (git-fixes)
* RDMA/mlx5: Fix counter update on MR cache mkey creation (git-fixes)
* RDMA/mlx5: Limit usage of over-sized mkeys from the MR cache (git-fixes)
* RDMA/mlx5: Obtain upper net device only when needed (git-fixes)
* RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
* RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-
fixes)
* Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
* Revert "Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE"
(git-fixes).
* Revert "PCI: Extend ACS configurability (bsc#1228090)." (bsc#1229019)
* Revert "drm/amdgpu: align pp_power_profile_mode with kernel docs" (stable-
fixes).
* Revert "media: tuners: fix error return code of
hybrid_tuner_request_state()" (git-fixes).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
(bsc#1230413)
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
(bsc#1230413)
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
(bsc#1230413)
* Split kabi part of dm_blk_ioctl-implement-path-failover-for-SG_IO.patch
* Squashfs: sanity check symbolic link size (git-fixes).
* USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
* USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
* USB: serial: option: add MeiG Smart SRM825L (git-fixes).
* USB: serial: option: add MeiG Smart SRM825L (stable-fixes).
* USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
* USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
* VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
(git-fixes).
* afs: Do not cross .backup mountpoint from backup volume (git-fixes).
* afs: Revert "afs: Hide silly-rename files from userspace" (git-fixes).
* arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
* arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
* arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
* arm64: dts: allwinner: h616: Add r_i2c pinctrl nodes (git-fixes).
* arm64: dts: exynos: exynos7885-jackpotlte: Correct RAM amount to 4GB (git-
fixes).
* arm64: dts: imx8-ss-dma: Fix adc0 closing brace location (git-fixes).
* arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-
fixes).
* arm64: dts: rockchip: Correct vendor prefix for Hardkernel ODROID-M1 (git-
fixes).
* arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency
(git-fixes).
* arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-
fixes).
* arm64: dts: rockchip: fix eMMC/SPI corruption when audio has been used on
RK3399 Puma (git-fixes).
* arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399
Puma (git-fixes).
* arm64: signal: Fix some under-bracketed UAPI macros (git-fixes).
* arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
* arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
* arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
* ata: libata-scsi: Fix ata_msense_control() CDL page reporting (git-fixes).
* ata: libata: Clear DID_TIME_OUT for ATA PT commands with sense data (git-
fixes).
* ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
* ata: pata_macio: Use WARN instead of BUG (stable-fixes).
* blk-mq: add helper for checking if one CPU is mapped to specified hctx
(bsc#1223600).
* blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
* bpf, events: Use prog to emit ksymbol event for main program (git-fixes).
* bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() (git-fixes).
* btrfs: fix race between direct IO write and fsync when using same fd (git-
fixes).
* btrfs: send: allow cloning non-aligned extent if it ends at i_size
(bsc#1230854).
* bus: integrator-lm: fix OF node leak in probe() (git-fixes).
* cachefiles: Fix non-taking of sb_writers around set/removexattr
(bsc#1231008).
* cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231183).
* can: bcm: Clear bo->bcm_proc_read after remove_proc_entry() (git-fixes).
* can: bcm: Remove proc entry when dev is unregistered (git-fixes).
* can: j1939: use correct function name in comment (git-fixes).
* can: kvaser_pciefd: Skip redundant NULL pointer check in ISR (stable-fixes).
* can: m_can: Release irq on error in m_can_open (git-fixes).
* can: m_can: enable NAPI before enabling interrupts (git-fixes).
* can: m_can: m_can_close(): stop clocks after device has been shut down (git-
fixes).
* can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-
fixes).
* can: mcp251xfd: clarify the meaning of timestamp (stable-fixes).
* can: mcp251xfd: fix ring configuration when switching from CAN-CC to CAN-FD
mode (git-fixes).
* can: mcp251xfd: mcp251xfd_handle_rxif_ring_uinc(): factor out in separate
function (stable-fixes).
* can: mcp251xfd: mcp251xfd_ring_init(): check TX-coalescing configuration
(stable-fixes).
* can: mcp251xfd: move mcp251xfd_timestamp_start()/stop() into
mcp251xfd_chip_start/stop() (stable-fixes).
* can: mcp251xfd: properly indent labels (stable-fixes).
* can: mcp251xfd: rx: add workaround for erratum DS80000789E 6 of mcp2518fd
(stable-fixes).
* can: mcp251xfd: rx: prepare to workaround broken RX FIFO head index erratum
(stable-fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
* cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (stable-
fixes).
* ceph: remove the incorrect Fw reference check when dirtying pages
(bsc#1231182).
* clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
* clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get()
(bsc#1227885).
* clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
* clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-
fixes).
* clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled
(git-fixes).
* clk: qcom: gcc-sc8280xp: do not use parking clk_ops for QUPs (git-fixes).
* clk: qcom: gcc-sm8550: Do not park the USB RCG at registration time (git-
fixes).
* clk: qcom: gcc-sm8550: Do not use parking clk_ops for QUPs (git-fixes).
* clk: qcom: ipq9574: Update the alpha PLL type for GPLLs (git-fixes).
* clk: ti: dra7-atl: Fix leak of of_nodes (git-fixes).
* clocksource/drivers/imx-tpm: Fix next event not taking effect sometime (git-
fixes).
* clocksource/drivers/imx-tpm: Fix return -ETIME when delta exceeds INT_MAX
(git-fixes).
* clocksource/drivers/qcom: Add missing iounmap() on errors in
msm_dt_timer_init() (git-fixes).
* cpufreq: amd-pstate: Enable amd-pstate preferred core support (stable-
fixes).
* cpufreq: amd-pstate: fix the highest frequency issue which limits
performance (git-fixes).
* cpufreq: scmi: Avoid overflow of target_freq in fast switch (stable-fixes).
* cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately
(git-fixes).
* crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure
(git-fixes).
* crypto: ccp - do not request interrupt on cmd completion when irqs disabled
(git-fixes).
* crypto: iaa - Fix potential use after free bug (git-fixes).
* crypto: qat - fix unintentional re-enabling of error interrupts (stable-
fixes).
* crypto: xor - fix template benchmarking (git-fixes).
* cxl/core: Fix incorrect vendor debug UUID define (git-fixes).
* cxl/pci: Fix to record only non-zero ranges (git-fixes).
* devres: Initialize an uninitialized struct member (stable-fixes).
* dma-buf: heaps: Fix off-by-one in CMA heap fault handler (git-fixes).
* dma-debug: avoid deadlock between dma debug vs printk and netconsole
(stable-fixes).
* dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor
(stable-fixes).
* dmaengine: altera-msgdma: use irq variant of spin_lock/unlock while invoking
callbacks (stable-fixes).
* driver core: Fix a potential null-ptr-deref in module_add_driver() (git-
fixes).
* driver core: Fix error handling in driver API device_rename() (git-fixes).
* driver: iio: add missing checks on iio_info's callback access (stable-
fixes).
* drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error
(git-fixes).
* drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error
(git-fixes).
* drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
* drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
* drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
* drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
* drm/amd/display: Add null check for set_output_gamma in
dcn30_set_output_transfer_func (git-fixes).
* drm/amd/display: Add null checks for 'stream' and 'plane' before
dereferencing (stable-fixes).
* drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
* drm/amd/display: Avoid overflow from uint32_t to uint8_t (stable-fixes).
* drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct()
(git-fixes).
* drm/amd/display: Check BIOS images before it is used (stable-fixes).
* drm/amd/display: Check HDCP returned status (stable-fixes).
* drm/amd/display: Check UnboundedRequestEnabled's value (stable-fixes).
* drm/amd/display: Check denominator pbn_div before used (stable-fixes).
* drm/amd/display: Check gpio_id before used as array index (stable-fixes).
* drm/amd/display: Check index for aux_rd_interval before using (stable-
fixes).
* drm/amd/display: Check msg_id before processing transcation (stable-fixes).
* drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]
(stable-fixes).
* drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
(stable-fixes).
* drm/amd/display: Defer handling mst up request in resume (stable-fixes).
* drm/amd/display: Disable error correction if it's not supported (stable-
fixes).
* drm/amd/display: Do not use fsleep for PSR exit waits on dmub replay
(stable-fixes).
* drm/amd/display: Ensure array index tg_inst won't be -1 (stable-fixes).
* drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
dal_gpio_service_create (stable-fixes).
* drm/amd/display: Fix Coverity INTEGER_OVERFLOW within
decide_fallback_link_setting_max_bw_policy (stable-fixes).
* drm/amd/display: Fix Coverity INTERGER_OVERFLOW within
construct_integrated_info (stable-fixes).
* drm/amd/display: Fix FEC_READY write on DP LT (stable-fixes).
* drm/amd/display: Fix index may exceed array range within
fpu_update_bw_bounding_box (stable-fixes).
* drm/amd/display: Fix pipe addition logic in calc_blocks_to_ungate DCN35
(stable-fixes).
* drm/amd/display: Handle the case which quad_part is equal 0 (stable-fixes).
* drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection
(stable-fixes).
* drm/amd/display: Replace dm_execute_dmub_cmd with
dc_wake_and_execute_dmub_cmd (git-fixes).
* drm/amd/display: Run DC_LOG_DC after checking link->link_enc (stable-fixes).
* drm/amd/display: Skip inactive planes within
ModeSupportAndSystemConfiguration (stable-fixes).
* drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-
fixes).
* drm/amd/display: Solve mst monitors blank out problem after resume (git-
fixes).
* drm/amd/display: Spinlock before reading event (stable-fixes).
* drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6
(stable-fixes).
* drm/amd/display: Wake DMCUB before sending a command for replay feature
(stable-fixes).
* drm/amd/display: added NULL check at start of dc_validate_stream (stable-
fixes).
* drm/amd/display: handle nulled pipe context in DCE110's set_drr() (git-
fixes).
* drm/amd/display: use preferred link settings for dp signal only (stable-
fixes).
* drm/amd/pm: Fix negative array index read (stable-fixes).
* drm/amd/pm: check negtive return for table entries (stable-fixes).
* drm/amd/pm: check specific index for aldebaran (stable-fixes).
* drm/amd/pm: check specific index for smu13 (stable-fixes).
* drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning (stable-fixes).
* drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-
fixes).
* drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-
fixes).
* drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-
fixes).
* drm/amd: Add gfx12 swizzle mode defs (stable-fixes).
* drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
* drm/amdgpu/display: handle gfx12 in amdgpu_dm_plane_format_mod_supported
(stable-fixes).
* drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy
SOCs (stable-fixes).
* drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-
fixes).
* drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
* drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
* drm/amdgpu/swsmu: always force a state reprogram on init (stable-fixes).
* drm/amdgpu: Fix get each xcp macro (git-fixes).
* drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
* drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
* drm/amdgpu: Fix smatch static checker warning (stable-fixes).
* drm/amdgpu: Fix the uninitialized variable warning (stable-fixes).
* drm/amdgpu: Fix the warning division or modulo by zero (stable-fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-
fixes).
* drm/amdgpu: Fix uninitialized variable warning in amdgpu_info_ioctl (stable-
fixes).
* drm/amdgpu: Handle sg size limit for contiguous allocation (stable-fixes).
* drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
* drm/amdgpu: add lock in amdgpu_gart_invalidate_tlb (stable-fixes).
* drm/amdgpu: add lock in kfd_process_dequeue_from_device (stable-fixes).
* drm/amdgpu: add missing error handling in function
amdgpu_gmc_flush_gpu_tlb_pasid (stable-fixes).
* drm/amdgpu: add skip_hw_access checks for sriov (stable-fixes).
* drm/amdgpu: align pp_power_profile_mode with kernel docs (stable-fixes).
* drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
* drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6
(stable-fixes).
* drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
* drm/amdgpu: fix a possible null pointer dereference (git-fixes).
* drm/amdgpu: fix contiguous handling for IB parsing v2 (git-fixes).
* drm/amdgpu: fix dereference after null check (stable-fixes).
* drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
* drm/amdgpu: fix overflowed array index read warning (stable-fixes).
* drm/amdgpu: fix overflowed constant warning in mmhub_set_clockgating()
(stable-fixes).
* drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
* drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
* drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
* drm/amdgpu: handle gfx12 in amdgpu_display_verify_sizes (stable-fixes).
* drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
* drm/amdgpu: reject gang submit on reserved VMIDs (stable-fixes).
* drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
* drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-
fixes).
* drm/amdgu: fix Unintentional integer overflow for mall size (stable-fixes).
* drm/amdkfd: Check debug trap enable before write dbg_ev_file (stable-fixes).
* drm/amdkfd: Reconcile the definition and use of oem_id in struct
kfd_topology_device (stable-fixes).
* drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid()
(git-fixes).
* drm/bridge: tc358767: Check if fully initialized before signalling HPD event
via IRQ (stable-fixes).
* drm/drm-bridge: Drop conditionals around of_node pointers (stable-fixes).
* drm/fb-helper: Do not schedule_work() to flush frame buffer during panic()
(stable-fixes).
* drm/gpuvm: fix missing dependency to DRM_EXEC (git-fixes).
* drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
* drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-
fixes).
* drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
* drm/i915: Do not attempt to load the GSC multiple times (git-fixes).
* drm/kfd: Correct pinned buffer handling at kfd restore and validate process
(stable-fixes).
* drm/mediatek: Set sensible cursor width/height values to fix crash (stable-
fixes).
* drm/mediatek: ovl_adaptor: Add missing of_node_put() (git-fixes).
* drm/meson: plane: Add error handling (stable-fixes).
* drm/msm/a5xx: disable preemption in submits by default (git-fixes).
* drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
* drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
* drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
* drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
* drm/msm/dsi: correct programming sequence for SM8350 / SM8450 (git-fixes).
* drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
* drm/msm: fix %s null argument error (git-fixes).
* drm/nouveau/fb: restore init() for ramgp102 (git-fixes).
* drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-
fixes).
* drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-
fixes).
* drm/radeon: properly handle vbios fake edid sizing (git-fixes).
* drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-
fixes).
* drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
* drm/rockchip: vop: clear DMA stop bit on RK3066 (git-fixes).
* drm/rockchip: vop: enable VOP_FEATURE_INTERNAL_RGB on RK3066 (git-fixes).
* drm/stm: Fix an error handling path in stm_drm_platform_probe() (git-fixes).
* drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
* drm/syncobj: Fix syncobj leak in drm_syncobj_eventfd_ioctl (git-fixes).
* drm/vc4: hdmi: Handle error case of pm_runtime_resume_and_get (git-fixes).
* drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
* drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
* drm: panel-orientation-quirks: Add quirk for Ayn Loki Max (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for Ayn Loki Zero (stable-fixes).
* drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
* ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() (git-fixes).
* erofs: fix incorrect symlink detection in fast symlink (git-fixes).
* exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
* fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
* firmware: arm_scmi: Fix double free in OPTEE transport (git-fixes).
* firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
* firmware_loader: Block path traversal (git-fixes).
* fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
(bsc#1230602).
* fuse: fix memory leak in fuse_create_open (bsc#1230124).
* fuse: update stats for pages in dropped aux writeback list (bsc#1230125).
* fuse: use unsigned type for getxattr/listxattr size truncation
(bsc#1230123).
* gpio: modepin: Enable module autoloading (git-fixes).
* gpio: rockchip: fix OF node leak in probe() (git-fixes).
* hwmon: (adc128d818) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (asus-ec-sensors) remove VRM temp X570-E GAMING (stable-fixes).
* hwmon: (k10temp) Check return value of amd_smn_read() (stable-fixes).
* hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-
fixes).
* hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
* hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
* hwmon: (pmbus) Conditionally clear individual status bits for pmbus rev >=
1.2 (git-fixes).
* hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
(stable-fixes).
* hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-
fixes).
* hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-
fixes).
* hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
* i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-
fixes).
* i2c: designware: fix controller is holding SCL low while ENABLE bit is
disabled (git-fixes).
* i2c: isch: Add missed 'else' (git-fixes).
* i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
* i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
* i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver
Due to Race Condition (git-fixes).
* i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-
fixes).
* iio: adc: ad7124: fix chip ID mismatch (git-fixes).
* iio: adc: ad7124: fix config comparison (git-fixes).
* iio: adc: ad7606: fix oversampling gpio array (git-fixes).
* iio: adc: ad7606: fix standby gpio state to match the documentation (git-
fixes).
* iio: adc: ad7606: remove frstdata check for serial mode (git-fixes).
* iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
* iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-
fixes).
* iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-
fixes).
* iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
* ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
* ipmi:ssif: Improve detecting during probing (bsc#1228771)
* ipmi:ssif: Improve detecting during probing (bsc#1228771) Move patch into
the sorted section.
* ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230206)
* jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
* kABI workaround for cros_ec stuff (git-fixes).
* kABI: Split kABI out of 'io_uring/kbuf: get rid of bl->is_ready'
* kABI: Split kABI out of 'io_uring: Re-add dummy_ubuf for kABI purposes'
* kABI: Split kABI out of io_uring/kbuf: protect io_buffer_list teardown with
a reference
* kabi: dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045,
bsc#1216776).
* kselftests: dmabuf-heaps: Ensure the driver name is null-terminated (stable-
fixes).
* kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
* leds: spi-byte: Call of_node_put() on error path (stable-fixes).
* lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (stable-
fixes).
* lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
* mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
* mailbox: rockchip: fix a typo in module autoloading (git-fixes).
* media: i2c: ar0521: Use cansleep version of gpiod_set_value() (git-fixes).
* media: ov5675: Fix power on/off delay timings (git-fixes).
* media: platform: rzg2l-cru: rzg2l-csi2: Add missing MODULE_DEVICE_TABLE
(git-fixes).
* media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
* media: qcom: camss: Remove use_count guard in stop_streaming (git-fixes).
* media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
* media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
* media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
* media: venus: fix use after free bug in venus_remove due to race condition
(git-fixes).
* media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
* media: vivid: do not set HDMI TX controls if there are no HDMI outputs
(stable-fixes).
* media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
* memory: mtk-smi: Use devm_clk_get_enabled() (git-fixes).
* memory: tegra186-emc: drop unused to_tegra186_emc() (git-fixes).
* minmax: reduce min/max macro expansion in atomisp driver (git-fixes).
* misc: fastrpc: Fix double free of 'buf' in error path (git-fixes).
* mmc: core: apply SD quirks earlier during probe (git-fixes).
* mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
* mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
* mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
* module: Fix KCOV-ignored file name (git-fixes).
* mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
* mtd: slram: insert break after errors in parsing the map (git-fixes).
* net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-
fixes).
* net: phy: Fix missing of_node_put() for leds (git-fixes).
* net: phy: vitesse: repair vsc73xx autonegotiation (stable-fixes).
* net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
* net: usb: qmi_wwan: add MeiG Smart SRM825L (stable-fixes).
* nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
* nilfs2: determine empty node blocks as corrupted (git-fixes).
* nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
* nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
* nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
* nilfs2: fix state management in error path of log writing function (git-
fixes).
* nilfs2: protect references to superblock parameters exposed in sysfs (git-
fixes).
* nouveau: fix the fwsec sb verification register (git-fixes).
* nvme-multipath: avoid hang on inaccessible namespaces (bsc#1228244).
* nvme-multipath: system fails to create generic nvme device (bsc#1228244).
* nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
* nvme-pci: allocate tagset on reset if necessary (git-fixes).
* nvme-tcp: fix link failure for TCP auth (git-fixes).
* nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
* nvme: clear caller pointer on identify failure (git-fixes).
* nvme: fix namespace removal list (git-fixes).
* nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
* nvmet-tcp: do not continue for invalid icreq (git-fixes).
* nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
* nvmet-trace: avoid dereferencing pointer too early (git-fixes).
* nvmet: Identify-Active Namespace ID List command should reject invalid nsid
(git-fixes).
* ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
* ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
* ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
* ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
* pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
* pcmcia: Use resource_size function on resource object (stable-fixes).
* perf annotate: Introduce global annotation_options (git-fixes).
* perf annotate: Split branch stack cycles information out of 'struct
annotation_line' (git-fixes).
* perf annotate: Use global annotation_options (git-fixes).
* perf arch events: Fix duplicate RISC-V SBI firmware event name (git-fixes).
* perf intel-pt: Fix aux_watermark calculation for 64-bit size (git-fixes).
* perf intel-pt: Fix exclude_guest setting (git-fixes).
* perf machine thread: Remove exited threads by default (git-fixes).
* perf maps: Move symbol maps functions to maps.c (git-fixes).
* perf pmu: Assume sysfs events are always the same case (git-fixes).
* perf pmus: Fixes always false when compare duplicates aliases (git-fixes).
* perf record: Lazy load kernel symbols (git-fixes).
* perf report: Convert to the global annotation_options (git-fixes).
* perf report: Fix condition in sort__sym_cmp() (git-fixes).
* perf stat: Fix the hard-coded metrics calculation on the hybrid (git-fixes).
* perf test: Make test_arm_callgraph_fp.sh more robust (git-fixes).
* perf tool: fix dereferencing NULL al->maps (git-fixes).
* perf tools: Add/use PMU reverse lookup from config to name (git-fixes).
* perf tools: Use pmus to describe type from attribute (git-fixes).
* perf top: Convert to the global annotation_options (git-fixes).
* perf/core: Fix missing wakeup when waiting for context reference (git-
fixes).
* perf/x86/intel/cstate: Add pkg C2 residency counter for Sierra Forest (git-
fixes).
* perf/x86/intel/cstate: Fix Alderlake/Raptorlake/Meteorlake (git-fixes).
* perf/x86/intel/ds: Fix non 0 retire latency on Raptorlake (git-fixes).
* perf/x86/intel/pt: Fix a topa_entry base address calculation (git-fixes).
* perf/x86/intel/pt: Fix pt_topa_entry_for_page() address calculation (git-
fixes).
* perf/x86/intel/pt: Fix topa_entry base length (git-fixes).
* perf/x86/intel/uncore: Fix the bits of the CHA extended umask for SPR (git-
fixes).
* perf/x86/intel/uncore: Support HBM and CXL PMON counters (bsc#1230119).
* perf/x86/intel: Add a distinct name for Granite Rapids (git-fixes).
* perf/x86/intel: Factor out the initialization code for SPR (git fixes).
* perf/x86/intel: Limit the period on Haswell (git-fixes).
* perf/x86/intel: Use the common uarch name for the shared functions (git
fixes).
* perf/x86/uncore: Apply the unit control RB tree to MMIO uncore units
(bsc#1230119).
* perf/x86/uncore: Apply the unit control RB tree to MSR uncore units
(bsc#1230119).
* perf/x86/uncore: Apply the unit control RB tree to PCI uncore units
(bsc#1230119).
* perf/x86/uncore: Cleanup unused unit structure (bsc#1230119).
* perf/x86/uncore: Retrieve the unit ID from the unit control RB tree
(bsc#1230119).
* perf/x86/uncore: Save the unit control address of all units (bsc#1230119).
* perf/x86/uncore: Support per PMU cpumask (bsc#1230119).
* perf/x86: Fix smp_processor_id()-in-preemptible warnings (git-fixes).
* perf/x86: Serialize set_attr_rdpmc() (git-fixes).
* perf: Fix default aux_watermark calculation (git-fixes).
* perf: Fix event leak upon exit (git-fixes).
* perf: Fix perf_aux_size() for greater-than 32-bit size (git-fixes).
* perf: Prevent passing zero nr_pages to rb_alloc_aux() (git-fixes).
* perf: script: add raw|disasm arguments to --insn-trace option (git-fixes).
* phy: zynqmp: Take the phy mutex in xlate (stable-fixes).
* pinctrl: at91: make it work with current gpiolib (stable-fixes).
* pinctrl: meteorlake: Add Arrow Lake-H/U ACPI ID (stable-fixes).
* pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
* platform/chrome: cros_ec_lpc: MEC access can use an AML mutex (stable-
fixes).
* platform/surface: aggregator_registry: Add Support for Surface Pro 10
(stable-fixes).
* platform/surface: aggregator_registry: Add support for Surface Laptop Go 3
(stable-fixes).
* platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
* platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array
(git-fixes).
* platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-
fixes).
* platform/x86: x86-android-tablets: Make Lenovo Yoga Tab 3 X90F DMI match
less strict (stable-fixes).
* power: supply: Drop use_cnt check from power_supply_property_is_writeable()
(git-fixes).
* power: supply: axp20x_battery: Remove design from min and max voltage (git-
fixes).
* power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
* power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense
(git-fixes).
* powercap/intel_rapl: Add support for AMD family 1Ah (stable-fixes).
* powerpc/qspinlock: Fix deadlock in MCS queue (bac#1230295 ltc#206656).
* pwm: xilinx: Fix u32 overflow issue in 32-bit width PWM mode (stable-fixes).
* r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
* regmap: maple: work around gcc-14.1 false-positive warning (stable-fixes).
* regmap: spi: Fix potential off-by-one when calculating reserved size
(stable-fixes).
* regulator: Return actual error in of_regulator_bulk_get_all() (git-fixes).
* regulator: core: Fix regulator_is_supported_voltage() kerneldoc return value
(git-fixes).
* regulator: core: Fix short description for _regulator_check_status_enabled()
(git-fixes).
* regulator: core: Stub devm_regulator_bulk_get_const() if !CONFIG_REGULATOR
(git-fixes).
* regulator: rt5120: Convert comma to semicolon (git-fixes).
* regulator: wm831x-isink: Convert comma to semicolon (git-fixes).
* remoteproc: imx_rproc: Correct ddr alias for i.MX8M (git-fixes).
* remoteproc: imx_rproc: Initialize workqueue earlier (git-fixes).
* remoteproc: k3-r5: Fix error handling when power-up failed (git-fixes).
* reset: berlin: fix OF node leak in probe() error path (git-fixes).
* reset: k210: fix OF node leak in probe() error path (git-fixes).
* resource: fix region_intersects() vs add_memory_driver_managed() (git-
fixes).
* rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY
gcc version dependent, at least on ppc
* rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
* s390/dasd: Fix redundant /proc/dasd* entries removal (bsc#1227694).
* s390/dasd: Remove DMA alignment (LTC#208933 bsc#1230426 git-fixes).
* s390/mm: Convert gmap_make_secure to use a folio (git-fixes bsc#1230562).
* s390/mm: Convert make_page_secure to use a folio (git-fixes bsc#1230563).
* s390: allow pte_offset_map_lock() to fail (git-fixes bsc#1230564).
* scripts: kconfig: merge_config: config files: add a trailing newline
(stable-fixes).
* scripts: sphinx-pre-install: remove unnecessary double check for
$cur_version (git-fixes).
* scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
* scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds
(bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Fix overflow build issue (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429
jsc#PED-9899).
* scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached
topology (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Remove redundant vport assignment when building an abort request
(bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429
jsc#PED-9899).
* scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429 jsc#PED-9899).
* scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata
paths (bsc#1229429 jsc#PED-9899).
* scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
(bsc#1223848).
* selftests: lib: remove strscpy test (git-fixes).
* selinux,smack: do not bypass permissions check in inode_setsecctx hook
(stable-fixes).
* soc: fsl: cpm1: tsa: Fix tsa_write8() (git-fixes).
* soc: versatile: integrator: fix OF node leak in probe() error path (git-
fixes).
* spi: atmel-quadspi: Avoid overwriting delay register settings (git-fixes).
* spi: atmel-quadspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: bcm63xx: Enable module autoloading (stable-fixes).
* spi: bcm63xx: Fix module autoloading (git-fixes).
* spi: meson-spicc: convert comma to semicolon (git-fixes).
* spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
* spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
* spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
* spi: rockchip: Resolve unbalanced runtime PM / system PM handling (git-
fixes).
* spi: rpc-if: Add missing MODULE_DEVICE_TABLE (git-fixes).
* spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
* spi: spidev: Add an entry for elgin,jg10309-01 (stable-fixes).
* spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
* staging: iio: frequency: ad9834: Validate frequency parameter value (git-
fixes).
* supported.conf: mark adiantum and xctr crypto modules as supported
(bsc#1231035)
* thunderbolt: Fix XDomain rx_lanes_show and tx_lanes_show (git-fixes).
* thunderbolt: Fix calculation of consumed USB3 bandwidth on a path (git-
fixes).
* thunderbolt: Fix rollback in tb_port_lane_bonding_enable() for lane 1 (git-
fixes).
* thunderbolt: There are only 5 basic router registers in pre-USB4 routers
(git-fixes).
* tomoyo: fallback to realpath if symlink's pathname does not exist (git-
fixes).
* tools/perf: Fix the string match for "/tmp/perf-$PID.map" files in dso__load
(git-fixes).
* tpm: Clean up TPM space after command failure (git-fixes).
* tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
* tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
* uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-
fixes).
* usb: cdnsp: Fix incorrect usb_request status (git-fixes).
* usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
* usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
* usb: dwc3: Avoid waking up gadget during startxfer (git-fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access (git-
fixes).
* usb: dwc3: core: Prevent USB core invalid event buffer address access
(stable-fixes).
* usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).
* usb: gadget: aspeed_udc: validate endpoint index for ast udc (stable-fixes).
* usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
* usb: typec: ucsi: Wait 20ms before reading CCI after a reset (git-fixes).
* usb: uas: set host status byte on data completion error (stable-fixes).
* usbip: Do not submit special requests twice (stable-fixes).
* usbnet: ipheth: add CDC NCM support (git-fixes).
* usbnet: ipheth: do not stop RX on failing RX callback (git-fixes).
* usbnet: ipheth: drop RX URBs with no payload (git-fixes).
* usbnet: ipheth: fix carrier detection in modes 1 and 4 (git-fixes).
* usbnet: ipheth: fix risk of NULL pointer deallocation (git-fixes).
* usbnet: ipheth: race between ipheth_close and error handling (stable-fixes).
* usbnet: ipheth: remove extraneous rx URB length check (git-fixes).
* usbnet: ipheth: transmit URBs without trailing padding (git-fixes).
* usbnet: modern method to get random MAC (git-fixes).
* virtio-net: synchronize probe with ndo_set_features (git-fixes).
* virtio_net: Fix napi_skb_cache_put warning (git-fixes).
* virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
* watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
* wifi: ath11k: initialize 'ret' in ath11k_qmi_load_file_target_mem() (stable-
fixes).
* wifi: ath12k: fix BSS chan info request WMI command (git-fixes).
* wifi: ath12k: fix firmware crash due to invalid peer nss (stable-fixes).
* wifi: ath12k: fix invalid AMPDU factor calculation in
ath12k_peer_assoc_h_he() (git-fixes).
* wifi: ath12k: fix uninitialize symbol error on ath12k_peer_assoc_h_he()
(stable-fixes).
* wifi: ath12k: initialize 'ret' in ath12k_dp_rxdma_ring_sel_config_wcn7850()
(stable-fixes).
* wifi: ath12k: initialize 'ret' in ath12k_qmi_load_file_target_mem() (stable-
fixes).
* wifi: ath12k: match WMI BSS chan info structure with firmware definition
(git-fixes).
* wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
* wifi: brcmfmac: introducing fwil query functions (git-fixes).
* wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
* wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
* wifi: cfg80211: fix bug of mapping AF3x to incorrect User Priority (git-
fixes).
* wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-
fixes).
* wifi: cfg80211: make hash table duplicates more survivable (stable-fixes).
* wifi: cfg80211: restrict operation during radar detection (stable-fixes).
* wifi: iwlwifi: clear trans->state earlier upon error (stable-fixes).
* wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
* wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (stable-
fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_max_scan_ie_fw_cmd_room() (stable-fixes).
* wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
* wifi: iwlwifi: mvm: increase the time between ranging measurements (git-
fixes).
* wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (stable-fixes).
* wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check (stable-fixes).
* wifi: mac80211: check ieee80211_bss_info_change_notify() against MLD
(stable-fixes).
* wifi: mac80211: do not use rate mask for offchannel TX either (git-fixes).
* wifi: mac80211: fix the comeback long retry times (git-fixes).
* wifi: mac80211: free skb on error path in ieee80211_beacon_get_ap() (stable-
fixes).
* wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-
fixes).
* wifi: mt76: connac: fix checksum offload fields of connac3 RXD (git-fixes).
* wifi: mt76: mt7603: fix mixed declarations and code (git-fixes).
* wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7915: fix oops on non-dbdc mt7986 (git-fixes).
* wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-
fixes).
* wifi: mt76: mt7921: Check devm_kasprintf() returned value (git-fixes).
* wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change
(stable-fixes).
* wifi: mt76: mt7921: fix wrong UNII-4 freq range check for the channel usage
(git-fixes).
* wifi: mt76: mt7925: fix a potential array-index-out-of-bounds issue for clc
(git-fixes).
* wifi: mt76: mt7996: fix EHT beamforming capability check (git-fixes).
* wifi: mt76: mt7996: fix HE and EHT beamforming capabilities (git-fixes).
* wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he
(git-fixes).
* wifi: mt76: mt7996: fix traffic delay when switching back to working channel
(git-fixes).
* wifi: mt76: mt7996: fix uninitialized TLV data (git-fixes).
* wifi: mt76: mt7996: fix wmm set of station interface to 3 (git-fixes).
* wifi: mt76: mt7996: use hweight16 to get correct tx antenna (git-fixes).
* wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
(stable-fixes).
* wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
* wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
* wifi: rtw88: remove CPT execution branch never used (git-fixes).
* wifi: rtw88: usb: schedule rx work after everything is set up (stable-
fixes).
* wifi: rtw89: ser: avoid multiple deinit on same CAM (stable-fixes).
* wifi: rtw89: wow: prevent to send unexpected H2C during download Firmware
(stable-fixes).
* wifi: wilc1000: fix potential RCU dereference issue in
wilc_parse_join_bss_param (git-fixes).
* x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
* x86/kaslr: Expose and use the end of the physical memory address space
(bsc#1229443).
* x86/kexec: Add EFI config table identity mapping for kexec kernel
(bsc#1220382).
* x86/mm/ident_map: Use gbpages only where full GB page should be mapped
(bsc#1220382).
* x86/mm: Use lookup_address_in_pgd_attr() in show_fault_oops() (bsc#1221527).
* x86/pat: Fix W^X violation false-positives when running as Xen PV guest
(bsc#1221527).
* x86/pat: Introduce lookup_address_in_pgd_attr() (bsc#1221527).
* x86/pat: Restructure _lookup_address_cpa() (bsc#1221527).
* xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
* xen/swiotlb: fix allocated size (git-fixes).
* xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
* xen: allow mapping ACPI data using a different physical address
(bsc#1226003).
* xen: introduce generic helper checking for memory map conflicts
(bsc#1226003).
* xen: move checks for e820 conflicts further up (bsc#1226003).
* xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
* xen: tolerate ACPI NVS memory overlapping with Xen allocated memory
(bsc#1226003).
* xen: use correct end address of kernel for conflict checking (bsc#1226003).
* xfs: restrict when we try to align cow fork delalloc to cowextsz hints (git-
fixes).
* xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-
fixes).
* xz: cleanup CRC32 edits from 2018 (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3551=1 SUSE-2024-3551=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2024-3551=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64)
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-debuginfo-6.4.0-150600.8.14.1
* kernel-syms-azure-6.4.0-150600.8.14.1
* ocfs2-kmp-azure-6.4.0-150600.8.14.1
* reiserfs-kmp-azure-6.4.0-150600.8.14.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.14.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.14.1
* cluster-md-kmp-azure-6.4.0-150600.8.14.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-optional-6.4.0-150600.8.14.1
* kernel-azure-extra-6.4.0-150600.8.14.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.14.1
* dlm-kmp-azure-6.4.0-150600.8.14.1
* kernel-azure-livepatch-devel-6.4.0-150600.8.14.1
* kselftests-kmp-azure-6.4.0-150600.8.14.1
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-devel-6.4.0-150600.8.14.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.14.1
* gfs2-kmp-azure-6.4.0-150600.8.14.1
* kernel-azure-debugsource-6.4.0-150600.8.14.1
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.14.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.14.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-vdso-6.4.0-150600.8.14.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.14.1
* kernel-source-azure-6.4.0-150600.8.14.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.14.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-azure-devel-6.4.0-150600.8.14.1
* kernel-azure-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.14.1
* kernel-azure-debugsource-6.4.0-150600.8.14.1
* kernel-syms-azure-6.4.0-150600.8.14.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.14.1
* kernel-source-azure-6.4.0-150600.8.14.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52610.html
* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52915.html
* https://www.suse.com/security/cve/CVE-2023-52916.html
* https://www.suse.com/security/cve/CVE-2024-26640.html
* https://www.suse.com/security/cve/CVE-2024-26759.html
* https://www.suse.com/security/cve/CVE-2024-26804.html
* https://www.suse.com/security/cve/CVE-2024-36953.html
* https://www.suse.com/security/cve/CVE-2024-38538.html
* https://www.suse.com/security/cve/CVE-2024-38596.html
* https://www.suse.com/security/cve/CVE-2024-38632.html
* https://www.suse.com/security/cve/CVE-2024-40965.html
* https://www.suse.com/security/cve/CVE-2024-40973.html
* https://www.suse.com/security/cve/CVE-2024-40983.html
* https://www.suse.com/security/cve/CVE-2024-42154.html
* https://www.suse.com/security/cve/CVE-2024-42243.html
* https://www.suse.com/security/cve/CVE-2024-42252.html
* https://www.suse.com/security/cve/CVE-2024-42265.html
* https://www.suse.com/security/cve/CVE-2024-42294.html
* https://www.suse.com/security/cve/CVE-2024-42304.html
* https://www.suse.com/security/cve/CVE-2024-42305.html
* https://www.suse.com/security/cve/CVE-2024-42306.html
* https://www.suse.com/security/cve/CVE-2024-43828.html
* https://www.suse.com/security/cve/CVE-2024-43832.html
* https://www.suse.com/security/cve/CVE-2024-43835.html
* https://www.suse.com/security/cve/CVE-2024-43845.html
* https://www.suse.com/security/cve/CVE-2024-43870.html
* https://www.suse.com/security/cve/CVE-2024-43890.html
* https://www.suse.com/security/cve/CVE-2024-43898.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43914.html
* https://www.suse.com/security/cve/CVE-2024-44935.html
* https://www.suse.com/security/cve/CVE-2024-44944.html
* https://www.suse.com/security/cve/CVE-2024-44946.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://www.suse.com/security/cve/CVE-2024-44948.html
* https://www.suse.com/security/cve/CVE-2024-44950.html
* https://www.suse.com/security/cve/CVE-2024-44951.html
* https://www.suse.com/security/cve/CVE-2024-44952.html
* https://www.suse.com/security/cve/CVE-2024-44954.html
* https://www.suse.com/security/cve/CVE-2024-44960.html
* https://www.suse.com/security/cve/CVE-2024-44961.html
* https://www.suse.com/security/cve/CVE-2024-44962.html
* https://www.suse.com/security/cve/CVE-2024-44965.html
* https://www.suse.com/security/cve/CVE-2024-44967.html
* https://www.suse.com/security/cve/CVE-2024-44969.html
* https://www.suse.com/security/cve/CVE-2024-44970.html
* https://www.suse.com/security/cve/CVE-2024-44971.html
* https://www.suse.com/security/cve/CVE-2024-44977.html
* https://www.suse.com/security/cve/CVE-2024-44982.html
* https://www.suse.com/security/cve/CVE-2024-44984.html
* https://www.suse.com/security/cve/CVE-2024-44985.html
* https://www.suse.com/security/cve/CVE-2024-44986.html
* https://www.suse.com/security/cve/CVE-2024-44987.html
* https://www.suse.com/security/cve/CVE-2024-44988.html
* https://www.suse.com/security/cve/CVE-2024-44989.html
* https://www.suse.com/security/cve/CVE-2024-44990.html
* https://www.suse.com/security/cve/CVE-2024-44991.html
* https://www.suse.com/security/cve/CVE-2024-44997.html
* https://www.suse.com/security/cve/CVE-2024-44998.html
* https://www.suse.com/security/cve/CVE-2024-44999.html
* https://www.suse.com/security/cve/CVE-2024-45000.html
* https://www.suse.com/security/cve/CVE-2024-45001.html
* https://www.suse.com/security/cve/CVE-2024-45002.html
* https://www.suse.com/security/cve/CVE-2024-45003.html
* https://www.suse.com/security/cve/CVE-2024-45005.html
* https://www.suse.com/security/cve/CVE-2024-45006.html
* https://www.suse.com/security/cve/CVE-2024-45007.html
* https://www.suse.com/security/cve/CVE-2024-45008.html
* https://www.suse.com/security/cve/CVE-2024-45011.html
* https://www.suse.com/security/cve/CVE-2024-45012.html
* https://www.suse.com/security/cve/CVE-2024-45013.html
* https://www.suse.com/security/cve/CVE-2024-45015.html
* https://www.suse.com/security/cve/CVE-2024-45017.html
* https://www.suse.com/security/cve/CVE-2024-45018.html
* https://www.suse.com/security/cve/CVE-2024-45019.html
* https://www.suse.com/security/cve/CVE-2024-45020.html
* https://www.suse.com/security/cve/CVE-2024-45021.html
* https://www.suse.com/security/cve/CVE-2024-45022.html
* https://www.suse.com/security/cve/CVE-2024-45023.html
* https://www.suse.com/security/cve/CVE-2024-45026.html
* https://www.suse.com/security/cve/CVE-2024-45028.html
* https://www.suse.com/security/cve/CVE-2024-45029.html
* https://www.suse.com/security/cve/CVE-2024-45030.html
* https://www.suse.com/security/cve/CVE-2024-46672.html
* https://www.suse.com/security/cve/CVE-2024-46673.html
* https://www.suse.com/security/cve/CVE-2024-46674.html
* https://www.suse.com/security/cve/CVE-2024-46675.html
* https://www.suse.com/security/cve/CVE-2024-46676.html
* https://www.suse.com/security/cve/CVE-2024-46677.html
* https://www.suse.com/security/cve/CVE-2024-46679.html
* https://www.suse.com/security/cve/CVE-2024-46685.html
* https://www.suse.com/security/cve/CVE-2024-46686.html
* https://www.suse.com/security/cve/CVE-2024-46687.html
* https://www.suse.com/security/cve/CVE-2024-46689.html
* https://www.suse.com/security/cve/CVE-2024-46691.html
* https://www.suse.com/security/cve/CVE-2024-46692.html
* https://www.suse.com/security/cve/CVE-2024-46693.html
* https://www.suse.com/security/cve/CVE-2024-46694.html
* https://www.suse.com/security/cve/CVE-2024-46695.html
* https://www.suse.com/security/cve/CVE-2024-46702.html
* https://www.suse.com/security/cve/CVE-2024-46706.html
* https://www.suse.com/security/cve/CVE-2024-46707.html
* https://www.suse.com/security/cve/CVE-2024-46709.html
* https://www.suse.com/security/cve/CVE-2024-46710.html
* https://www.suse.com/security/cve/CVE-2024-46714.html
* https://www.suse.com/security/cve/CVE-2024-46715.html
* https://www.suse.com/security/cve/CVE-2024-46716.html
* https://www.suse.com/security/cve/CVE-2024-46717.html
* https://www.suse.com/security/cve/CVE-2024-46719.html
* https://www.suse.com/security/cve/CVE-2024-46720.html
* https://www.suse.com/security/cve/CVE-2024-46722.html
* https://www.suse.com/security/cve/CVE-2024-46723.html
* https://www.suse.com/security/cve/CVE-2024-46724.html
* https://www.suse.com/security/cve/CVE-2024-46725.html
* https://www.suse.com/security/cve/CVE-2024-46726.html
* https://www.suse.com/security/cve/CVE-2024-46728.html
* https://www.suse.com/security/cve/CVE-2024-46729.html
* https://www.suse.com/security/cve/CVE-2024-46730.html
* https://www.suse.com/security/cve/CVE-2024-46731.html
* https://www.suse.com/security/cve/CVE-2024-46732.html
* https://www.suse.com/security/cve/CVE-2024-46734.html
* https://www.suse.com/security/cve/CVE-2024-46735.html
* https://www.suse.com/security/cve/CVE-2024-46737.html
* https://www.suse.com/security/cve/CVE-2024-46738.html
* https://www.suse.com/security/cve/CVE-2024-46739.html
* https://www.suse.com/security/cve/CVE-2024-46741.html
* https://www.suse.com/security/cve/CVE-2024-46743.html
* https://www.suse.com/security/cve/CVE-2024-46744.html
* https://www.suse.com/security/cve/CVE-2024-46745.html
* https://www.suse.com/security/cve/CVE-2024-46746.html
* https://www.suse.com/security/cve/CVE-2024-46747.html
* https://www.suse.com/security/cve/CVE-2024-46749.html
* https://www.suse.com/security/cve/CVE-2024-46750.html
* https://www.suse.com/security/cve/CVE-2024-46751.html
* https://www.suse.com/security/cve/CVE-2024-46752.html
* https://www.suse.com/security/cve/CVE-2024-46753.html
* https://www.suse.com/security/cve/CVE-2024-46755.html
* https://www.suse.com/security/cve/CVE-2024-46756.html
* https://www.suse.com/security/cve/CVE-2024-46757.html
* https://www.suse.com/security/cve/CVE-2024-46758.html
* https://www.suse.com/security/cve/CVE-2024-46759.html
* https://www.suse.com/security/cve/CVE-2024-46760.html
* https://www.suse.com/security/cve/CVE-2024-46761.html
* https://www.suse.com/security/cve/CVE-2024-46767.html
* https://www.suse.com/security/cve/CVE-2024-46771.html
* https://www.suse.com/security/cve/CVE-2024-46772.html
* https://www.suse.com/security/cve/CVE-2024-46773.html
* https://www.suse.com/security/cve/CVE-2024-46774.html
* https://www.suse.com/security/cve/CVE-2024-46776.html
* https://www.suse.com/security/cve/CVE-2024-46778.html
* https://www.suse.com/security/cve/CVE-2024-46780.html
* https://www.suse.com/security/cve/CVE-2024-46781.html
* https://www.suse.com/security/cve/CVE-2024-46783.html
* https://www.suse.com/security/cve/CVE-2024-46784.html
* https://www.suse.com/security/cve/CVE-2024-46786.html
* https://www.suse.com/security/cve/CVE-2024-46787.html
* https://www.suse.com/security/cve/CVE-2024-46791.html
* https://www.suse.com/security/cve/CVE-2024-46794.html
* https://www.suse.com/security/cve/CVE-2024-46797.html
* https://www.suse.com/security/cve/CVE-2024-46798.html
* https://www.suse.com/security/cve/CVE-2024-46822.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1183045
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1216223
* https://bugzilla.suse.com/show_bug.cgi?id=1216776
* https://bugzilla.suse.com/show_bug.cgi?id=1220382
* https://bugzilla.suse.com/show_bug.cgi?id=1221527
* https://bugzilla.suse.com/show_bug.cgi?id=1221610
* https://bugzilla.suse.com/show_bug.cgi?id=1221650
* https://bugzilla.suse.com/show_bug.cgi?id=1222629
* https://bugzilla.suse.com/show_bug.cgi?id=1223600
* https://bugzilla.suse.com/show_bug.cgi?id=1223848
* https://bugzilla.suse.com/show_bug.cgi?id=1225487
* https://bugzilla.suse.com/show_bug.cgi?id=1225812
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226003
* https://bugzilla.suse.com/show_bug.cgi?id=1226507
* https://bugzilla.suse.com/show_bug.cgi?id=1226606
* https://bugzilla.suse.com/show_bug.cgi?id=1226666
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1226860
* https://bugzilla.suse.com/show_bug.cgi?id=1227487
* https://bugzilla.suse.com/show_bug.cgi?id=1227694
* https://bugzilla.suse.com/show_bug.cgi?id=1227726
* https://bugzilla.suse.com/show_bug.cgi?id=1227819
* https://bugzilla.suse.com/show_bug.cgi?id=1227885
* https://bugzilla.suse.com/show_bug.cgi?id=1227890
* https://bugzilla.suse.com/show_bug.cgi?id=1227962
* https://bugzilla.suse.com/show_bug.cgi?id=1228090
* https://bugzilla.suse.com/show_bug.cgi?id=1228140
* https://bugzilla.suse.com/show_bug.cgi?id=1228244
* https://bugzilla.suse.com/show_bug.cgi?id=1228507
* https://bugzilla.suse.com/show_bug.cgi?id=1228771
* https://bugzilla.suse.com/show_bug.cgi?id=1229001
* https://bugzilla.suse.com/show_bug.cgi?id=1229004
* https://bugzilla.suse.com/show_bug.cgi?id=1229019
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229167
* https://bugzilla.suse.com/show_bug.cgi?id=1229169
* https://bugzilla.suse.com/show_bug.cgi?id=1229289
* https://bugzilla.suse.com/show_bug.cgi?id=1229334
* https://bugzilla.suse.com/show_bug.cgi?id=1229362
* https://bugzilla.suse.com/show_bug.cgi?id=1229363
* https://bugzilla.suse.com/show_bug.cgi?id=1229364
* https://bugzilla.suse.com/show_bug.cgi?id=1229371
* https://bugzilla.suse.com/show_bug.cgi?id=1229380
* https://bugzilla.suse.com/show_bug.cgi?id=1229389
* https://bugzilla.suse.com/show_bug.cgi?id=1229394
* https://bugzilla.suse.com/show_bug.cgi?id=1229429
* https://bugzilla.suse.com/show_bug.cgi?id=1229443
* https://bugzilla.suse.com/show_bug.cgi?id=1229452
* https://bugzilla.suse.com/show_bug.cgi?id=1229455
* https://bugzilla.suse.com/show_bug.cgi?id=1229456
* https://bugzilla.suse.com/show_bug.cgi?id=1229494
* https://bugzilla.suse.com/show_bug.cgi?id=1229585
* https://bugzilla.suse.com/show_bug.cgi?id=1229753
* https://bugzilla.suse.com/show_bug.cgi?id=1229764
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229790
* https://bugzilla.suse.com/show_bug.cgi?id=1229810
* https://bugzilla.suse.com/show_bug.cgi?id=1229899
* https://bugzilla.suse.com/show_bug.cgi?id=1229928
* https://bugzilla.suse.com/show_bug.cgi?id=1230015
* https://bugzilla.suse.com/show_bug.cgi?id=1230119
* https://bugzilla.suse.com/show_bug.cgi?id=1230123
* https://bugzilla.suse.com/show_bug.cgi?id=1230124
* https://bugzilla.suse.com/show_bug.cgi?id=1230125
* https://bugzilla.suse.com/show_bug.cgi?id=1230169
* https://bugzilla.suse.com/show_bug.cgi?id=1230170
* https://bugzilla.suse.com/show_bug.cgi?id=1230171
* https://bugzilla.suse.com/show_bug.cgi?id=1230173
* https://bugzilla.suse.com/show_bug.cgi?id=1230174
* https://bugzilla.suse.com/show_bug.cgi?id=1230175
* https://bugzilla.suse.com/show_bug.cgi?id=1230176
* https://bugzilla.suse.com/show_bug.cgi?id=1230178
* https://bugzilla.suse.com/show_bug.cgi?id=1230180
* https://bugzilla.suse.com/show_bug.cgi?id=1230181
* https://bugzilla.suse.com/show_bug.cgi?id=1230185
* https://bugzilla.suse.com/show_bug.cgi?id=1230191
* https://bugzilla.suse.com/show_bug.cgi?id=1230192
* https://bugzilla.suse.com/show_bug.cgi?id=1230193
* https://bugzilla.suse.com/show_bug.cgi?id=1230194
* https://bugzilla.suse.com/show_bug.cgi?id=1230195
* https://bugzilla.suse.com/show_bug.cgi?id=1230200
* https://bugzilla.suse.com/show_bug.cgi?id=1230204
* https://bugzilla.suse.com/show_bug.cgi?id=1230206
* https://bugzilla.suse.com/show_bug.cgi?id=1230207
* https://bugzilla.suse.com/show_bug.cgi?id=1230209
* https://bugzilla.suse.com/show_bug.cgi?id=1230211
* https://bugzilla.suse.com/show_bug.cgi?id=1230213
* https://bugzilla.suse.com/show_bug.cgi?id=1230217
* https://bugzilla.suse.com/show_bug.cgi?id=1230221
* https://bugzilla.suse.com/show_bug.cgi?id=1230224
* https://bugzilla.suse.com/show_bug.cgi?id=1230230
* https://bugzilla.suse.com/show_bug.cgi?id=1230232
* https://bugzilla.suse.com/show_bug.cgi?id=1230233
* https://bugzilla.suse.com/show_bug.cgi?id=1230240
* https://bugzilla.suse.com/show_bug.cgi?id=1230244
* https://bugzilla.suse.com/show_bug.cgi?id=1230245
* https://bugzilla.suse.com/show_bug.cgi?id=1230247
* https://bugzilla.suse.com/show_bug.cgi?id=1230248
* https://bugzilla.suse.com/show_bug.cgi?id=1230269
* https://bugzilla.suse.com/show_bug.cgi?id=1230270
* https://bugzilla.suse.com/show_bug.cgi?id=1230295
* https://bugzilla.suse.com/show_bug.cgi?id=1230340
* https://bugzilla.suse.com/show_bug.cgi?id=1230350
* https://bugzilla.suse.com/show_bug.cgi?id=1230413
* https://bugzilla.suse.com/show_bug.cgi?id=1230426
* https://bugzilla.suse.com/show_bug.cgi?id=1230430
* https://bugzilla.suse.com/show_bug.cgi?id=1230431
* https://bugzilla.suse.com/show_bug.cgi?id=1230432
* https://bugzilla.suse.com/show_bug.cgi?id=1230433
* https://bugzilla.suse.com/show_bug.cgi?id=1230434
* https://bugzilla.suse.com/show_bug.cgi?id=1230435
* https://bugzilla.suse.com/show_bug.cgi?id=1230440
* https://bugzilla.suse.com/show_bug.cgi?id=1230441
* https://bugzilla.suse.com/show_bug.cgi?id=1230442
* https://bugzilla.suse.com/show_bug.cgi?id=1230444
* https://bugzilla.suse.com/show_bug.cgi?id=1230450
* https://bugzilla.suse.com/show_bug.cgi?id=1230451
* https://bugzilla.suse.com/show_bug.cgi?id=1230454
* https://bugzilla.suse.com/show_bug.cgi?id=1230455
* https://bugzilla.suse.com/show_bug.cgi?id=1230457
* https://bugzilla.suse.com/show_bug.cgi?id=1230459
* https://bugzilla.suse.com/show_bug.cgi?id=1230506
* https://bugzilla.suse.com/show_bug.cgi?id=1230507
* https://bugzilla.suse.com/show_bug.cgi?id=1230511
* https://bugzilla.suse.com/show_bug.cgi?id=1230515
* https://bugzilla.suse.com/show_bug.cgi?id=1230517
* https://bugzilla.suse.com/show_bug.cgi?id=1230518
* https://bugzilla.suse.com/show_bug.cgi?id=1230519
* https://bugzilla.suse.com/show_bug.cgi?id=1230520
* https://bugzilla.suse.com/show_bug.cgi?id=1230521
* https://bugzilla.suse.com/show_bug.cgi?id=1230524
* https://bugzilla.suse.com/show_bug.cgi?id=1230526
* https://bugzilla.suse.com/show_bug.cgi?id=1230533
* https://bugzilla.suse.com/show_bug.cgi?id=1230535
* https://bugzilla.suse.com/show_bug.cgi?id=1230539
* https://bugzilla.suse.com/show_bug.cgi?id=1230540
* https://bugzilla.suse.com/show_bug.cgi?id=1230549
* https://bugzilla.suse.com/show_bug.cgi?id=1230556
* https://bugzilla.suse.com/show_bug.cgi?id=1230562
* https://bugzilla.suse.com/show_bug.cgi?id=1230563
* https://bugzilla.suse.com/show_bug.cgi?id=1230564
* https://bugzilla.suse.com/show_bug.cgi?id=1230580
* https://bugzilla.suse.com/show_bug.cgi?id=1230582
* https://bugzilla.suse.com/show_bug.cgi?id=1230589
* https://bugzilla.suse.com/show_bug.cgi?id=1230602
* https://bugzilla.suse.com/show_bug.cgi?id=1230699
* https://bugzilla.suse.com/show_bug.cgi?id=1230700
* https://bugzilla.suse.com/show_bug.cgi?id=1230701
* https://bugzilla.suse.com/show_bug.cgi?id=1230702
* https://bugzilla.suse.com/show_bug.cgi?id=1230703
* https://bugzilla.suse.com/show_bug.cgi?id=1230704
* https://bugzilla.suse.com/show_bug.cgi?id=1230705
* https://bugzilla.suse.com/show_bug.cgi?id=1230706
* https://bugzilla.suse.com/show_bug.cgi?id=1230709
* https://bugzilla.suse.com/show_bug.cgi?id=1230711
* https://bugzilla.suse.com/show_bug.cgi?id=1230712
* https://bugzilla.suse.com/show_bug.cgi?id=1230715
* https://bugzilla.suse.com/show_bug.cgi?id=1230719
* https://bugzilla.suse.com/show_bug.cgi?id=1230722
* https://bugzilla.suse.com/show_bug.cgi?id=1230724
* https://bugzilla.suse.com/show_bug.cgi?id=1230725
* https://bugzilla.suse.com/show_bug.cgi?id=1230726
* https://bugzilla.suse.com/show_bug.cgi?id=1230727
* https://bugzilla.suse.com/show_bug.cgi?id=1230730
* https://bugzilla.suse.com/show_bug.cgi?id=1230731
* https://bugzilla.suse.com/show_bug.cgi?id=1230732
* https://bugzilla.suse.com/show_bug.cgi?id=1230747
* https://bugzilla.suse.com/show_bug.cgi?id=1230748
* https://bugzilla.suse.com/show_bug.cgi?id=1230749
* https://bugzilla.suse.com/show_bug.cgi?id=1230751
* https://bugzilla.suse.com/show_bug.cgi?id=1230752
* https://bugzilla.suse.com/show_bug.cgi?id=1230753
* https://bugzilla.suse.com/show_bug.cgi?id=1230756
* https://bugzilla.suse.com/show_bug.cgi?id=1230761
* https://bugzilla.suse.com/show_bug.cgi?id=1230766
* https://bugzilla.suse.com/show_bug.cgi?id=1230767
* https://bugzilla.suse.com/show_bug.cgi?id=1230768
* https://bugzilla.suse.com/show_bug.cgi?id=1230771
* https://bugzilla.suse.com/show_bug.cgi?id=1230772
* https://bugzilla.suse.com/show_bug.cgi?id=1230775
* https://bugzilla.suse.com/show_bug.cgi?id=1230776
* https://bugzilla.suse.com/show_bug.cgi?id=1230780
* https://bugzilla.suse.com/show_bug.cgi?id=1230783
* https://bugzilla.suse.com/show_bug.cgi?id=1230786
* https://bugzilla.suse.com/show_bug.cgi?id=1230787
* https://bugzilla.suse.com/show_bug.cgi?id=1230791
* https://bugzilla.suse.com/show_bug.cgi?id=1230794
* https://bugzilla.suse.com/show_bug.cgi?id=1230796
* https://bugzilla.suse.com/show_bug.cgi?id=1230802
* https://bugzilla.suse.com/show_bug.cgi?id=1230806
* https://bugzilla.suse.com/show_bug.cgi?id=1230808
* https://bugzilla.suse.com/show_bug.cgi?id=1230809
* https://bugzilla.suse.com/show_bug.cgi?id=1230810
* https://bugzilla.suse.com/show_bug.cgi?id=1230812
* https://bugzilla.suse.com/show_bug.cgi?id=1230813
* https://bugzilla.suse.com/show_bug.cgi?id=1230814
* https://bugzilla.suse.com/show_bug.cgi?id=1230815
* https://bugzilla.suse.com/show_bug.cgi?id=1230821
* https://bugzilla.suse.com/show_bug.cgi?id=1230825
* https://bugzilla.suse.com/show_bug.cgi?id=1230830
* https://bugzilla.suse.com/show_bug.cgi?id=1230831
* https://bugzilla.suse.com/show_bug.cgi?id=1230854
* https://bugzilla.suse.com/show_bug.cgi?id=1230948
* https://bugzilla.suse.com/show_bug.cgi?id=1231008
* https://bugzilla.suse.com/show_bug.cgi?id=1231035
* https://bugzilla.suse.com/show_bug.cgi?id=1231120
* https://bugzilla.suse.com/show_bug.cgi?id=1231146
* https://bugzilla.suse.com/show_bug.cgi?id=1231182
* https://bugzilla.suse.com/show_bug.cgi?id=1231183
* https://jira.suse.com/browse/PED-10954
* https://jira.suse.com/browse/PED-9899
1
0
08 Oct '24
# Security update for pgadmin4
Announcement ID: SUSE-SU-2024:3552-1
Release Date: 2024-10-08T15:04:35Z
Rating: moderate
References:
* bsc#1223868
Cross-References:
* CVE-2024-4216
CVSS scores:
* CVE-2024-4216 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* Python 3 Module 15-SP6
* Server Applications Module 15-SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for pgadmin4 fixes the following issues:
* CVE-2024-4216: Fixed XSS in /settings/store endpoint (bsc#1223868)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3552=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3552=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3552=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3552=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* pgadmin4-debuginfo-4.30-150300.3.15.1
* pgadmin4-4.30-150300.3.15.1
* openSUSE Leap 15.3 (noarch)
* pgadmin4-doc-4.30-150300.3.15.1
* pgadmin4-web-4.30-150300.3.15.1
* pgadmin4-web-uwsgi-4.30-150300.3.15.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.15.1
* pgadmin4-4.30-150300.3.15.1
* openSUSE Leap 15.5 (noarch)
* pgadmin4-doc-4.30-150300.3.15.1
* pgadmin4-web-4.30-150300.3.15.1
* pgadmin4-web-uwsgi-4.30-150300.3.15.1
* Python 3 Module 15-SP6 (noarch)
* pgadmin4-doc-4.30-150300.3.15.1
* pgadmin4-web-4.30-150300.3.15.1
* Python 3 Module 15-SP6 (s390x)
* pgadmin4-debuginfo-4.30-150300.3.15.1
* pgadmin4-4.30-150300.3.15.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.15.1
* pgadmin4-4.30-150300.3.15.1
* Server Applications Module 15-SP5 (noarch)
* pgadmin4-doc-4.30-150300.3.15.1
* pgadmin4-web-4.30-150300.3.15.1
## References:
* https://www.suse.com/security/cve/CVE-2024-4216.html
* https://bugzilla.suse.com/show_bug.cgi?id=1223868
1
0
# Security update for Mesa
Announcement ID: SUSE-SU-2024:3540-1
Release Date: 2024-10-08T08:30:31Z
Rating: moderate
References:
* bsc#1222040
* bsc#1222041
* bsc#1222042
Cross-References:
* CVE-2023-45913
* CVE-2023-45919
* CVE-2023-45922
CVSS scores:
* CVE-2023-45913 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-45919 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H
* CVE-2023-45922 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for Mesa fixes the following issues:
* CVE-2023-45913: Fixed NULL pointer dereference via
dri2GetGlxDrawableFromXDrawableId() (bsc#1222040)
* CVE-2023-45919: Fixed buffer over-read in glXQueryServerString()
(bsc#1222041)
* CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute()
(bsc#1222042)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3540=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3540=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3540=1 openSUSE-SLE-15.6-2024-3540=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3540=1
## Package List:
* SUSE Package Hub 15 15-SP6 (x86_64)
* libOSMesa8-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-debugsource-23.3.4-150600.83.3.1
* libOSMesa8-32bit-23.3.4-150600.83.3.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* Mesa-dri-nouveau-23.3.4-150600.83.3.1
* Mesa-dri-nouveau-debuginfo-23.3.4-150600.83.3.1
* libvdpau_nouveau-debuginfo-23.3.4-150600.83.3.1
* Mesa-drivers-debugsource-23.3.4-150600.83.3.1
* libvdpau_nouveau-23.3.4-150600.83.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libgbm-devel-23.3.4-150600.83.3.1
* Mesa-libglapi0-23.3.4-150600.83.3.1
* libOSMesa8-23.3.4-150600.83.3.1
* Mesa-libglapi-devel-23.3.4-150600.83.3.1
* Mesa-drivers-debugsource-23.3.4-150600.83.3.1
* libOSMesa8-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-23.3.4-150600.83.3.1
* Mesa-libGL-devel-23.3.4-150600.83.3.1
* Mesa-devel-23.3.4-150600.83.3.1
* Mesa-KHR-devel-23.3.4-150600.83.3.1
* Mesa-debugsource-23.3.4-150600.83.3.1
* Mesa-libGLESv1_CM-devel-23.3.4-150600.83.3.1
* Mesa-dri-23.3.4-150600.83.3.1
* libgbm1-23.3.4-150600.83.3.1
* Mesa-dri-devel-23.3.4-150600.83.3.1
* Mesa-libGLESv3-devel-23.3.4-150600.83.3.1
* Mesa-libEGL-devel-23.3.4-150600.83.3.1
* Mesa-23.3.4-150600.83.3.1
* Mesa-dri-debuginfo-23.3.4-150600.83.3.1
* Mesa-libglapi0-debuginfo-23.3.4-150600.83.3.1
* libOSMesa-devel-23.3.4-150600.83.3.1
* Mesa-libGLESv2-devel-23.3.4-150600.83.3.1
* libgbm1-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-debuginfo-23.3.4-150600.83.3.1
* Mesa-libEGL1-23.3.4-150600.83.3.1
* Mesa-libEGL1-debuginfo-23.3.4-150600.83.3.1
* openSUSE Leap 15.6 (x86_64)
* Mesa-libEGL-devel-32bit-23.3.4-150600.83.3.1
* Mesa-libGL1-32bit-debuginfo-23.3.4-150600.83.3.1
* libOSMesa8-32bit-23.3.4-150600.83.3.1
* Mesa-vulkan-overlay-32bit-debuginfo-23.3.4-150600.83.3.1
* libvulkan_radeon-32bit-23.3.4-150600.83.3.1
* Mesa-libd3d-32bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_radeonsi-32bit-23.3.4-150600.83.3.1
* Mesa-dri-32bit-23.3.4-150600.83.3.1
* Mesa-libglapi0-32bit-23.3.4-150600.83.3.1
* libvulkan_radeon-32bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_r600-32bit-23.3.4-150600.83.3.1
* libgbm1-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libd3d-devel-32bit-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGLESv1_CM-devel-32bit-23.3.4-150600.83.3.1
* Mesa-dri-32bit-debuginfo-23.3.4-150600.83.3.1
* libvulkan_intel-32bit-23.3.4-150600.83.3.1
* Mesa-dri-nouveau-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-32bit-23.3.4-150600.83.3.1
* libvdpau_nouveau-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libEGL1-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-32bit-23.3.4-150600.83.3.1
* Mesa-libGLESv2-devel-32bit-23.3.4-150600.83.3.1
* Mesa-vulkan-overlay-32bit-23.3.4-150600.83.3.1
* Mesa-gallium-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libEGL1-32bit-23.3.4-150600.83.3.1
* Mesa-libglapi0-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-gallium-32bit-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-32bit-23.3.4-150600.83.3.1
* Mesa-libglapi-devel-32bit-23.3.4-150600.83.3.1
* libOSMesa8-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libd3d-32bit-23.3.4-150600.83.3.1
* Mesa-dri-nouveau-32bit-23.3.4-150600.83.3.1
* Mesa-libGL-devel-32bit-23.3.4-150600.83.3.1
* libvdpau_nouveau-32bit-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-32bit-23.3.4-150600.83.3.1
* libvdpau_radeonsi-32bit-debuginfo-23.3.4-150600.83.3.1
* libgbm-devel-32bit-23.3.4-150600.83.3.1
* libvdpau_r600-32bit-debuginfo-23.3.4-150600.83.3.1
* libvulkan_intel-32bit-debuginfo-23.3.4-150600.83.3.1
* libOSMesa-devel-32bit-23.3.4-150600.83.3.1
* libgbm1-32bit-23.3.4-150600.83.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64 i586)
* Mesa-dri-nouveau-23.3.4-150600.83.3.1
* libvdpau_r600-debuginfo-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-debuginfo-23.3.4-150600.83.3.1
* Mesa-gallium-debuginfo-23.3.4-150600.83.3.1
* libxatracker2-1.0.0-150600.83.3.1
* libvdpau_radeonsi-23.3.4-150600.83.3.1
* Mesa-gallium-23.3.4-150600.83.3.1
* Mesa-dri-nouveau-debuginfo-23.3.4-150600.83.3.1
* libvdpau_nouveau-debuginfo-23.3.4-150600.83.3.1
* libxatracker2-debuginfo-1.0.0-150600.83.3.1
* Mesa-libOpenCL-debuginfo-23.3.4-150600.83.3.1
* libvdpau_r600-23.3.4-150600.83.3.1
* Mesa-libva-debuginfo-23.3.4-150600.83.3.1
* Mesa-libva-23.3.4-150600.83.3.1
* libvdpau_radeonsi-debuginfo-23.3.4-150600.83.3.1
* libvdpau_nouveau-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-23.3.4-150600.83.3.1
* Mesa-libOpenCL-23.3.4-150600.83.3.1
* libxatracker-devel-1.0.0-150600.83.3.1
* openSUSE Leap 15.6 (x86_64 i586)
* Mesa-libd3d-23.3.4-150600.83.3.1
* libvulkan_intel-debuginfo-23.3.4-150600.83.3.1
* Mesa-libd3d-debuginfo-23.3.4-150600.83.3.1
* Mesa-libd3d-devel-23.3.4-150600.83.3.1
* libvulkan_intel-23.3.4-150600.83.3.1
* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* Mesa-vulkan-overlay-23.3.4-150600.83.3.1
* libvulkan_radeon-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-23.3.4-150600.83.3.1
* Mesa-vulkan-overlay-debuginfo-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-debuginfo-23.3.4-150600.83.3.1
* libvulkan_lvp-23.3.4-150600.83.3.1
* libvulkan_lvp-debuginfo-23.3.4-150600.83.3.1
* libvulkan_radeon-debuginfo-23.3.4-150600.83.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* Mesa-vulkan-device-select-64bit-23.3.4-150600.83.3.1
* Mesa-libEGL1-64bit-23.3.4-150600.83.3.1
* libvdpau_radeonsi-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-64bit-23.3.4-150600.83.3.1
* Mesa-libglapi0-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-64bit-23.3.4-150600.83.3.1
* Mesa-dri-nouveau-64bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGLESv1_CM-devel-64bit-23.3.4-150600.83.3.1
* Mesa-libglapi-devel-64bit-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-64bit-debuginfo-23.3.4-150600.83.3.1
* libOSMesa-devel-64bit-23.3.4-150600.83.3.1
* Mesa-libGL1-64bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_r600-64bit-23.3.4-150600.83.3.1
* libgbm1-64bit-23.3.4-150600.83.3.1
* Mesa-libGL-devel-64bit-23.3.4-150600.83.3.1
* libvulkan_radeon-64bit-23.3.4-150600.83.3.1
* libvdpau_r600-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-dri-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-dri-vc4-64bit-23.3.4-150600.83.3.1
* libOSMesa8-64bit-debuginfo-23.3.4-150600.83.3.1
* libgbm-devel-64bit-23.3.4-150600.83.3.1
* Mesa-libEGL1-64bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-64bit-23.3.4-150600.83.3.1
* Mesa-vulkan-overlay-64bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_radeonsi-64bit-23.3.4-150600.83.3.1
* Mesa-dri-nouveau-64bit-23.3.4-150600.83.3.1
* libgbm1-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-vulkan-overlay-64bit-23.3.4-150600.83.3.1
* libvulkan_radeon-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-dri-vc4-64bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_nouveau-64bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_nouveau-64bit-23.3.4-150600.83.3.1
* Mesa-gallium-64bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGLESv2-devel-64bit-23.3.4-150600.83.3.1
* Mesa-libEGL-devel-64bit-23.3.4-150600.83.3.1
* Mesa-dri-64bit-23.3.4-150600.83.3.1
* Mesa-gallium-64bit-23.3.4-150600.83.3.1
* libOSMesa8-64bit-23.3.4-150600.83.3.1
* Mesa-libglapi0-64bit-23.3.4-150600.83.3.1
* openSUSE Leap 15.6 (aarch64)
* libvulkan_freedreno-debuginfo-23.3.4-150600.83.3.1
* libvulkan_broadcom-23.3.4-150600.83.3.1
* libvulkan_broadcom-debuginfo-23.3.4-150600.83.3.1
* Mesa-dri-vc4-debuginfo-23.3.4-150600.83.3.1
* libvulkan_freedreno-23.3.4-150600.83.3.1
* Mesa-dri-vc4-23.3.4-150600.83.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libgbm-devel-23.3.4-150600.83.3.1
* Mesa-libglapi0-23.3.4-150600.83.3.1
* libOSMesa8-23.3.4-150600.83.3.1
* Mesa-libglapi-devel-23.3.4-150600.83.3.1
* Mesa-drivers-debugsource-23.3.4-150600.83.3.1
* libOSMesa8-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-23.3.4-150600.83.3.1
* Mesa-libGL-devel-23.3.4-150600.83.3.1
* Mesa-devel-23.3.4-150600.83.3.1
* Mesa-KHR-devel-23.3.4-150600.83.3.1
* Mesa-debugsource-23.3.4-150600.83.3.1
* Mesa-libGLESv1_CM-devel-23.3.4-150600.83.3.1
* Mesa-dri-23.3.4-150600.83.3.1
* libgbm1-23.3.4-150600.83.3.1
* Mesa-dri-devel-23.3.4-150600.83.3.1
* Mesa-libGLESv3-devel-23.3.4-150600.83.3.1
* Mesa-libEGL-devel-23.3.4-150600.83.3.1
* Mesa-23.3.4-150600.83.3.1
* Mesa-dri-debuginfo-23.3.4-150600.83.3.1
* Mesa-libglapi0-debuginfo-23.3.4-150600.83.3.1
* libOSMesa-devel-23.3.4-150600.83.3.1
* Mesa-libGLESv2-devel-23.3.4-150600.83.3.1
* libgbm1-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-debuginfo-23.3.4-150600.83.3.1
* Mesa-libEGL1-23.3.4-150600.83.3.1
* Mesa-libEGL1-debuginfo-23.3.4-150600.83.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* libvdpau_r600-debuginfo-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-debuginfo-23.3.4-150600.83.3.1
* Mesa-gallium-debuginfo-23.3.4-150600.83.3.1
* Mesa-gallium-23.3.4-150600.83.3.1
* libxatracker2-debuginfo-1.0.0-150600.83.3.1
* libvdpau_r600-23.3.4-150600.83.3.1
* Mesa-libva-debuginfo-23.3.4-150600.83.3.1
* Mesa-libva-23.3.4-150600.83.3.1
* libvdpau_virtio_gpu-23.3.4-150600.83.3.1
* libxatracker2-1.0.0-150600.83.3.1
* libxatracker-devel-1.0.0-150600.83.3.1
* Basesystem Module 15-SP6 (aarch64 x86_64)
* Mesa-vulkan-overlay-23.3.4-150600.83.3.1
* libvulkan_radeon-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-23.3.4-150600.83.3.1
* Mesa-vulkan-overlay-debuginfo-23.3.4-150600.83.3.1
* Mesa-vulkan-device-select-debuginfo-23.3.4-150600.83.3.1
* libvulkan_lvp-23.3.4-150600.83.3.1
* libvulkan_lvp-debuginfo-23.3.4-150600.83.3.1
* libvulkan_radeon-debuginfo-23.3.4-150600.83.3.1
* Basesystem Module 15-SP6 (x86_64)
* Mesa-libd3d-23.3.4-150600.83.3.1
* libvulkan_intel-debuginfo-23.3.4-150600.83.3.1
* Mesa-libd3d-debuginfo-23.3.4-150600.83.3.1
* Mesa-gallium-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libGL1-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libEGL1-32bit-23.3.4-150600.83.3.1
* Mesa-libglapi0-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-gallium-32bit-23.3.4-150600.83.3.1
* Mesa-libd3d-devel-23.3.4-150600.83.3.1
* Mesa-dri-32bit-debuginfo-23.3.4-150600.83.3.1
* libvulkan_intel-23.3.4-150600.83.3.1
* libgbm1-32bit-debuginfo-23.3.4-150600.83.3.1
* libvdpau_radeonsi-debuginfo-23.3.4-150600.83.3.1
* Mesa-dri-32bit-23.3.4-150600.83.3.1
* Mesa-32bit-23.3.4-150600.83.3.1
* libvdpau_radeonsi-23.3.4-150600.83.3.1
* Mesa-libEGL1-32bit-debuginfo-23.3.4-150600.83.3.1
* Mesa-libglapi0-32bit-23.3.4-150600.83.3.1
* Mesa-libGL1-32bit-23.3.4-150600.83.3.1
* libgbm1-32bit-23.3.4-150600.83.3.1
## References:
* https://www.suse.com/security/cve/CVE-2023-45913.html
* https://www.suse.com/security/cve/CVE-2023-45919.html
* https://www.suse.com/security/cve/CVE-2023-45922.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222040
* https://bugzilla.suse.com/show_bug.cgi?id=1222041
* https://bugzilla.suse.com/show_bug.cgi?id=1222042
1
0
SUSE-RU-2024:3539-1: moderate: Recommended update for obs-service-docker_label_helper
by OPENSUSE-UPDATES 08 Oct '24
by OPENSUSE-UPDATES 08 Oct '24
08 Oct '24
# Recommended update for obs-service-docker_label_helper
Announcement ID: SUSE-RU-2024:3539-1
Release Date: 2024-10-08T06:06:58Z
Rating: moderate
References:
* bsc#1225985
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for obs-service-docker_label_helper fixes the following issues:
* Support Docker.FLAVOR in _multibuild (bsc#1225985).
* Handle LABEL statements with any whitespace and LABEL values containing "="
properly.
* Do not ever use "%setup -n ." and use "%setup -c" instead, which creates the
appropriate %{name}-%{version} directory expected.
* Avoid mangling whitespace by using gsub instead of assigning to fields
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3539=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3539=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3539=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3539=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3539=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3539=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3539=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3539=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3539=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3539=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3539=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3539=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* openSUSE Leap 15.6 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* Containers Module 15-SP5 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* Containers Module 15-SP6 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
* SUSE Enterprise Storage 7.1 (noarch)
* obs-service-docker_label_helper-0.0-150200.5.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1225985
1
0
07 Oct '24
# Security update for redis7
Announcement ID: SUSE-SU-2024:3537-1
Release Date: 2024-10-07T12:16:21Z
Rating: important
References:
* bsc#1231264
* bsc#1231265
* bsc#1231266
Cross-References:
* CVE-2024-31227
* CVE-2024-31228
* CVE-2024-31449
CVSS scores:
* CVE-2024-31227 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for redis7 fixes the following issues:
* CVE-2024-31227: Fixed parsing issue leading to denail of service
(bsc#1231266)
* CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265)
* CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3537=1 openSUSE-SLE-15.6-2024-3537=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3537=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* redis7-7.0.8-150600.8.3.1
* redis7-debuginfo-7.0.8-150600.8.3.1
* redis7-debugsource-7.0.8-150600.8.3.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* redis7-7.0.8-150600.8.3.1
* redis7-debuginfo-7.0.8-150600.8.3.1
* redis7-debugsource-7.0.8-150600.8.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31227.html
* https://www.suse.com/security/cve/CVE-2024-31228.html
* https://www.suse.com/security/cve/CVE-2024-31449.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231264
* https://bugzilla.suse.com/show_bug.cgi?id=1231265
* https://bugzilla.suse.com/show_bug.cgi?id=1231266
1
0
07 Oct '24
# Security update for mozjs115
Announcement ID: SUSE-SU-2024:3538-1
Release Date: 2024-10-07T12:16:42Z
Rating: moderate
References:
* bsc#1230036
* bsc#1230037
* bsc#1230038
Cross-References:
* CVE-2024-45490
* CVE-2024-45491
* CVE-2024-45492
CVSS scores:
* CVE-2024-45490 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45491 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45492 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for mozjs115 fixes the following issues:
* CVE-2024-45490: Fixed negative len for XML_ParseBuffer in embedded expat
(bnc#1230036)
* CVE-2024-45491: Fixed integer overflow in dtdCopy in embedded expat
(bnc#1230037)
* CVE-2024-45492: Fixed integer overflow in function nextScaffoldPart in
embedded expat (bnc#1230038)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3538=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3538=1 openSUSE-SLE-15.6-2024-3538=1
## Package List:
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mozjs115-debugsource-115.4.0-150600.3.3.1
* libmozjs-115-0-115.4.0-150600.3.3.1
* mozjs115-debuginfo-115.4.0-150600.3.3.1
* mozjs115-devel-115.4.0-150600.3.3.1
* libmozjs-115-0-debuginfo-115.4.0-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i686)
* mozjs115-debugsource-115.4.0-150600.3.3.1
* libmozjs-115-0-115.4.0-150600.3.3.1
* mozjs115-debuginfo-115.4.0-150600.3.3.1
* mozjs115-115.4.0-150600.3.3.1
* mozjs115-devel-115.4.0-150600.3.3.1
* libmozjs-115-0-debuginfo-115.4.0-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-45490.html
* https://www.suse.com/security/cve/CVE-2024-45491.html
* https://www.suse.com/security/cve/CVE-2024-45492.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230036
* https://bugzilla.suse.com/show_bug.cgi?id=1230037
* https://bugzilla.suse.com/show_bug.cgi?id=1230038
1
0
openSUSE-SU-2024:0326-1: important: Security update for opera
by opensuse-securityďĽ opensuse.org 07 Oct '24
by opensuse-securityďĽ opensuse.org 07 Oct '24
07 Oct '24
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0326-1
Rating: important
References:
Cross-References: CVE-2024-8636 CVE-2024-8637 CVE-2024-8638
CVE-2024-8639
Affected Products:
openSUSE Leap 15.5:NonFree
openSUSE Leap 15.6:NonFree
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for opera fixes the following issues:
Opera was updated to 114.0.5282.21
* CHR-9843 Update Chromium on desktop-stable-128-5282 to 128.0.6613.138
* DNA-118381 Corrupted extension should be repaired automatically
* DNA-118423 Crash on exit at opera::VideoPopoutDetachController
::OnTabStripModelChanged
* DNA-118480 Crash when closing tab from island's tooltip with
double-click on X button
* DNA-118586 Translations for O114
* DNA-118605 [Beta 114] [WinLin] Saved bookmarks have hover effect on
the bookmarks bar
* DNA-118736 Crash at opera::SyncLoginHelper::GetMenuItemString after
clicking "O" menu
* DNA-118822 Promote 114 to stable
- Complete Opera 114 changelog at:
https://blogs.opera.com/desktop/changelog-for-114
- The update to chromium 128.0.6613.138 fixes following issues:
CVE-2024-8636, CVE-2024-8637, CVE-2024-8638, CVE-2024-8639
- Update to 113.0.5230.132
* DNA-117554 Checkboxes in Sidebar setup are not visible in light theme
* DNA-117952 Crash at opera::component_based::ComponentTabBar::
~ComponentTabBar
* DNA-118311 When pinning a tab from a tab island, it pins 'separately'
from other pinned tabs
* DNA-118661 Crash at opera::component_based::ComponentTabGroup
::~ComponentTabGroup
* DNA-118688 Crash when opening o-menu with logged in anonymous hidden
account
* DNA-118732 IsLoggedIn should return false for unset type
* DNA-118736 Crash at opera::SyncLoginHelper::GetMenuItemString after
clicking "O" menu
* DNA-118782 Enable calling Aria via API by clicking on masthead banner
* DNA-118796 Crash at blink::DocumentRulePredicate::
Parse(blink::JSONObject*, blink::KURL const&, blink::
ExecutionContext*, blink::ExceptionState&, WTF::String*)
- Update to 113.0.5230.86
* DNA-115191 BookmarkModelMerger::Merge() blocks UI thread on sync start
* DNA-117744 Missing downloads in easy files window when image copied to
clipboard
* DNA-118016 Event of enabling/disabling extension
- Changes in 113.0.5230.62
* DNA-118382 Crash at (anonymous namespace)::ProfileErrorCallback
- Update to 113.0.5230.47
* DNA-115901 Crash when canceling drag and drop tab between windows
* DNA-118200 Crash at
opera::flow::FlowSessionImpl::GetPairingUrl
* DNA-118271 Miniplayer shows only icons to stop, play next or previous
song
* DNA-118297 Crash at views::Widget::GetWindowBoundsInScreen
* DNA-118300 [startpage] click on link with target = blank opens page
without visible tab
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.6:NonFree:
zypper in -t patch openSUSE-2024-326=1
- openSUSE Leap 15.5:NonFree:
zypper in -t patch openSUSE-2024-326=1
Package List:
- openSUSE Leap 15.6:NonFree (x86_64):
opera-114.0.5282.21-lp156.2.20.1
- openSUSE Leap 15.5:NonFree (x86_64):
opera-114.0.5282.21-lp155.3.63.1
References:
https://www.suse.com/security/cve/CVE-2024-8636.html
https://www.suse.com/security/cve/CVE-2024-8637.html
https://www.suse.com/security/cve/CVE-2024-8638.html
https://www.suse.com/security/cve/CVE-2024-8639.html
1
0
openSUSE-SU-2024:0327-1: important: Security update for chromium
by opensuse-securityďĽ opensuse.org 07 Oct '24
by opensuse-securityďĽ opensuse.org 07 Oct '24
07 Oct '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0327-1
Rating: important
References: #1231232
Cross-References: CVE-2024-7025 CVE-2024-9369 CVE-2024-9370
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 129.0.6668.89 (stable released 2024-09-24) (boo#1231232)
* CVE-2024-7025: Integer overflow in Layout
* CVE-2024-9369: Insufficient data validation in Mojo
* CVE-2024-9370: Inappropriate implementation in V8
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-327=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-327=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-129.0.6668.89-bp156.2.35.1
chromedriver-debuginfo-129.0.6668.89-bp156.2.35.1
chromium-129.0.6668.89-bp156.2.35.1
chromium-debuginfo-129.0.6668.89-bp156.2.35.1
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
chromedriver-129.0.6668.89-bp155.2.123.1
chromium-129.0.6668.89-bp155.2.123.1
References:
https://www.suse.com/security/cve/CVE-2024-7025.html
https://www.suse.com/security/cve/CVE-2024-9369.html
https://www.suse.com/security/cve/CVE-2024-9370.html
https://bugzilla.suse.com/1231232
1
0
# Security update for redis
Announcement ID: SUSE-SU-2024:3535-1
Release Date: 2024-10-07T08:53:19Z
Rating: important
References:
* bsc#1231264
* bsc#1231265
* bsc#1231266
Cross-References:
* CVE-2024-31227
* CVE-2024-31228
* CVE-2024-31449
CVSS scores:
* CVE-2024-31227 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-31228 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31449 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for redis fixes the following issues:
* CVE-2024-31227: Fixed parsing issue leading to denail of service
(bsc#1231266)
* CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265)
* CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3535=1 SUSE-2024-3535=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3535=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* redis-7.2.4-150600.3.3.1
* redis-debuginfo-7.2.4-150600.3.3.1
* redis-debugsource-7.2.4-150600.3.3.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* redis-7.2.4-150600.3.3.1
* redis-debuginfo-7.2.4-150600.3.3.1
* redis-debugsource-7.2.4-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-31227.html
* https://www.suse.com/security/cve/CVE-2024-31228.html
* https://www.suse.com/security/cve/CVE-2024-31449.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231264
* https://bugzilla.suse.com/show_bug.cgi?id=1231265
* https://bugzilla.suse.com/show_bug.cgi?id=1231266
1
0
07 Oct '24
# Recommended update for dehydrated
Announcement ID: SUSE-RU-2024:3534-1
Release Date: 2024-10-07T05:21:38Z
Rating: moderate
References:
* bsc#1184165
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for dehydrated fixes the following issues:
* Update to 0.7.1
* See https://github.com/dehydrated-io/dehydrated/releases/tag/v0.7.1
* Switch to sysuser for user/group setup
* Add user/group provides for rpm 4.19
* Add instance name to unit description
* Check instance specific configuration
* Add postrun hook scripts for apache+nginx
* Target should not PartOf on itself
* Copy the changes entry into README.postrun-hooks to make it easier for users
to find the information how to restore the postrun-hooks after the split.
* Enable instantiated services (bsc#1184165)
* Prepare instantiated service/timer support but not enable it: This seems to
fail due to missing systemd support right now. So the only option at the
moment is to copy the timer and unit file for a 2nd instance. Mark all files
as part of dehydrated.target
* Rework support for /etc/dehydrated/postrun-hooks.d/: dehydrated.service no
longer starts them directly, the support was moved to a separate unit file.
Please run: systemctl enable dehydrated-postrun-hooks.service to restore
this functionality
* Run dehydrated as dehydrated user again
* Do not use the full path for config.d in the config files, which will
simplify implementing multi instance support.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3534=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3534=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3534=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3534=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* dehydrated-apache2-0.7.1-150200.11.9.1
* dehydrated-nginx-0.7.1-150200.11.9.1
* dehydrated-0.7.1-150200.11.9.1
* openSUSE Leap 15.6 (noarch)
* dehydrated-apache2-0.7.1-150200.11.9.1
* dehydrated-nginx-0.7.1-150200.11.9.1
* dehydrated-0.7.1-150200.11.9.1
* Server Applications Module 15-SP5 (noarch)
* dehydrated-apache2-0.7.1-150200.11.9.1
* dehydrated-nginx-0.7.1-150200.11.9.1
* dehydrated-0.7.1-150200.11.9.1
* Server Applications Module 15-SP6 (noarch)
* dehydrated-apache2-0.7.1-150200.11.9.1
* dehydrated-nginx-0.7.1-150200.11.9.1
* dehydrated-0.7.1-150200.11.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1184165
1
0
04 Oct '24
# Security update for cups-filters
Announcement ID: SUSE-SU-2024:3523-1
Release Date: 2024-10-04T13:17:53Z
Rating: critical
References:
* bsc#1230939
Cross-References:
* CVE-2024-47176
CVSS scores:
* CVE-2024-47176 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
* CVE-2024-47176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47176 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for cups-filters fixes the following issues:
* cups-browsed would bind on UDP INADDR_ANY:631 and trust any packet from any
source to trigger a Get-Printer-Attributes IPP request to an attacker
controlled URL. This patch removes support for the legacy CUPS and LDAP
protocols(bsc#1230939, CVE-2024-47176)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3523=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3523=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3523=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3523=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3523=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3523=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3523=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3523=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3523=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3523=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3523=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3523=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3523=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3523=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3523=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3523=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3523=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3523=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3523=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Manager Proxy 4.3 (x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* cups-filters-1.25.0-150200.3.16.1
* cups-filters-debugsource-1.25.0-150200.3.16.1
* cups-filters-devel-1.25.0-150200.3.16.1
* cups-filters-debuginfo-1.25.0-150200.3.16.1
## References:
* https://www.suse.com/security/cve/CVE-2024-47176.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230939
1
0
# Security update for frr
Announcement ID: SUSE-SU-2024:3524-1
Release Date: 2024-10-04T13:18:52Z
Rating: important
References:
* bsc#1230866
Cross-References:
* CVE-2017-15865
CVSS scores:
* CVE-2017-15865 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2017-15865 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2017-15865 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for frr fixes the following issue:
* Arithmetic overflow when parsing attribute of update packet due to
regression introduced by the fix for CVE-2017-15865. (bsc#1230866)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3524=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3524=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3524=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3524=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3524=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3524=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3524=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3524=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3524=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3524=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3524=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3524=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Manager Proxy 4.3 (x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libfrrospfapiclient0-7.4-150300.4.32.1
* libfrrgrpc_pb0-7.4-150300.4.32.1
* libfrrospfapiclient0-debuginfo-7.4-150300.4.32.1
* libfrrzmq0-7.4-150300.4.32.1
* libfrr_pb0-7.4-150300.4.32.1
* libmlag_pb0-debuginfo-7.4-150300.4.32.1
* libfrr_pb0-debuginfo-7.4-150300.4.32.1
* libfrrcares0-debuginfo-7.4-150300.4.32.1
* libfrrfpm_pb0-7.4-150300.4.32.1
* libfrrsnmp0-debuginfo-7.4-150300.4.32.1
* frr-7.4-150300.4.32.1
* libfrrgrpc_pb0-debuginfo-7.4-150300.4.32.1
* frr-debugsource-7.4-150300.4.32.1
* libfrrzmq0-debuginfo-7.4-150300.4.32.1
* libfrr0-7.4-150300.4.32.1
* libfrrcares0-7.4-150300.4.32.1
* libfrr0-debuginfo-7.4-150300.4.32.1
* libmlag_pb0-7.4-150300.4.32.1
* frr-devel-7.4-150300.4.32.1
* frr-debuginfo-7.4-150300.4.32.1
* libfrrsnmp0-7.4-150300.4.32.1
* libfrrfpm_pb0-debuginfo-7.4-150300.4.32.1
## References:
* https://www.suse.com/security/cve/CVE-2017-15865.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230866
1
0
04 Oct '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:3525-1
Release Date: 2024-10-04T13:21:09Z
Rating: important
References:
* bsc#1230698
Cross-References:
* CVE-2024-41996
CVSS scores:
* CVE-2024-41996 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-41996: Validating the order of the public keys in the Diffie-
Hellman Key Agreement Protocol, when an approved safe prime is used, allows
remote attackers to trigger expensive server-side DHE (bsc#1230698)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3525=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3525=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3525=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3525=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3525=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3525=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3525=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3525=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3525=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3525=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3525=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3525=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3525=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-3.0.8-150400.4.66.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.66.1
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.66.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.66.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150400.4.66.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.66.1
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Manager Proxy 4.3 (x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* openssl-3-3.0.8-150400.4.66.1
* openssl-3-debugsource-3.0.8-150400.4.66.1
* libopenssl-3-devel-3.0.8-150400.4.66.1
* openssl-3-debuginfo-3.0.8-150400.4.66.1
* libopenssl3-3.0.8-150400.4.66.1
* libopenssl3-debuginfo-3.0.8-150400.4.66.1
## References:
* https://www.suse.com/security/cve/CVE-2024-41996.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230698
1
0
04 Oct '24
# Recommended update for e2fsprogs
Announcement ID: SUSE-RU-2024:3527-1
Release Date: 2024-10-04T13:27:44Z
Rating: moderate
References:
* bsc#1230145
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for e2fsprogs fixes the following issue:
* resize2fs: Check number of group descriptors only if meta_bg is disabled
(bsc#1230145).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3527=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3527=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3527=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3527=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3527=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3527=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3527=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3527=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3527=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3527=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3527=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3527=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3527=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3527=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3527=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3527=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3527=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-scrub-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* openSUSE Leap 15.4 (x86_64)
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-1.46.4-150400.3.9.2
* libext2fs2-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-32bit-1.46.4-150400.3.9.2
* libcom_err-devel-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs-devel-32bit-1.46.4-150400.3.9.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcom_err-devel-64bit-1.46.4-150400.3.9.2
* libcom_err2-64bit-1.46.4-150400.3.9.2
* libext2fs2-64bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-64bit-1.46.4-150400.3.9.2
* e2fsprogs-64bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs-devel-64bit-1.46.4-150400.3.9.2
* libcom_err2-64bit-debuginfo-1.46.4-150400.3.9.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libext2fs2-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-scrub-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* openSUSE Leap 15.5 (x86_64)
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-1.46.4-150400.3.9.2
* libext2fs2-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-32bit-1.46.4-150400.3.9.2
* libcom_err-devel-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs-devel-32bit-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libext2fs2-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libext2fs2-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libext2fs2-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libext2fs2-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libext2fs2-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* Basesystem Module 15-SP5 (x86_64)
* libcom_err2-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcom_err2-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcom_err2-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-32bit-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libcom_err2-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcom_err2-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* SUSE Manager Proxy 4.3 (x86_64)
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-32bit-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-32bit-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libext2fs-devel-1.46.4-150400.3.9.2
* libext2fs2-1.46.4-150400.3.9.2
* libcom_err-devel-1.46.4-150400.3.9.2
* e2fsprogs-1.46.4-150400.3.9.2
* libcom_err2-1.46.4-150400.3.9.2
* e2fsprogs-devel-1.46.4-150400.3.9.2
* libcom_err2-debuginfo-1.46.4-150400.3.9.2
* libext2fs2-debuginfo-1.46.4-150400.3.9.2
* e2fsprogs-debugsource-1.46.4-150400.3.9.2
* e2fsprogs-debuginfo-1.46.4-150400.3.9.2
* libcom_err-devel-static-1.46.4-150400.3.9.2
* libext2fs-devel-static-1.46.4-150400.3.9.2
* SUSE Manager Server 4.3 (x86_64)
* libcom_err2-32bit-1.46.4-150400.3.9.2
* e2fsprogs-32bit-debuginfo-1.46.4-150400.3.9.2
* libcom_err2-32bit-debuginfo-1.46.4-150400.3.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230145
1
0
04 Oct '24
# Recommended update for e2fsprogs
Announcement ID: SUSE-RU-2024:3528-1
Release Date: 2024-10-04T13:31:58Z
Rating: moderate
References:
* bsc#1230145
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for e2fsprogs fixes the following issue:
* resize2fs: Check number of group descriptors only if meta_bg is disabled
(bsc#1230145).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3528=1 openSUSE-SLE-15.6-2024-3528=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3528=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3528=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libext2fs-devel-static-1.47.0-150600.4.6.2
* e2fsprogs-1.47.0-150600.4.6.2
* libext2fs-devel-1.47.0-150600.4.6.2
* libext2fs2-debuginfo-1.47.0-150600.4.6.2
* libcom_err2-debuginfo-1.47.0-150600.4.6.2
* e2fsprogs-scrub-1.47.0-150600.4.6.2
* e2fsprogs-debuginfo-1.47.0-150600.4.6.2
* libcom_err-devel-1.47.0-150600.4.6.2
* libcom_err-devel-static-1.47.0-150600.4.6.2
* e2fsprogs-devel-1.47.0-150600.4.6.2
* fuse2fs-debugsource-1.47.0-150600.4.6.2
* fuse2fs-debuginfo-1.47.0-150600.4.6.2
* libcom_err2-1.47.0-150600.4.6.2
* fuse2fs-1.47.0-150600.4.6.2
* e2fsprogs-debugsource-1.47.0-150600.4.6.2
* libext2fs2-1.47.0-150600.4.6.2
* openSUSE Leap 15.6 (x86_64)
* libcom_err2-32bit-debuginfo-1.47.0-150600.4.6.2
* e2fsprogs-32bit-debuginfo-1.47.0-150600.4.6.2
* libext2fs2-32bit-1.47.0-150600.4.6.2
* libext2fs2-32bit-debuginfo-1.47.0-150600.4.6.2
* libcom_err-devel-32bit-1.47.0-150600.4.6.2
* libcom_err2-32bit-1.47.0-150600.4.6.2
* libext2fs-devel-32bit-1.47.0-150600.4.6.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libext2fs-devel-64bit-1.47.0-150600.4.6.2
* libext2fs2-64bit-1.47.0-150600.4.6.2
* e2fsprogs-64bit-debuginfo-1.47.0-150600.4.6.2
* libcom_err2-64bit-debuginfo-1.47.0-150600.4.6.2
* libcom_err-devel-64bit-1.47.0-150600.4.6.2
* libext2fs2-64bit-debuginfo-1.47.0-150600.4.6.2
* libcom_err2-64bit-1.47.0-150600.4.6.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libext2fs-devel-static-1.47.0-150600.4.6.2
* e2fsprogs-1.47.0-150600.4.6.2
* libext2fs-devel-1.47.0-150600.4.6.2
* libext2fs2-debuginfo-1.47.0-150600.4.6.2
* libcom_err2-debuginfo-1.47.0-150600.4.6.2
* e2fsprogs-debuginfo-1.47.0-150600.4.6.2
* libcom_err-devel-1.47.0-150600.4.6.2
* libcom_err-devel-static-1.47.0-150600.4.6.2
* e2fsprogs-devel-1.47.0-150600.4.6.2
* libcom_err2-1.47.0-150600.4.6.2
* e2fsprogs-debugsource-1.47.0-150600.4.6.2
* libext2fs2-1.47.0-150600.4.6.2
* Basesystem Module 15-SP6 (x86_64)
* libcom_err2-32bit-debuginfo-1.47.0-150600.4.6.2
* e2fsprogs-32bit-debuginfo-1.47.0-150600.4.6.2
* libcom_err2-32bit-1.47.0-150600.4.6.2
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* fuse2fs-1.47.0-150600.4.6.2
* fuse2fs-debugsource-1.47.0-150600.4.6.2
* fuse2fs-debuginfo-1.47.0-150600.4.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230145
1
0
04 Oct '24
# Recommended update for libpcap
Announcement ID: SUSE-RU-2024:3529-1
Release Date: 2024-10-04T13:37:55Z
Rating: moderate
References:
* bsc#1230894
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for libpcap fixes the following issue:
* enable rdma support (bsc#1230894).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3529=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3529=1 openSUSE-SLE-15.6-2024-3529=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3529=1
## Package List:
* SUSE Package Hub 15 15-SP6 (x86_64)
* libpcap1-32bit-1.10.4-150600.3.6.2
* libpcap-debugsource-1.10.4-150600.3.6.2
* libpcap1-32bit-debuginfo-1.10.4-150600.3.6.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpcap-debugsource-1.10.4-150600.3.6.2
* libpcap-devel-static-1.10.4-150600.3.6.2
* libpcap1-debuginfo-1.10.4-150600.3.6.2
* libpcap-devel-1.10.4-150600.3.6.2
* libpcap1-1.10.4-150600.3.6.2
* openSUSE Leap 15.6 (x86_64)
* libpcap1-32bit-1.10.4-150600.3.6.2
* libpcap1-32bit-debuginfo-1.10.4-150600.3.6.2
* libpcap-devel-32bit-1.10.4-150600.3.6.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpcap1-64bit-1.10.4-150600.3.6.2
* libpcap1-64bit-debuginfo-1.10.4-150600.3.6.2
* libpcap-devel-64bit-1.10.4-150600.3.6.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpcap-debugsource-1.10.4-150600.3.6.2
* libpcap1-1.10.4-150600.3.6.2
* libpcap1-debuginfo-1.10.4-150600.3.6.2
* libpcap-devel-1.10.4-150600.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230894
1
0
04 Oct '24
# Recommended update for libpcap
Announcement ID: SUSE-RU-2024:3530-1
Release Date: 2024-10-04T13:44:11Z
Rating: moderate
References:
* bsc#1230894
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5
An update that has one fix can now be installed.
## Description:
This update for libpcap fixes the following issue:
* enable rdma support (bsc#1230894).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3530=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3530=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3530=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3530=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3530=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3530=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3530=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3530=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3530=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3530=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3530=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3530=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3530=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3530=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3530=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3530=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3530=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3530=1
## Package List:
* SUSE Package Hub 15 15-SP5 (x86_64)
* libpcap1-32bit-1.10.1-150400.3.6.2
* libpcap1-32bit-debuginfo-1.10.1-150400.3.6.2
* libpcap-debugsource-1.10.1-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap-devel-static-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* openSUSE Leap 15.4 (x86_64)
* libpcap-devel-32bit-1.10.1-150400.3.6.2
* libpcap1-32bit-debuginfo-1.10.1-150400.3.6.2
* libpcap1-32bit-1.10.1-150400.3.6.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpcap-devel-64bit-1.10.1-150400.3.6.2
* libpcap1-64bit-debuginfo-1.10.1-150400.3.6.2
* libpcap1-64bit-1.10.1-150400.3.6.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap-devel-static-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* openSUSE Leap 15.5 (x86_64)
* libpcap-devel-32bit-1.10.1-150400.3.6.2
* libpcap1-32bit-debuginfo-1.10.1-150400.3.6.2
* libpcap1-32bit-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libpcap-debugsource-1.10.1-150400.3.6.2
* libpcap1-debuginfo-1.10.1-150400.3.6.2
* libpcap-devel-1.10.1-150400.3.6.2
* libpcap1-1.10.1-150400.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230894
1
0
04 Oct '24
# Recommended update for collectd
Announcement ID: SUSE-RU-2024:3531-1
Release Date: 2024-10-04T13:48:49Z
Rating: moderate
References:
* bsc#1230895
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for collectd fixes the following issue:
* Fixing collectd syntax errors (bsc#1230895)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3531=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3531=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3531=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3531=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3531=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3531=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3531=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3531=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3531=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3531=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3531=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3531=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3531=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Manager Proxy 4.3 (x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* collectd-plugin-nut-5.12.0-150400.3.5.2
* collectd-plugin-logparser-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-5.12.0-150400.3.5.2
* collectd-plugin-pcie-5.12.0-150400.3.5.2
* collectd-plugin-python3-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-lua-debuginfo-5.12.0-150400.3.5.2
* collectd-web-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-debuginfo-5.12.0-150400.3.5.2
* collectd-5.12.0-150400.3.5.2
* collectd-plugin-pcie-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-uptime-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-debuginfo-5.12.0-150400.3.5.2
* libcollectdclient1-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-5.12.0-150400.3.5.2
* collectd-plugin-procevent-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-pinba-5.12.0-150400.3.5.2
* collectd-plugin-pinba-debuginfo-5.12.0-150400.3.5.2
* collectd-debugsource-5.12.0-150400.3.5.2
* collectd-plugin-procevent-5.12.0-150400.3.5.2
* collectd-plugin-ubi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-virt-5.12.0-150400.3.5.2
* libcollectdclient-devel-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-connectivity-5.12.0-150400.3.5.2
* collectd-plugin-uptime-debuginfo-5.12.0-150400.3.5.2
* collectd-plugins-all-5.12.0-150400.3.5.2
* collectd-plugin-mcelog-5.12.0-150400.3.5.2
* collectd-plugin-smart-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-memcachec-5.12.0-150400.3.5.2
* collectd-plugin-write_influxdb_udp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-dbi-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-nut-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-5.12.0-150400.3.5.2
* collectd-plugin-synproxy-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-mysql-debuginfo-5.12.0-150400.3.5.2
* collectd-spamassassin-5.12.0-150400.3.5.2
* collectd-plugin-logparser-5.12.0-150400.3.5.2
* collectd-web-js-5.12.0-150400.3.5.2
* collectd-plugin-write_stackdriver-5.12.0-150400.3.5.2
* collectd-plugin-mysql-5.12.0-150400.3.5.2
* collectd-plugin-ovs-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-java-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-buddyinfo-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-smart-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-sysevent-5.12.0-150400.3.5.2
* collectd-plugin-notify-desktop-5.12.0-150400.3.5.2
* collectd-plugin-postgresql-5.12.0-150400.3.5.2
* collectd-plugin-ubi-5.12.0-150400.3.5.2
* collectd-plugin-virt-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-snmp-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-write_syslog-5.12.0-150400.3.5.2
* collectd-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-openldap-debuginfo-5.12.0-150400.3.5.2
* collectd-plugin-python3-5.12.0-150400.3.5.2
* collectd-plugin-ovs-5.12.0-150400.3.5.2
* collectd-plugin-openldap-5.12.0-150400.3.5.2
* collectd-plugin-ipmi-5.12.0-150400.3.5.2
* collectd-plugin-lua-5.12.0-150400.3.5.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230895
1
0
# Security update for pcp
Announcement ID: SUSE-SU-2024:3533-1
Release Date: 2024-10-04T14:40:38Z
Rating: important
References:
* bsc#1217826
* bsc#1222121
* bsc#1222815
* bsc#1230551
* bsc#1230552
* jsc#PED-8192
* jsc#PED-8389
Cross-References:
* CVE-2023-6917
* CVE-2024-3019
* CVE-2024-45769
* CVE-2024-45770
CVSS scores:
* CVE-2023-6917 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-3019 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45770 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
* CVE-2024-45770 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-45770 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves four vulnerabilities, contains two features and has one
security fix can now be installed.
## Description:
This update for pcp fixes the following issues:
pcp was updated from version 5.3.7 to version 6.2.0 (jsc#PED-8192,
jsc#PED-8389):
* Security issues fixed:
* CVE-2024-45770: Fixed a symlink attack that allows escalating from the pcp
to the root user (bsc#1230552)
* CVE-2024-45769: Fixed a heap corruption through metric pmstore operations
(bsc#1230551)
* CVE-2023-6917: Fixed local privilege escalation from pcp user to root in
/usr/libexec/pcp/lib/pmproxy (bsc#1217826)
* CVE-2024-3019: Disabled redis proxy by default (bsc#1222121)
* Major changes:
* Add version 3 PCP archive support: instance domain change-deltas, Y2038-safe
timestamps, nanosecond-precision timestamps, arbitrary timezones support,
64-bit file offsets used throughout for larger (beyond 2GB) individual
volumes.
* Opt-in using the /etc/pcp.conf PCP_ARCHIVE_VERSION setting
* Version 2 archives remain the default (for next few years).
* Switch to using OpenSSL only throughout PCP (dropped NSS/NSPR); this impacts
on libpcp, PMAPI clients and PMCD use of encryption; these are now
configured and used consistently with pmproxy HTTPS support and redis-
server, which were both already using OpenSSL.
* New nanosecond precision timestamp PMAPI calls for PCP library interfaces
that make use of timestamps.
These are all optional, and full backward compatibility is preserved for
existing tools.
* For the full list of changes please consult the packaged CHANGELOG file
* Other packaging changes:
* Moved pmlogger_daily into main package (bsc#1222815)
* Change dependency from openssl-devel >= 1.1.1 to openssl-devel >= 1.0.2p.
Required for SLE-12.
* Introduce 'pmda-resctrl' package, disabled for architectures other than
x86_64.
* Change the architecture for various subpackages to 'noarch' as they contain
no binaries.
* Disable 'pmda-mssql', as it fails to build.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3533=1 SUSE-2024-3533=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3533=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* pcp-pmda-dm-6.2.0-150600.3.6.1
* libpcp_web1-debuginfo-6.2.0-150600.3.6.1
* libpcp_gui2-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-nvidia-gpu-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-hacluster-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-lustrecomm-6.2.0-150600.3.6.1
* pcp-pmda-gfs2-6.2.0-150600.3.6.1
* pcp-pmda-mounts-debuginfo-6.2.0-150600.3.6.1
* pcp-devel-debuginfo-6.2.0-150600.3.6.1
* pcp-system-tools-6.2.0-150600.3.6.1
* python3-pcp-6.2.0-150600.3.6.1
* pcp-pmda-systemd-debuginfo-6.2.0-150600.3.6.1
* libpcp3-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-apache-6.2.0-150600.3.6.1
* pcp-pmda-sockets-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-MMV-6.2.0-150600.3.6.1
* pcp-pmda-summary-6.2.0-150600.3.6.1
* pcp-pmda-bash-6.2.0-150600.3.6.1
* pcp-pmda-mailq-6.2.0-150600.3.6.1
* pcp-pmda-sendmail-6.2.0-150600.3.6.1
* libpcp_web1-6.2.0-150600.3.6.1
* pcp-pmda-apache-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-logger-6.2.0-150600.3.6.1
* pcp-testsuite-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-trace-debuginfo-6.2.0-150600.3.6.1
* pcp-devel-6.2.0-150600.3.6.1
* pcp-pmda-summary-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-logger-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-PMDA-6.2.0-150600.3.6.1
* pcp-pmda-sockets-6.2.0-150600.3.6.1
* pcp-pmda-weblog-6.2.0-150600.3.6.1
* perl-PCP-MMV-debuginfo-6.2.0-150600.3.6.1
* pcp-debugsource-6.2.0-150600.3.6.1
* pcp-6.2.0-150600.3.6.1
* pcp-pmda-smart-6.2.0-150600.3.6.1
* pcp-pmda-roomtemp-6.2.0-150600.3.6.1
* pcp-pmda-docker-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-shping-6.2.0-150600.3.6.1
* pcp-pmda-shping-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-LogSummary-6.2.0-150600.3.6.1
* libpcp_gui2-6.2.0-150600.3.6.1
* pcp-pmda-smart-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-LogImport-6.2.0-150600.3.6.1
* libpcp3-6.2.0-150600.3.6.1
* pcp-pmda-cifs-debuginfo-6.2.0-150600.3.6.1
* python3-pcp-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-cifs-6.2.0-150600.3.6.1
* pcp-pmda-cisco-6.2.0-150600.3.6.1
* pcp-pmda-hacluster-6.2.0-150600.3.6.1
* pcp-pmda-mailq-debuginfo-6.2.0-150600.3.6.1
* pcp-import-collectl2pcp-6.2.0-150600.3.6.1
* pcp-pmda-gfs2-debuginfo-6.2.0-150600.3.6.1
* libpcp_import1-debuginfo-6.2.0-150600.3.6.1
* libpcp-devel-6.2.0-150600.3.6.1
* pcp-pmda-roomtemp-debuginfo-6.2.0-150600.3.6.1
* libpcp_trace2-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-trace-6.2.0-150600.3.6.1
* perl-PCP-PMDA-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-zimbra-debuginfo-6.2.0-150600.3.6.1
* libpcp_mmv1-6.2.0-150600.3.6.1
* pcp-pmda-nvidia-gpu-6.2.0-150600.3.6.1
* pcp-pmda-bash-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-cisco-debuginfo-6.2.0-150600.3.6.1
* libpcp_import1-6.2.0-150600.3.6.1
* pcp-gui-debuginfo-6.2.0-150600.3.6.1
* libpcp_trace2-6.2.0-150600.3.6.1
* pcp-testsuite-6.2.0-150600.3.6.1
* libpcp_mmv1-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-systemd-6.2.0-150600.3.6.1
* pcp-pmda-lustrecomm-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-sendmail-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-weblog-debuginfo-6.2.0-150600.3.6.1
* pcp-system-tools-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-mounts-6.2.0-150600.3.6.1
* pcp-import-collectl2pcp-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-zimbra-6.2.0-150600.3.6.1
* pcp-gui-6.2.0-150600.3.6.1
* pcp-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-docker-6.2.0-150600.3.6.1
* pcp-pmda-dm-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-LogImport-debuginfo-6.2.0-150600.3.6.1
* openSUSE Leap 15.6 (noarch)
* pcp-pmda-redis-6.2.0-150600.3.6.1
* pcp-pmda-snmp-6.2.0-150600.3.6.1
* pcp-pmda-postfix-6.2.0-150600.3.6.1
* pcp-pmda-memcache-6.2.0-150600.3.6.1
* pcp-pmda-mysql-6.2.0-150600.3.6.1
* pcp-pmda-news-6.2.0-150600.3.6.1
* pcp-pmda-samba-6.2.0-150600.3.6.1
* pcp-export-pcp2influxdb-6.2.0-150600.3.6.1
* pcp-pmda-nfsclient-6.2.0-150600.3.6.1
* pcp-pmda-openmetrics-6.2.0-150600.3.6.1
* pcp-export-pcp2elasticsearch-6.2.0-150600.3.6.1
* pcp-conf-6.2.0-150600.3.6.1
* pcp-pmda-nutcracker-6.2.0-150600.3.6.1
* pcp-pmda-lmsensors-6.2.0-150600.3.6.1
* pcp-pmda-unbound-6.2.0-150600.3.6.1
* pcp-pmda-gluster-6.2.0-150600.3.6.1
* pcp-pmda-mic-6.2.0-150600.3.6.1
* pcp-pmda-named-6.2.0-150600.3.6.1
* pcp-pmda-netfilter-6.2.0-150600.3.6.1
* pcp-pmda-zswap-6.2.0-150600.3.6.1
* pcp-pmda-ds389-6.2.0-150600.3.6.1
* pcp-pmda-slurm-6.2.0-150600.3.6.1
* pcp-import-mrtg2pcp-6.2.0-150600.3.6.1
* pcp-pmda-dbping-6.2.0-150600.3.6.1
* pcp-pmda-netcheck-6.2.0-150600.3.6.1
* pcp-pmda-openvswitch-6.2.0-150600.3.6.1
* pcp-pmda-json-6.2.0-150600.3.6.1
* pcp-pmda-elasticsearch-6.2.0-150600.3.6.1
* pcp-import-sar2pcp-6.2.0-150600.3.6.1
* pcp-doc-6.2.0-150600.3.6.1
* pcp-pmda-haproxy-6.2.0-150600.3.6.1
* pcp-pmda-gpsd-6.2.0-150600.3.6.1
* pcp-pmda-ds389log-6.2.0-150600.3.6.1
* pcp-export-pcp2json-6.2.0-150600.3.6.1
* pcp-pmda-gpfs-6.2.0-150600.3.6.1
* pcp-pmda-oracle-6.2.0-150600.3.6.1
* pcp-pmda-rsyslog-6.2.0-150600.3.6.1
* pcp-export-pcp2zabbix-6.2.0-150600.3.6.1
* pcp-pmda-lustre-6.2.0-150600.3.6.1
* pcp-import-iostat2pcp-6.2.0-150600.3.6.1
* pcp-pmda-activemq-6.2.0-150600.3.6.1
* pcp-import-ganglia2pcp-6.2.0-150600.3.6.1
* pcp-pmda-bonding-6.2.0-150600.3.6.1
* pcp-pmda-pdns-6.2.0-150600.3.6.1
* pcp-zeroconf-6.2.0-150600.3.6.1
* pcp-export-pcp2spark-6.2.0-150600.3.6.1
* pcp-pmda-rabbitmq-6.2.0-150600.3.6.1
* pcp-pmda-nginx-6.2.0-150600.3.6.1
* pcp-export-pcp2graphite-6.2.0-150600.3.6.1
* pcp-export-pcp2xml-6.2.0-150600.3.6.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64 i586)
* pcp-pmda-infiniband-6.2.0-150600.3.6.1
* pcp-pmda-perfevent-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-infiniband-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-perfevent-6.2.0-150600.3.6.1
* openSUSE Leap 15.6 (x86_64)
* pcp-pmda-resctrl-6.2.0-150600.3.6.1
* pcp-pmda-resctrl-debuginfo-6.2.0-150600.3.6.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpcp_web1-debuginfo-6.2.0-150600.3.6.1
* libpcp_gui2-debuginfo-6.2.0-150600.3.6.1
* pcp-system-tools-6.2.0-150600.3.6.1
* python3-pcp-6.2.0-150600.3.6.1
* pcp-devel-debuginfo-6.2.0-150600.3.6.1
* libpcp3-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-MMV-6.2.0-150600.3.6.1
* libpcp_web1-6.2.0-150600.3.6.1
* pcp-devel-6.2.0-150600.3.6.1
* perl-PCP-MMV-debuginfo-6.2.0-150600.3.6.1
* pcp-debugsource-6.2.0-150600.3.6.1
* pcp-6.2.0-150600.3.6.1
* perl-PCP-LogSummary-6.2.0-150600.3.6.1
* libpcp_gui2-6.2.0-150600.3.6.1
* perl-PCP-LogImport-6.2.0-150600.3.6.1
* libpcp3-6.2.0-150600.3.6.1
* python3-pcp-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-PMDA-6.2.0-150600.3.6.1
* libpcp_import1-debuginfo-6.2.0-150600.3.6.1
* libpcp-devel-6.2.0-150600.3.6.1
* libpcp_trace2-debuginfo-6.2.0-150600.3.6.1
* libpcp_mmv1-6.2.0-150600.3.6.1
* libpcp_import1-6.2.0-150600.3.6.1
* libpcp_trace2-6.2.0-150600.3.6.1
* libpcp_mmv1-debuginfo-6.2.0-150600.3.6.1
* pcp-system-tools-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-PMDA-debuginfo-6.2.0-150600.3.6.1
* pcp-debuginfo-6.2.0-150600.3.6.1
* perl-PCP-LogImport-debuginfo-6.2.0-150600.3.6.1
* Development Tools Module 15-SP6 (noarch)
* pcp-import-sar2pcp-6.2.0-150600.3.6.1
* pcp-conf-6.2.0-150600.3.6.1
* pcp-import-iostat2pcp-6.2.0-150600.3.6.1
* pcp-import-mrtg2pcp-6.2.0-150600.3.6.1
* pcp-doc-6.2.0-150600.3.6.1
* Development Tools Module 15-SP6 (ppc64le)
* pcp-pmda-perfevent-debuginfo-6.2.0-150600.3.6.1
* pcp-pmda-perfevent-6.2.0-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2023-6917.html
* https://www.suse.com/security/cve/CVE-2024-3019.html
* https://www.suse.com/security/cve/CVE-2024-45769.html
* https://www.suse.com/security/cve/CVE-2024-45770.html
* https://bugzilla.suse.com/show_bug.cgi?id=1217826
* https://bugzilla.suse.com/show_bug.cgi?id=1222121
* https://bugzilla.suse.com/show_bug.cgi?id=1222815
* https://bugzilla.suse.com/show_bug.cgi?id=1230551
* https://bugzilla.suse.com/show_bug.cgi?id=1230552
* https://jira.suse.com/browse/PED-8192
* https://jira.suse.com/browse/PED-8389
1
0
04 Oct '24
# Recommended update for dracut
Announcement ID: SUSE-RU-2024:3522-1
Release Date: 2024-10-04T08:02:44Z
Rating: moderate
References:
* bsc#1230110
* bsc#1230330
* bsc#1230468
* bsc#1230639
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has four fixes can now be installed.
## Description:
This update for dracut fixes the following issues:
* Version update 059+suse.541.g3c2df232:
* fix(dasd-rules): handle all possible options in `rd.dasd` (bsc#1230110).
* fix(dracut.spec): add Builddeps for initrd posttrans macros (bsc#1230639).
* fix(zfcp_rules): check for presence of legacy rules (bsc#1230330).
* Fixes for NVMeoF boot (bsc#1230468)
* fix(nvmf): install (only) required nvmf modules
* fix(nvmf): require NVMeoF modules
* fix(nvmf): move /etc/nvme/host{nqn,id} requirement to hostonly
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3522=1 openSUSE-SLE-15.6-2024-3522=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3522=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3522=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* dracut-fips-059+suse.541.g3c2df232-150600.3.11.2
* dracut-tools-059+suse.541.g3c2df232-150600.3.11.2
* dracut-debugsource-059+suse.541.g3c2df232-150600.3.11.2
* dracut-059+suse.541.g3c2df232-150600.3.11.2
* dracut-mkinitrd-deprecated-059+suse.541.g3c2df232-150600.3.11.2
* dracut-debuginfo-059+suse.541.g3c2df232-150600.3.11.2
* dracut-extra-059+suse.541.g3c2df232-150600.3.11.2
* dracut-ima-059+suse.541.g3c2df232-150600.3.11.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* dracut-fips-059+suse.541.g3c2df232-150600.3.11.2
* dracut-debugsource-059+suse.541.g3c2df232-150600.3.11.2
* dracut-059+suse.541.g3c2df232-150600.3.11.2
* dracut-debuginfo-059+suse.541.g3c2df232-150600.3.11.2
* dracut-ima-059+suse.541.g3c2df232-150600.3.11.2
* SUSE Linux Enterprise High Availability Extension 15 SP6 (ppc64le x86_64)
* dracut-debugsource-059+suse.541.g3c2df232-150600.3.11.2
* dracut-mkinitrd-deprecated-059+suse.541.g3c2df232-150600.3.11.2
* dracut-debuginfo-059+suse.541.g3c2df232-150600.3.11.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230110
* https://bugzilla.suse.com/show_bug.cgi?id=1230330
* https://bugzilla.suse.com/show_bug.cgi?id=1230468
* https://bugzilla.suse.com/show_bug.cgi?id=1230639
1
0
SUSE-RU-2024:3520-1: moderate: Recommended update for yast2-iscsi-client
by OPENSUSE-UPDATES 04 Oct '24
by OPENSUSE-UPDATES 04 Oct '24
04 Oct '24
# Recommended update for yast2-iscsi-client
Announcement ID: SUSE-RU-2024:3520-1
Release Date: 2024-10-04T07:25:12Z
Rating: moderate
References:
* bsc#1228084
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for yast2-iscsi-client fixes the following issues:
* Bug fixing (bsc#1228084):
* Inst client: Read sessions just after auto login in order to enable services
at the end of the installation if needed.
* Finish client: enable iscsiuio.service instead of the socket.
* Use ip command for reading the ip address of a given device instead of the
deprecated ifconfig command.
* Version update to 4.6.3 .
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3520=1 openSUSE-SLE-15.6-2024-3520=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3520=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* yast2-iscsi-client-4.6.3-150600.3.6.2
* Basesystem Module 15-SP6 (noarch)
* yast2-iscsi-client-4.6.3-150600.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228084
1
0
04 Oct '24
# Recommended update for dracut
Announcement ID: SUSE-RU-2024:3521-1
Release Date: 2024-10-04T07:29:55Z
Rating: moderate
References:
* bsc#1230110
* bsc#1230330
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has two fixes can now be installed.
## Description:
This update for dracut fixes the following issue:
* Version update, check for presence of legacy rules (bsc#1230330).
* Version update, handle all possible options in `rd.dasd` (bsc#1230110).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3521=1 openSUSE-SLE-15.5-2024-3521=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3521=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3521=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3521=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* dracut-fips-055+suse.396.g701c6212-150500.3.29.2
* dracut-extra-055+suse.396.g701c6212-150500.3.29.2
* dracut-ima-055+suse.396.g701c6212-150500.3.29.2
* dracut-mkinitrd-deprecated-055+suse.396.g701c6212-150500.3.29.2
* dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2
* dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2
* dracut-tools-055+suse.396.g701c6212-150500.3.29.2
* dracut-055+suse.396.g701c6212-150500.3.29.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* dracut-055+suse.396.g701c6212-150500.3.29.2
* dracut-fips-055+suse.396.g701c6212-150500.3.29.2
* dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2
* dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* dracut-055+suse.396.g701c6212-150500.3.29.2
* dracut-fips-055+suse.396.g701c6212-150500.3.29.2
* dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2
* dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* dracut-fips-055+suse.396.g701c6212-150500.3.29.2
* dracut-ima-055+suse.396.g701c6212-150500.3.29.2
* dracut-mkinitrd-deprecated-055+suse.396.g701c6212-150500.3.29.2
* dracut-debuginfo-055+suse.396.g701c6212-150500.3.29.2
* dracut-debugsource-055+suse.396.g701c6212-150500.3.29.2
* dracut-055+suse.396.g701c6212-150500.3.29.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230110
* https://bugzilla.suse.com/show_bug.cgi?id=1230330
1
0
03 Oct '24
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:3519-1
Release Date: 2024-10-03T13:06:48Z
Rating: important
References:
* bsc#1230979
Affected Products:
* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one security fix can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 128.3.0 ESR (MFSA-2024-47,
bsc#1230979):
* CVE-2024-8900: Clipboard write permission bypass
* CVE-2024-9392: Compromised content process can bypass site isolation
* CVE-2024-9393: Cross-origin access to PDF contents through multipart
responses
* CVE-2024-9394: Cross-origin access to JSON contents through multipart
responses
* CVE-2024-9396: Potential memory corruption may occur when cloning certain
objects
* CVE-2024-9397: Potential directory upload bypass via clickjacking
* CVE-2024-9398: External protocol handlers could be enumerated via popups
* CVE-2024-9399: Specially crafted WebTransport requests could lead to denial
of service
* CVE-2024-9400: Potential memory corruption during JIT compilation
* CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16,
Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
* CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3,
Thunderbird 131, and Thunderbird 128.3
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3519=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3519=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3519=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3519=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3519=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3519=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3519=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3519=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3519=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3519=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3519=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3519=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3519=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3519=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3519=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3519=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-branding-upstream-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-branding-upstream-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.3.0-150200.152.152.1
* MozillaFirefox-debugsource-128.3.0-150200.152.152.1
* MozillaFirefox-translations-other-128.3.0-150200.152.152.1
* MozillaFirefox-translations-common-128.3.0-150200.152.152.1
* MozillaFirefox-128.3.0-150200.152.152.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-128.3.0-150200.152.152.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230979
1
0
03 Oct '24
# Recommended update for hawk2
Announcement ID: SUSE-RU-2024:3513-1
Release Date: 2024-10-03T08:15:53Z
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP2
* SUSE Linux Enterprise High Availability Extension 15 SP3
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.1
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.1
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.1
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
This update for hawk2 fixes the following issues:
* Added docstring to functions in hawk_test
* Added test_check_cluster_configuration for 15aee3b2
* Bumped js-routes version
* Check rsc stonith is in maintenance by either of 2 keywords
* Dev: rename 'Score' to 'Kind'
* Extend the test_check_cluster_configuration
* Fixed cibtools: adjust to the new cibadmin format
* Increase the test delays back, as they were before
* Update copyright year from 2018 to 2024
* Updated sanity check for passwd existance
* Updated validation for the newer versions of rails
* Updateed the drop-down boxes in the Cluster Configuration
* Use crm_attribute --list-options
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3513=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3513=1
* SUSE Linux Enterprise High Availability Extension 15 SP2
zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-3513=1
* SUSE Linux Enterprise High Availability Extension 15 SP3
zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-3513=1
* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-3513=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3513=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2024-3513=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* hawk2-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debugsource-2.6.5+git.1724746409.a23057e1-150000.3.48.1
* hawk2-debuginfo-2.6.5+git.1724746409.a23057e1-150000.3.48.1
1
0
03 Oct '24
# Security update for libpcap
Announcement ID: SUSE-SU-2024:3516-1
Release Date: 2024-10-03T11:33:46Z
Rating: moderate
References:
* bsc#1230020
* bsc#1230034
Cross-References:
* CVE-2023-7256
* CVE-2024-8006
CVSS scores:
* CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves two vulnerabilities can now be installed.
## Description:
This update for libpcap fixes the following issues:
* CVE-2024-8006: NULL pointer dereference in function pcap_findalldevs_ex().
(bsc#1230034)
* CVE-2023-7256: double free via struct addrinfo in function
sock_initaddress(). (bsc#1230020)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3516=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3516=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3516=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3516=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libpcap-devel-static-1.9.1-150300.3.3.1
* libpcap1-debuginfo-1.9.1-150300.3.3.1
* libpcap-debugsource-1.9.1-150300.3.3.1
* libpcap1-1.9.1-150300.3.3.1
* libpcap-devel-1.9.1-150300.3.3.1
* openSUSE Leap 15.3 (x86_64)
* libpcap-devel-32bit-1.9.1-150300.3.3.1
* libpcap1-32bit-debuginfo-1.9.1-150300.3.3.1
* libpcap1-32bit-1.9.1-150300.3.3.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpcap-devel-64bit-1.9.1-150300.3.3.1
* libpcap1-64bit-debuginfo-1.9.1-150300.3.3.1
* libpcap1-64bit-1.9.1-150300.3.3.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.9.1-150300.3.3.1
* libpcap-debugsource-1.9.1-150300.3.3.1
* libpcap1-1.9.1-150300.3.3.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.9.1-150300.3.3.1
* libpcap-debugsource-1.9.1-150300.3.3.1
* libpcap1-1.9.1-150300.3.3.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libpcap1-debuginfo-1.9.1-150300.3.3.1
* libpcap-debugsource-1.9.1-150300.3.3.1
* libpcap1-1.9.1-150300.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2023-7256.html
* https://www.suse.com/security/cve/CVE-2024-8006.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230020
* https://bugzilla.suse.com/show_bug.cgi?id=1230034
1
0
02 Oct '24
# Recommended update for crmsh
Announcement ID: SUSE-RU-2024:3511-1
Release Date: 2024-10-02T16:07:20Z
Rating: important
References:
* bsc#1228251
* bsc#1228271
* bsc#1228899
* bsc#1229093
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has four fixes can now be installed.
## Description:
This update for crmsh fixes the following issues:
* Update to version 4.5.1+20240920.16b5eae:
* Fix: bootstrap: check is_nologin more robustly (bsc#1228251).
* Dev: report: add a reminder to use `crm cluster health` (bsc#1228899).
* Dev: ui_cluster: add a reminder to use "crm cluster init/join ssh" to
initialize ssh (bsc#1228899).
* Dev: scripts: add a reminder to use `crm cluster health` to fix hacluster
passwordless ssh authentication (bsc#1228899).
* Dev: ui_cluster: add subcommand 'crm cluster health hawk2 [--fix]'
(bsc#1228899).
* Dev: scripts: generate readable messages when ssh authentication fails
(bsc#1228899).
* Fix: report: should not try interactive authentication when stdin is no a
tty (bsc#1228899).
* Fix: report: should not try to su if effective uid != 0 (bsc#1228899).
* Dev: main: remove upgradeutil (bsc#1228899).
* Fix: utils: Stop providing the detailed and precise sudoers rules to "hack"
the privilege (bsc#1229093).
* Version update:
* Fix: utils: allow haclient group to use cluster level commands
(bsc#1228271).
* Fix: scripts: call commands as current user when running as hacluster
(bsc#1228271).
* Fix: prun: allow pcopy_to_remote to use intercept (bsc#1228271).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3511=1 openSUSE-SLE-15.5-2024-3511=1
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3511=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* crmsh-4.5.1+20240920.16b5eae-150500.3.39.3
* crmsh-scripts-4.5.1+20240920.16b5eae-150500.3.39.3
* crmsh-test-4.5.1+20240920.16b5eae-150500.3.39.3
* SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch)
* crmsh-4.5.1+20240920.16b5eae-150500.3.39.3
* crmsh-scripts-4.5.1+20240920.16b5eae-150500.3.39.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228251
* https://bugzilla.suse.com/show_bug.cgi?id=1228271
* https://bugzilla.suse.com/show_bug.cgi?id=1228899
* https://bugzilla.suse.com/show_bug.cgi?id=1229093
1
0
02 Oct '24
# Recommended update for systemd
Announcement ID: SUSE-RU-2024:3512-1
Release Date: 2024-10-02T16:15:09Z
Rating: important
References:
* bsc#1226414
* bsc#1228091
* bsc#1228223
* bsc#1228809
* bsc#1229518
* jsc#PED-5659
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that contains one feature and has five fixes can now be installed.
## Description:
This update for systemd fixes the following issues:
* Determine the effective user limits in a systemd setup (jsc#PED-5659)
* Don't try to restart the udev socket units anymore. (bsc#1228809).
* Add systemd.rules rework (bsc#1229518).
* Don't mention any rpm macros inside comments, even if escaped (bsc#1228091).
* upstream commit (bsc#1226414).
* Make the 32bit version of libudev.so available again (bsc#1228223).
* policykit-1 renamed to polkitd
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3512=1 openSUSE-SLE-15.6-2024-3512=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3512=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3512=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* systemd-journal-remote-debuginfo-254.18-150600.4.15.10
* libsystemd0-mini-254.18-150600.4.15.4
* systemd-portable-debuginfo-254.18-150600.4.15.10
* systemd-doc-254.18-150600.4.15.10
* systemd-network-debuginfo-254.18-150600.4.15.10
* systemd-mini-container-debuginfo-254.18-150600.4.15.4
* systemd-homed-254.18-150600.4.15.10
* libudev1-debuginfo-254.18-150600.4.15.10
* systemd-mini-devel-254.18-150600.4.15.4
* systemd-homed-debuginfo-254.18-150600.4.15.10
* systemd-mini-debuginfo-254.18-150600.4.15.4
* udev-debuginfo-254.18-150600.4.15.10
* systemd-portable-254.18-150600.4.15.10
* udev-254.18-150600.4.15.10
* systemd-debuginfo-254.18-150600.4.15.10
* systemd-journal-remote-254.18-150600.4.15.10
* systemd-testsuite-debuginfo-254.18-150600.4.15.10
* systemd-debugsource-254.18-150600.4.15.10
* systemd-254.18-150600.4.15.10
* systemd-mini-254.18-150600.4.15.4
* libudev1-254.18-150600.4.15.10
* libudev-mini1-debuginfo-254.18-150600.4.15.4
* libudev-mini1-254.18-150600.4.15.4
* systemd-devel-254.18-150600.4.15.10
* systemd-sysvcompat-debuginfo-254.18-150600.4.15.10
* libsystemd0-debuginfo-254.18-150600.4.15.10
* libsystemd0-mini-debuginfo-254.18-150600.4.15.4
* systemd-network-254.18-150600.4.15.10
* systemd-experimental-debuginfo-254.18-150600.4.15.10
* udev-mini-debuginfo-254.18-150600.4.15.4
* systemd-container-254.18-150600.4.15.10
* systemd-testsuite-254.18-150600.4.15.10
* systemd-container-debuginfo-254.18-150600.4.15.10
* udev-mini-254.18-150600.4.15.4
* systemd-coredump-debuginfo-254.18-150600.4.15.10
* systemd-mini-container-254.18-150600.4.15.4
* systemd-experimental-254.18-150600.4.15.10
* systemd-coredump-254.18-150600.4.15.10
* systemd-sysvcompat-254.18-150600.4.15.10
* libsystemd0-254.18-150600.4.15.10
* systemd-mini-debugsource-254.18-150600.4.15.4
* openSUSE Leap 15.6 (x86_64)
* libsystemd0-32bit-debuginfo-254.18-150600.4.15.10
* systemd-32bit-254.18-150600.4.15.10
* libsystemd0-32bit-254.18-150600.4.15.10
* systemd-32bit-debuginfo-254.18-150600.4.15.10
* libudev1-32bit-debuginfo-254.18-150600.4.15.10
* systemd-devel-32bit-254.18-150600.4.15.10
* libudev1-32bit-254.18-150600.4.15.10
* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* systemd-boot-254.18-150600.4.15.10
* systemd-boot-debuginfo-254.18-150600.4.15.10
* openSUSE Leap 15.6 (noarch)
* systemd-lang-254.18-150600.4.15.10
* openSUSE Leap 15.6 (aarch64_ilp32)
* systemd-devel-64bit-254.18-150600.4.15.10
* libsystemd0-64bit-254.18-150600.4.15.10
* libsystemd0-64bit-debuginfo-254.18-150600.4.15.10
* systemd-64bit-254.18-150600.4.15.10
* systemd-64bit-debuginfo-254.18-150600.4.15.10
* libudev1-64bit-debuginfo-254.18-150600.4.15.10
* libudev1-64bit-254.18-150600.4.15.10
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libudev1-254.18-150600.4.15.10
* udev-debuginfo-254.18-150600.4.15.10
* systemd-container-254.18-150600.4.15.10
* udev-254.18-150600.4.15.10
* systemd-container-debuginfo-254.18-150600.4.15.10
* systemd-debuginfo-254.18-150600.4.15.10
* systemd-doc-254.18-150600.4.15.10
* systemd-journal-remote-254.18-150600.4.15.10
* systemd-devel-254.18-150600.4.15.10
* systemd-coredump-debuginfo-254.18-150600.4.15.10
* systemd-debugsource-254.18-150600.4.15.10
* systemd-254.18-150600.4.15.10
* systemd-coredump-254.18-150600.4.15.10
* systemd-sysvcompat-254.18-150600.4.15.10
* libudev1-debuginfo-254.18-150600.4.15.10
* systemd-sysvcompat-debuginfo-254.18-150600.4.15.10
* libsystemd0-254.18-150600.4.15.10
* libsystemd0-debuginfo-254.18-150600.4.15.10
* Basesystem Module 15-SP6 (noarch)
* systemd-lang-254.18-150600.4.15.10
* Basesystem Module 15-SP6 (x86_64)
* libsystemd0-32bit-debuginfo-254.18-150600.4.15.10
* systemd-32bit-254.18-150600.4.15.10
* libsystemd0-32bit-254.18-150600.4.15.10
* systemd-32bit-debuginfo-254.18-150600.4.15.10
* libudev1-32bit-debuginfo-254.18-150600.4.15.10
* libudev1-32bit-254.18-150600.4.15.10
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* systemd-network-254.18-150600.4.15.10
* systemd-debuginfo-254.18-150600.4.15.10
* systemd-debugsource-254.18-150600.4.15.10
* systemd-network-debuginfo-254.18-150600.4.15.10
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1226414
* https://bugzilla.suse.com/show_bug.cgi?id=1228091
* https://bugzilla.suse.com/show_bug.cgi?id=1228223
* https://bugzilla.suse.com/show_bug.cgi?id=1228809
* https://bugzilla.suse.com/show_bug.cgi?id=1229518
* https://jira.suse.com/browse/PED-5659
1
0
SUSE-RU-2024:3509-1: moderate: Optional update for python-django-cffi
by OPENSUSE-UPDATES 01 Oct '24
by OPENSUSE-UPDATES 01 Oct '24
01 Oct '24
# Optional update for python-django-cffi
Announcement ID: SUSE-RU-2024:3509-1
Release Date: 2024-10-01T18:56:47Z
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for python-django-cffi ships the missing python3-django-cffi to
openSUSE Leap 15.6
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3509=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3509=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3509=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3509=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* python3-argon2-cffi-19.2.0-150200.3.2.1
* python-argon2-cffi-debugsource-19.2.0-150200.3.2.1
* python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* python3-argon2-cffi-19.2.0-150200.3.2.1
* python-argon2-cffi-debugsource-19.2.0-150200.3.2.1
* python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* python3-argon2-cffi-19.2.0-150200.3.2.1
* python-argon2-cffi-debugsource-19.2.0-150200.3.2.1
* python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* python-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
* python3-argon2-cffi-19.2.0-150200.3.2.1
* python-argon2-cffi-debugsource-19.2.0-150200.3.2.1
* python3-argon2-cffi-debuginfo-19.2.0-150200.3.2.1
1
0
01 Oct '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:3501-1
Release Date: 2024-10-01T14:03:42Z
Rating: important
References:
* bsc#1230698
Cross-References:
* CVE-2024-41996
CVSS scores:
* CVE-2024-41996 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-41996: Validating the order of the public keys in the Diffie-
Hellman Key Agreement Protocol, when an approved safe prime is used, allows
remote attackers to trigger expensive server-side DHE (bsc#1230698)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3501=1 openSUSE-SLE-15.6-2024-3501=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3501=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.18.1
* openssl-3-debuginfo-3.1.4-150600.5.18.1
* libopenssl3-debuginfo-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-3.1.4-150600.5.18.1
* libopenssl3-3.1.4-150600.5.18.1
* openssl-3-debugsource-3.1.4-150600.5.18.1
* libopenssl-3-devel-3.1.4-150600.5.18.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.18.1
* libopenssl-3-devel-32bit-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.18.1
* libopenssl3-32bit-3.1.4-150600.5.18.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.18.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-3-devel-64bit-3.1.4-150600.5.18.1
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.18.1
* libopenssl3-64bit-3.1.4-150600.5.18.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-3-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.18.1
* openssl-3-debuginfo-3.1.4-150600.5.18.1
* libopenssl3-debuginfo-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-3.1.4-150600.5.18.1
* libopenssl3-3.1.4-150600.5.18.1
* openssl-3-debugsource-3.1.4-150600.5.18.1
* libopenssl-3-devel-3.1.4-150600.5.18.1
* Basesystem Module 15-SP6 (x86_64)
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.18.1
* libopenssl3-32bit-3.1.4-150600.5.18.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.18.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.18.1
## References:
* https://www.suse.com/security/cve/CVE-2024-41996.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230698
1
0
01 Oct '24
# Security update for openvpn
Announcement ID: SUSE-SU-2024:3502-1
Release Date: 2024-10-01T14:03:57Z
Rating: moderate
References:
* bsc#1227546
Cross-References:
* CVE-2024-28882
CVSS scores:
* CVE-2024-28882 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for openvpn fixes the following issues:
* CVE-2024-28882: Fix multiple exit notifications from authenticated clients
will extend the validity of a closing session (bsc#1227546)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3502=1 openSUSE-SLE-15.6-2024-3502=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3502=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openvpn-down-root-plugin-debuginfo-2.6.8-150600.3.3.1
* openvpn-2.6.8-150600.3.3.1
* openvpn-auth-pam-plugin-2.6.8-150600.3.3.1
* openvpn-devel-2.6.8-150600.3.3.1
* openvpn-down-root-plugin-2.6.8-150600.3.3.1
* openvpn-debuginfo-2.6.8-150600.3.3.1
* openvpn-debugsource-2.6.8-150600.3.3.1
* openvpn-auth-pam-plugin-debuginfo-2.6.8-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openvpn-2.6.8-150600.3.3.1
* openvpn-auth-pam-plugin-2.6.8-150600.3.3.1
* openvpn-devel-2.6.8-150600.3.3.1
* openvpn-debuginfo-2.6.8-150600.3.3.1
* openvpn-debugsource-2.6.8-150600.3.3.1
* openvpn-auth-pam-plugin-debuginfo-2.6.8-150600.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28882.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227546
1
0
01 Oct '24
# Recommended update for glibc
Announcement ID: SUSE-RU-2024:3503-1
Release Date: 2024-10-01T14:14:15Z
Rating: moderate
References:
* bsc#1228661
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for glibc fixes the following issue:
* fix memory malloc problem: Initiate tcache shutdown even without allocations
(bsc#1228661).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3503=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3503=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3503=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3503=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3503=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3503=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3503=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3503=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3503=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3503=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3503=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3503=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3503=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3503=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3503=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3503=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3503=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3503=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3503=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3503=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3503=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3503=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3503=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3503=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3503=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* openSUSE Leap 15.3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-html-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* openSUSE Leap 15.3 (i686)
* glibc-2.31-150300.89.1
* glibc-devel-static-2.31-150300.89.1
* glibc-locale-2.31-150300.89.1
* glibc-devel-debuginfo-2.31-150300.89.1
* glibc-profile-2.31-150300.89.1
* glibc-locale-base-2.31-150300.89.1
* glibc-debuginfo-2.31-150300.89.1
* glibc-debugsource-2.31-150300.89.1
* glibc-locale-base-debuginfo-2.31-150300.89.1
* glibc-devel-2.31-150300.89.1
* openSUSE Leap 15.3 (x86_64)
* glibc-utils-32bit-debuginfo-2.31-150300.89.2
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-utils-32bit-2.31-150300.89.2
* glibc-profile-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-devel-static-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* glibc-utils-64bit-2.31-150300.89.2
* glibc-devel-64bit-2.31-150300.89.2
* glibc-devel-static-64bit-2.31-150300.89.2
* glibc-profile-64bit-2.31-150300.89.2
* glibc-64bit-debuginfo-2.31-150300.89.2
* glibc-utils-64bit-debuginfo-2.31-150300.89.2
* glibc-locale-base-64bit-debuginfo-2.31-150300.89.2
* glibc-devel-64bit-debuginfo-2.31-150300.89.2
* glibc-64bit-2.31-150300.89.2
* glibc-locale-base-64bit-2.31-150300.89.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* openSUSE Leap 15.5 (x86_64)
* glibc-utils-32bit-debuginfo-2.31-150300.89.2
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-utils-32bit-2.31-150300.89.2
* glibc-profile-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-devel-static-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* openSUSE Leap 15.5 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-html-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-extra-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* Basesystem Module 15-SP5 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* Basesystem Module 15-SP5 (x86_64)
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-utils-2.31-150300.89.2
* Development Tools Module 15-SP5 (x86_64)
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-devel-32bit-2.31-150300.89.1
* glibc-debuginfo-2.31-150300.89.2
* glibc-utils-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-32bit-2.31-150300.89.1
* glibc-devel-debuginfo-2.31-150300.89.2
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* glibc-profile-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-utils-src-debugsource-2.31-150300.89.2
* nscd-2.31-150300.89.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Manager Proxy 4.3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-extra-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-32bit-2.31-150300.89.1
* nscd-2.31-150300.89.2
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Manager Proxy 4.3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-extra-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-32bit-2.31-150300.89.1
* nscd-2.31-150300.89.2
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* glibc-extra-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Manager Server 4.3 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Manager Server 4.3 (x86_64)
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* glibc-utils-2.31-150300.89.2
* glibc-extra-2.31-150300.89.2
* glibc-devel-static-2.31-150300.89.2
* glibc-debugsource-2.31-150300.89.2
* glibc-profile-2.31-150300.89.2
* glibc-utils-src-debugsource-2.31-150300.89.2
* glibc-extra-debuginfo-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-utils-debuginfo-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* nscd-debuginfo-2.31-150300.89.2
* nscd-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* glibc-devel-debuginfo-2.31-150300.89.2
* SUSE Enterprise Storage 7.1 (noarch)
* glibc-info-2.31-150300.89.2
* glibc-lang-2.31-150300.89.2
* glibc-i18ndata-2.31-150300.89.2
* SUSE Enterprise Storage 7.1 (x86_64)
* glibc-locale-base-32bit-2.31-150300.89.1
* glibc-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-2.31-150300.89.1
* glibc-32bit-2.31-150300.89.1
* glibc-locale-base-32bit-debuginfo-2.31-150300.89.1
* glibc-devel-32bit-debuginfo-2.31-150300.89.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* glibc-debugsource-2.31-150300.89.2
* glibc-locale-base-2.31-150300.89.2
* glibc-locale-2.31-150300.89.2
* glibc-2.31-150300.89.2
* glibc-debuginfo-2.31-150300.89.2
* glibc-locale-base-debuginfo-2.31-150300.89.2
* glibc-devel-2.31-150300.89.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228661
1
0
01 Oct '24
# Recommended update for glibc
Announcement ID: SUSE-RU-2024:3504-1
Release Date: 2024-10-01T14:22:36Z
Rating: moderate
References:
* bsc#1230638
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for glibc fixes the following issue:
* Use nss-systemd by default also in SLE (bsc#1230638).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3504=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3504=1 openSUSE-SLE-15.6-2024-3504=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3504=1
## Package List:
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-utils-2.38-150600.14.11.2
* glibc-devel-static-2.38-150600.14.11.2
* glibc-utils-src-debugsource-2.38-150600.14.11.2
* glibc-debuginfo-2.38-150600.14.11.2
* glibc-debugsource-2.38-150600.14.11.2
* glibc-utils-debuginfo-2.38-150600.14.11.2
* Development Tools Module 15-SP6 (x86_64)
* glibc-devel-32bit-debuginfo-2.38-150600.14.11.2
* glibc-devel-32bit-2.38-150600.14.11.2
* glibc-32bit-debuginfo-2.38-150600.14.11.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-locale-base-debuginfo-2.38-150600.14.11.2
* glibc-devel-2.38-150600.14.11.2
* glibc-devel-static-2.38-150600.14.11.2
* glibc-devel-debuginfo-2.38-150600.14.11.2
* libnsl1-2.38-150600.14.11.2
* glibc-profile-2.38-150600.14.11.2
* glibc-debuginfo-2.38-150600.14.11.2
* glibc-locale-2.38-150600.14.11.2
* glibc-locale-base-2.38-150600.14.11.2
* glibc-debugsource-2.38-150600.14.11.2
* glibc-2.38-150600.14.11.2
* libnsl1-debuginfo-2.38-150600.14.11.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glibc-extra-2.38-150600.14.11.2
* glibc-utils-2.38-150600.14.11.2
* glibc-utils-src-debugsource-2.38-150600.14.11.2
* glibc-extra-debuginfo-2.38-150600.14.11.2
* nscd-debuginfo-2.38-150600.14.11.2
* glibc-utils-debuginfo-2.38-150600.14.11.2
* nscd-2.38-150600.14.11.2
* openSUSE Leap 15.6 (noarch)
* glibc-lang-2.38-150600.14.11.2
* glibc-html-2.38-150600.14.11.2
* glibc-info-2.38-150600.14.11.2
* glibc-i18ndata-2.38-150600.14.11.2
* openSUSE Leap 15.6 (x86_64)
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.11.2
* glibc-profile-32bit-2.38-150600.14.11.2
* libnsl1-32bit-2.38-150600.14.11.2
* glibc-utils-32bit-debuginfo-2.38-150600.14.11.2
* glibc-32bit-2.38-150600.14.11.2
* glibc-devel-static-32bit-2.38-150600.14.11.2
* libnsl1-32bit-debuginfo-2.38-150600.14.11.2
* glibc-devel-32bit-2.38-150600.14.11.2
* glibc-32bit-debuginfo-2.38-150600.14.11.2
* glibc-locale-base-32bit-2.38-150600.14.11.2
* glibc-devel-32bit-debuginfo-2.38-150600.14.11.2
* glibc-utils-32bit-2.38-150600.14.11.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* glibc-devel-64bit-debuginfo-2.38-150600.14.11.2
* glibc-utils-64bit-debuginfo-2.38-150600.14.11.2
* glibc-devel-static-64bit-2.38-150600.14.11.2
* libnsl1-64bit-2.38-150600.14.11.2
* libnsl1-64bit-debuginfo-2.38-150600.14.11.2
* glibc-locale-base-64bit-2.38-150600.14.11.2
* glibc-64bit-2.38-150600.14.11.2
* glibc-profile-64bit-2.38-150600.14.11.2
* glibc-locale-base-64bit-debuginfo-2.38-150600.14.11.2
* glibc-devel-64bit-2.38-150600.14.11.2
* glibc-64bit-debuginfo-2.38-150600.14.11.2
* glibc-utils-64bit-2.38-150600.14.11.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-locale-base-debuginfo-2.38-150600.14.11.2
* glibc-extra-2.38-150600.14.11.2
* glibc-devel-2.38-150600.14.11.2
* glibc-devel-debuginfo-2.38-150600.14.11.2
* libnsl1-2.38-150600.14.11.2
* glibc-profile-2.38-150600.14.11.2
* glibc-debuginfo-2.38-150600.14.11.2
* glibc-locale-2.38-150600.14.11.2
* glibc-extra-debuginfo-2.38-150600.14.11.2
* glibc-debugsource-2.38-150600.14.11.2
* glibc-locale-base-2.38-150600.14.11.2
* nscd-debuginfo-2.38-150600.14.11.2
* glibc-2.38-150600.14.11.2
* nscd-2.38-150600.14.11.2
* libnsl1-debuginfo-2.38-150600.14.11.2
* Basesystem Module 15-SP6 (noarch)
* glibc-lang-2.38-150600.14.11.2
* glibc-i18ndata-2.38-150600.14.11.2
* glibc-info-2.38-150600.14.11.2
* Basesystem Module 15-SP6 (x86_64)
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.11.2
* libnsl1-32bit-2.38-150600.14.11.2
* glibc-32bit-2.38-150600.14.11.2
* libnsl1-32bit-debuginfo-2.38-150600.14.11.2
* glibc-32bit-debuginfo-2.38-150600.14.11.2
* glibc-locale-base-32bit-2.38-150600.14.11.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230638
1
0
01 Oct '24
# Security update for OpenIPMI
Announcement ID: SUSE-SU-2024:3505-1
Release Date: 2024-10-01T14:43:37Z
Rating: moderate
References:
* bsc#1229910
Cross-References:
* CVE-2024-42934
CVSS scores:
* CVE-2024-42934 ( SUSE ): 2.3
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42934 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for OpenIPMI fixes the following issues:
* CVE-2024-42934: crash or message authentication bypass on IPMI simulator due
to missing bounds check. (bsc#1229910)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3505=1 openSUSE-SLE-15.6-2024-3505=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3505=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* OpenIPMI-debugsource-2.0.31-150600.10.3.1
* OpenIPMI-python3-debuginfo-2.0.31-150600.10.3.1
* OpenIPMI-debuginfo-2.0.31-150600.10.3.1
* OpenIPMI-python3-2.0.31-150600.10.3.1
* libOpenIPMI0-debuginfo-2.0.31-150600.10.3.1
* OpenIPMI-2.0.31-150600.10.3.1
* OpenIPMI-devel-2.0.31-150600.10.3.1
* libOpenIPMI0-2.0.31-150600.10.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* OpenIPMI-debugsource-2.0.31-150600.10.3.1
* OpenIPMI-debuginfo-2.0.31-150600.10.3.1
* libOpenIPMI0-debuginfo-2.0.31-150600.10.3.1
* OpenIPMI-2.0.31-150600.10.3.1
* OpenIPMI-devel-2.0.31-150600.10.3.1
* libOpenIPMI0-2.0.31-150600.10.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-42934.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229910
1
0
SUSE-SU-2024:3507-1: important: Security update for MozillaThunderbird
by OPENSUSE-UPDATES 01 Oct '24
by OPENSUSE-UPDATES 01 Oct '24
01 Oct '24
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2024:3507-1
Release Date: 2024-10-01T15:02:22Z
Rating: important
References:
* bsc#1184272
* bsc#1226316
* bsc#1228648
* bsc#1229821
Cross-References:
* CVE-2024-6600
* CVE-2024-6601
* CVE-2024-6602
* CVE-2024-6603
* CVE-2024-6604
* CVE-2024-6606
* CVE-2024-6607
* CVE-2024-6608
* CVE-2024-6609
* CVE-2024-6610
* CVE-2024-6611
* CVE-2024-6612
* CVE-2024-6613
* CVE-2024-6614
* CVE-2024-6615
* CVE-2024-7518
* CVE-2024-7519
* CVE-2024-7520
* CVE-2024-7521
* CVE-2024-7522
* CVE-2024-7525
* CVE-2024-7526
* CVE-2024-7527
* CVE-2024-7528
* CVE-2024-7529
* CVE-2024-8381
* CVE-2024-8382
* CVE-2024-8384
* CVE-2024-8385
* CVE-2024-8386
* CVE-2024-8387
* CVE-2024-8394
CVSS scores:
* CVE-2024-6600 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-6601 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-6602 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L
* CVE-2024-6603 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2024-6604 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-6606 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L
* CVE-2024-6607 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-6608 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-6608 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-6609 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
* CVE-2024-6609 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-6610 ( SUSE ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
* CVE-2024-6610 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-6611 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-6612 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-6614 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-6615 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7518 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
* CVE-2024-7518 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2024-7519 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7519 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-7520 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7520 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7521 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7521 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7522 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2024-7522 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7525 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7525 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-7526 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
* CVE-2024-7526 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2024-7526 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-7527 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7527 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7528 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7528 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-7529 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-7529 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2024-8381 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-8381 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8382 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-8382 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8384 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-8384 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8385 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8385 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8386 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-8386 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-8387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-8387 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8394 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that solves 32 vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
* Mozilla Thunderbird 128.2.3 MFSA 2024-43 (bsc#1229821)
* CVE-2024-8394: Crash when aborting verification of OTR chat.
* CVE-2024-8385: WASM type confusion involving ArrayTypes.
* CVE-2024-8381: Type confusion when looking up a property name in a "with"
block.
* CVE-2024-8382: Internal event interfaces were exposed to web content when
browser EventHandler listener callbacks ran.
* CVE-2024-8384: Garbage collection could mis-color cross-compartment objects
in OOM conditions.
* CVE-2024-8386: SelectElements could be shown over another site if popups are
allowed.
* CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2,
and Thunderbird 128.2. MFSA 2024-37 (bsc#1228648)
* CVE-2024-7518: Fullscreen notification dialog can be obscured by document
content.
* CVE-2024-7519: Out of bounds memory access in graphics shared memory
handling.
* CVE-2024-7520: Type confusion in WebAssembly.
* CVE-2024-7521: Incomplete WebAssembly exception handing.
* CVE-2024-7522: Out of bounds read in editor component.
* CVE-2024-7525: Missing permission check when creating a StreamFilter.
* CVE-2024-7526: Uninitialized memory used by WebGL.
* CVE-2024-7527: Use-after-free in JavaScript garbage collection.
* CVE-2024-7528: Use-after-free in IndexedDB.
* CVE-2024-7529: Document content could partially obscure security prompts.
MFSA 2024-32 (bsc#1226316)
* CVE-2024-6606: Out-of-bounds read in clipboard component.
* CVE-2024-6607: Leaving pointerlock by pressing the escape key could be
prevented.
* CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock.
* CVE-2024-6609: Memory corruption in NSS.
* CVE-2024-6610: Form validation popups could block exiting full-screen mode.
* CVE-2024-6600: Memory corruption in WebGL API.
* CVE-2024-6601: Race condition in permission assignment.
* CVE-2024-6602: Memory corruption in NSS.
* CVE-2024-6603: Memory corruption in thread creation.
* CVE-2024-6611: Incorrect handling of SameSite cookies.
* CVE-2024-6612: CSP violation leakage when using devtools.
* CVE-2024-6613: Incorrect listing of stack frames.
* CVE-2024-6614: Incorrect listing of stack frames.
* CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13,
Thunderbird 128, and Thunderbird 115.13.
* CVE-2024-6615: Memory safety bugs fixed in Firefox 128 and Thunderbird 128.
Bug fixes: \- Recommend libfido2-udev in order to try to get security keys (e.g.
Yubikeys) working out of the box. (bsc#1184272)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3507=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3507=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3507=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3507=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3507=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3507=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3507=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* MozillaThunderbird-debugsource-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-other-128.2.3-150200.8.177.1
* MozillaThunderbird-translations-common-128.2.3-150200.8.177.1
* MozillaThunderbird-128.2.3-150200.8.177.1
* MozillaThunderbird-debuginfo-128.2.3-150200.8.177.1
## References:
* https://www.suse.com/security/cve/CVE-2024-6600.html
* https://www.suse.com/security/cve/CVE-2024-6601.html
* https://www.suse.com/security/cve/CVE-2024-6602.html
* https://www.suse.com/security/cve/CVE-2024-6603.html
* https://www.suse.com/security/cve/CVE-2024-6604.html
* https://www.suse.com/security/cve/CVE-2024-6606.html
* https://www.suse.com/security/cve/CVE-2024-6607.html
* https://www.suse.com/security/cve/CVE-2024-6608.html
* https://www.suse.com/security/cve/CVE-2024-6609.html
* https://www.suse.com/security/cve/CVE-2024-6610.html
* https://www.suse.com/security/cve/CVE-2024-6611.html
* https://www.suse.com/security/cve/CVE-2024-6612.html
* https://www.suse.com/security/cve/CVE-2024-6613.html
* https://www.suse.com/security/cve/CVE-2024-6614.html
* https://www.suse.com/security/cve/CVE-2024-6615.html
* https://www.suse.com/security/cve/CVE-2024-7518.html
* https://www.suse.com/security/cve/CVE-2024-7519.html
* https://www.suse.com/security/cve/CVE-2024-7520.html
* https://www.suse.com/security/cve/CVE-2024-7521.html
* https://www.suse.com/security/cve/CVE-2024-7522.html
* https://www.suse.com/security/cve/CVE-2024-7525.html
* https://www.suse.com/security/cve/CVE-2024-7526.html
* https://www.suse.com/security/cve/CVE-2024-7527.html
* https://www.suse.com/security/cve/CVE-2024-7528.html
* https://www.suse.com/security/cve/CVE-2024-7529.html
* https://www.suse.com/security/cve/CVE-2024-8381.html
* https://www.suse.com/security/cve/CVE-2024-8382.html
* https://www.suse.com/security/cve/CVE-2024-8384.html
* https://www.suse.com/security/cve/CVE-2024-8385.html
* https://www.suse.com/security/cve/CVE-2024-8386.html
* https://www.suse.com/security/cve/CVE-2024-8387.html
* https://www.suse.com/security/cve/CVE-2024-8394.html
* https://bugzilla.suse.com/show_bug.cgi?id=1184272
* https://bugzilla.suse.com/show_bug.cgi?id=1226316
* https://bugzilla.suse.com/show_bug.cgi?id=1228648
* https://bugzilla.suse.com/show_bug.cgi?id=1229821
1
0
openSUSE-RU-2024:0324-1: moderate: Recommended update for xfburn
by maintenanceďĽ opensuse.org 01 Oct '24
by maintenanceďĽ opensuse.org 01 Oct '24
01 Oct '24
openSUSE Recommended Update: Recommended update for xfburn
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0324-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for xfburn fixes the following issues:
- Update to version 0.7.2
* Fix help dialog opening on unintended keypresses
- Update to version 0.7.1
* Simulate F1 accelerator for Help
* Add Contents entry to Help menu
* build: Fix autoconf warning
* Add missing end tag to ui file
* I18n: Update po/LINGUAS list
* build: Use XDT_VERSION_INIT and get rid of configure.ac.in
* build: Switch from intltool to gettext
* Fix bashism in configure test
* Add missing G_END_DECLS
* Remove roles from about dialog
* Update copyright information
* Look for toast and img extensions, not just iso
* Fix segfault when settings file is readonly
* Update README.md
* Translation Updates
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-324=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
xfburn-0.7.2-bp155.2.3.1
- openSUSE Backports SLE-15-SP5 (noarch):
xfburn-lang-0.7.2-bp155.2.3.1
References:
1
0
openSUSE-RU-2024:0322-1: moderate: Recommended update for read-edid
by maintenanceďĽ opensuse.org 30 Sep '24
by maintenanceďĽ opensuse.org 30 Sep '24
30 Sep '24
openSUSE Recommended Update: Recommended update for read-edid
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0322-1
Rating: moderate
References: #1219395
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for read-edid fixes the following issues:
- Drop libx86 support, it's no longer maintained in Factory.
- Add wrapper for get-edid (boo#1219395)
* default to not calling VBE BIOS which may crash
* print a warning message when i2c-dev driver is not loaded
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-322=1
Package List:
- openSUSE Backports SLE-15-SP5 (i586 x86_64):
read-edid-3.0.2-bp155.4.3.1
References:
https://bugzilla.suse.com/1219395
1
0
openSUSE-RU-2024:0321-1: moderate: Recommended update for read-edid
by maintenanceďĽ opensuse.org 30 Sep '24
by maintenanceďĽ opensuse.org 30 Sep '24
30 Sep '24
openSUSE Recommended Update: Recommended update for read-edid
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0321-1
Rating: moderate
References: #1219395
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for read-edid fixes the following issues:
- Drop libx86 support, it's no longer maintained in Factory.
- Add wrapper for get-edid (boo#1219395)
* default to not calling VBE BIOS which may crash
* print a warning message when i2c-dev driver is not loaded
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-321=1
Package List:
- openSUSE Backports SLE-15-SP6 (i586 x86_64):
read-edid-3.0.2-bp156.5.3.1
References:
https://bugzilla.suse.com/1219395
1
0
openSUSE-RU-2024:0323-1: moderate: Recommended update for xfce4-dict
by maintenanceďĽ opensuse.org 30 Sep '24
by maintenanceďĽ opensuse.org 30 Sep '24
30 Sep '24
openSUSE Recommended Update: Recommended update for xfce4-dict
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0323-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for xfce4-dict fixes the following issues:
Update to version 0.8.7
* panel-plugin: Drop submenu (#2)
* panel-plugin: Add submenus to toggle search mode (#2)
* panel-plugin: Reduce default text size
* panel-plugin: Restore function of the button in text entry
* Change log level (#17)
* prefs: Add radio buttons to correct group
* scan-build: Fix deadcode.DeadStores
* scan-build: Add false positive file
* I18n: Update po/LINGUAS list
* build: Use XDT_VERSION_INIT and get rid of configure.ac.in
* build: Switch from intltool to gettext
* Translation Updates
Update to version 0.8.6
* Use getaddrinfo(3) to support IPv6 DICT servers
* Add icons at missing sizes, clean up SVG metadata
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-323=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):
xfce4-dict-0.8.7-bp156.2.3.1
xfce4-panel-plugin-dict-0.8.7-bp156.2.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
xfce4-dict-lang-0.8.7-bp156.2.3.1
References:
1
0
30 Sep '24
# Security update for openssl-3
Announcement ID: SUSE-SU-2024:3500-1
Release Date: 2024-09-30T14:14:23Z
Rating: important
References:
* bsc#1230698
Cross-References:
* CVE-2024-41996
CVSS scores:
* CVE-2024-41996 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41996 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves one vulnerability can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2024-41996: Validating the order of the public keys in the Diffie-
Hellman Key Agreement Protocol, when an approved safe prime is used, allows
remote attackers to trigger expensive server-side DHE (bsc#1230698)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3500=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3500=1 openSUSE-SLE-15.5-2024-3500=1
## Package List:
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* openssl-3-debuginfo-3.0.8-150500.5.45.1
* libopenssl3-3.0.8-150500.5.45.1
* openssl-3-debugsource-3.0.8-150500.5.45.1
* libopenssl3-debuginfo-3.0.8-150500.5.45.1
* libopenssl-3-devel-3.0.8-150500.5.45.1
* openssl-3-3.0.8-150500.5.45.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openssl-3-debuginfo-3.0.8-150500.5.45.1
* libopenssl3-3.0.8-150500.5.45.1
* openssl-3-debugsource-3.0.8-150500.5.45.1
* libopenssl3-debuginfo-3.0.8-150500.5.45.1
* libopenssl-3-devel-3.0.8-150500.5.45.1
* openssl-3-3.0.8-150500.5.45.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl-3-devel-32bit-3.0.8-150500.5.45.1
* libopenssl3-32bit-debuginfo-3.0.8-150500.5.45.1
* libopenssl3-32bit-3.0.8-150500.5.45.1
* openSUSE Leap 15.5 (noarch)
* openssl-3-doc-3.0.8-150500.5.45.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150500.5.45.1
* libopenssl3-64bit-debuginfo-3.0.8-150500.5.45.1
* libopenssl-3-devel-64bit-3.0.8-150500.5.45.1
## References:
* https://www.suse.com/security/cve/CVE-2024-41996.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230698
1
0
openSUSE-SU-2024:0320-1: important: Security update for chromium
by opensuse-securityďĽ opensuse.org 30 Sep '24
by opensuse-securityďĽ opensuse.org 30 Sep '24
30 Sep '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0320-1
Rating: important
References: #1230964
Cross-References: CVE-2024-9120 CVE-2024-9121 CVE-2024-9122
CVE-2024-9123
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 129.0.6668.70 (stable released 2024-09-24) (boo#1230964)
* CVE-2024-9120: Use after free in Dawn
* CVE-2024-9121: Inappropriate implementation in V8
* CVE-2024-9122: Type Confusion in V8
* CVE-2024-9123: Integer overflow in Skia
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-320=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 x86_64):
chromedriver-129.0.6668.70-bp155.2.120.1
chromium-129.0.6668.70-bp155.2.120.1
References:
https://www.suse.com/security/cve/CVE-2024-9120.html
https://www.suse.com/security/cve/CVE-2024-9121.html
https://www.suse.com/security/cve/CVE-2024-9122.html
https://www.suse.com/security/cve/CVE-2024-9123.html
https://bugzilla.suse.com/1230964
1
0
SUSE-RU-2024:3488-1: important: Recommended update for installation-images
by OPENSUSE-UPDATES 30 Sep '24
by OPENSUSE-UPDATES 30 Sep '24
30 Sep '24
# Recommended update for installation-images
Announcement ID: SUSE-RU-2024:3488-1
Rating: important
References:
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that can now be installed.
## Description:
This update for installation-images fixes the following issues:
* Rebuilding images with newer grub2
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3488=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3488=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* installation-images-debuginfodeps-SLES-16.58.10-150500.3.11.1
* skelcd-installer-net-SLES-16.58.10-150500.3.11.1
* install-initrd-SLES-16.58.10-150500.3.11.1
* skelcd-installer-SLES-16.58.10-150500.3.11.1
* installation-images-SLES-16.58.10-150500.3.11.1
* openSUSE Leap 15.5 (noarch)
* tftpboot-installation-SLE-15-SP5-s390x-16.58.10-150500.3.11.1
* tftpboot-installation-SLE-15-SP5-aarch64-16.58.10-150500.3.11.1
* tftpboot-installation-SLE-15-SP5-ppc64le-16.58.10-150500.3.11.1
* tftpboot-installation-SLE-15-SP5-x86_64-16.58.10-150500.3.11.1
* Basesystem Module 15-SP5 (noarch)
* tftpboot-installation-SLE-15-SP5-s390x-16.58.10-150500.3.11.1
* tftpboot-installation-SLE-15-SP5-aarch64-16.58.10-150500.3.11.1
* tftpboot-installation-SLE-15-SP5-ppc64le-16.58.10-150500.3.11.1
* tftpboot-installation-SLE-15-SP5-x86_64-16.58.10-150500.3.11.1
1
0
SUSE-RU-2024:3489-1: important: Recommended update for installation-images
by OPENSUSE-UPDATES 30 Sep '24
by OPENSUSE-UPDATES 30 Sep '24
30 Sep '24
# Recommended update for installation-images
Announcement ID: SUSE-RU-2024:3489-1
Rating: important
References:
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that can now be installed.
## Description:
This update for installation-images fixes the following issues:
* Rebuilding images with newer grub2
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3489=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3489=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3489=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3489=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3489=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3489=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3489=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3489=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3489=1
## Package List:
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* SUSE Manager Proxy 4.3 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* SUSE Manager Server 4.3 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* installation-images-debuginfodeps-SLES-16.57.29-150400.3.21.1
* skelcd-installer-SLES-16.57.29-150400.3.21.1
* skelcd-installer-net-SLES-16.57.29-150400.3.21.1
* install-initrd-SLES-16.57.29-150400.3.21.1
* installation-images-SLES-16.57.29-150400.3.21.1
* openSUSE Leap 15.4 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* tftpboot-installation-SLE-15-SP4-aarch64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-x86_64-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-s390x-16.57.29-150400.3.21.1
* tftpboot-installation-SLE-15-SP4-ppc64le-16.57.29-150400.3.21.1
1
0
SUSE-RU-2024:3490-1: moderate: Recommended update for perl-XML-LibXSLT
by OPENSUSE-UPDATES 30 Sep '24
by OPENSUSE-UPDATES 30 Sep '24
30 Sep '24
# Recommended update for perl-XML-LibXSLT
Announcement ID: SUSE-RU-2024:3490-1
Rating: moderate
References:
* bsc#1197798
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for perl-XML-LibXSLT fixes the following issues:
* testsuite: do not check version of libxslt and libxml2 (bsc#1197798)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3490=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3490=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3490=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3490=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3490=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3490=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3490=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3490=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3490=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3490=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3490=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3490=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3490=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3490=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3490=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3490=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3490=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3490=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3490=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Manager Proxy 4.3 (x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* perl-XML-LibXSLT-debugsource-1.95-150000.3.3.1
* perl-XML-LibXSLT-debuginfo-1.95-150000.3.3.1
* perl-XML-LibXSLT-1.95-150000.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1197798
1
0
30 Sep '24
# Recommended update for xerces-c
Announcement ID: SUSE-RU-2024:3491-1
Rating: moderate
References:
* bsc#1223088
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for xerces-c fixes the following issues:
* Enable gnuiconv transcoder (bsc#1223088)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3491=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3491=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3491=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3491=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3491=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3491=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3491=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3491=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3491=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3491=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3491=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3491=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3491=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3491=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3491=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3491=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3491=1
## Package List:
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* xerces-c-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-doc-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* openSUSE Leap 15.3 (x86_64)
* libxerces-c-3_2-32bit-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-3_2-32bit-3.2.3-150300.3.9.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libxerces-c-3_2-64bit-3.2.3-150300.3.9.1
* libxerces-c-3_2-64bit-debuginfo-3.2.3-150300.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* xerces-c-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-doc-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* openSUSE Leap 15.5 (x86_64)
* libxerces-c-3_2-32bit-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-3_2-32bit-3.2.3-150300.3.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* xerces-c-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-doc-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* openSUSE Leap 15.6 (x86_64)
* libxerces-c-3_2-32bit-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-3_2-32bit-3.2.3-150300.3.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libxerces-c-3_2-debuginfo-3.2.3-150300.3.9.1
* libxerces-c-devel-3.2.3-150300.3.9.1
* libxerces-c-3_2-3.2.3-150300.3.9.1
* xerces-c-debugsource-3.2.3-150300.3.9.1
* xerces-c-debuginfo-3.2.3-150300.3.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223088
1
0
# Recommended update for udisks2
Announcement ID: SUSE-RU-2024:3492-1
Rating: low
References:
* bsc#1227458
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for udisks2 fixes the following issues:
* Add libudisks2-0_btrfs to PackeHub 15-SP6 (bsc#1227458)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3492=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3492=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3492=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3492=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3492=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3492=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3492=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3492=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3492=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3492=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3492=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libudisks2-0_lsm-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-devel-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* libudisks2-0_zram-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_vdo-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lsm-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_vdo-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_zram-2.9.2-150400.3.8.1
* typelib-1_0-UDisks-2_0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0_bcache-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_bcache-2.9.2-150400.3.8.1
* openSUSE Leap 15.4 (noarch)
* udisks2-lang-2.9.2-150400.3.8.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libudisks2-0_lsm-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-devel-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* libudisks2-0_zram-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_vdo-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lsm-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_vdo-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_zram-2.9.2-150400.3.8.1
* typelib-1_0-UDisks-2_0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0_bcache-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_bcache-2.9.2-150400.3.8.1
* openSUSE Leap 15.5 (noarch)
* udisks2-lang-2.9.2-150400.3.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libudisks2-0_lsm-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-devel-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* libudisks2-0_zram-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_vdo-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lsm-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_vdo-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_zram-2.9.2-150400.3.8.1
* typelib-1_0-UDisks-2_0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0_bcache-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_bcache-2.9.2-150400.3.8.1
* openSUSE Leap 15.6 (noarch)
* udisks2-lang-2.9.2-150400.3.8.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libudisks2-0_lvm2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-debuginfo-2.9.2-150400.3.8.1
* udisks2-debuginfo-2.9.2-150400.3.8.1
* libudisks2-0_lvm2-2.9.2-150400.3.8.1
* libudisks2-0_btrfs-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* udisks2-debuginfo-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-devel-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* typelib-1_0-UDisks-2_0-2.9.2-150400.3.8.1
* Basesystem Module 15-SP5 (noarch)
* udisks2-lang-2.9.2-150400.3.8.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* udisks2-debuginfo-2.9.2-150400.3.8.1
* udisks2-2.9.2-150400.3.8.1
* libudisks2-0-devel-2.9.2-150400.3.8.1
* libudisks2-0-2.9.2-150400.3.8.1
* udisks2-debugsource-2.9.2-150400.3.8.1
* libudisks2-0-debuginfo-2.9.2-150400.3.8.1
* typelib-1_0-UDisks-2_0-2.9.2-150400.3.8.1
* Basesystem Module 15-SP6 (noarch)
* udisks2-lang-2.9.2-150400.3.8.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1227458
1
0
30 Sep '24
# Recommended update for gnome-icon-theme
Announcement ID: SUSE-RU-2024:3493-1
Rating: low
References:
* bsc#1229135
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for gnome-icon-theme fixes the following issues:
* Add gnome-icon-theme to PackeHub 15-SP6 (bsc#1229135)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3493=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3493=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3493=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3493=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3493=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* gnome-icon-theme-3.12.0-150400.14.2.1
* openSUSE Leap 15.5 (noarch)
* gnome-icon-theme-3.12.0-150400.14.2.1
* openSUSE Leap 15.6 (noarch)
* gnome-icon-theme-3.12.0-150400.14.2.1
* Desktop Applications Module 15-SP5 (noarch)
* gnome-icon-theme-3.12.0-150400.14.2.1
* SUSE Package Hub 15 15-SP6 (noarch)
* gnome-icon-theme-3.12.0-150400.14.2.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1229135
1
0
# Recommended update for gupnp
Announcement ID: SUSE-RU-2024:3494-1
Rating: low
References:
* bsc#1224398
Affected Products:
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP5
* SUSE Package Hub 15 15-SP6
An update that has one fix can now be installed.
## Description:
This update for gupnp fixes the following issues:
* Add libgupnp-1_2-1 to PackeHub 15-SP6 (bsc#1224398)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3494=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3494=1
* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3494=1
* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-3494=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3494=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-3494=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gupnp-debugsource-1.4.3-150400.3.2.1
* libgupnp-1_2-1-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-1.4.3-150400.3.2.1
* typelib-1_0-GUPnP-1_0-1.4.3-150400.3.2.1
* libgupnp-devel-1.4.3-150400.3.2.1
* openSUSE Leap 15.4 (x86_64)
* libgupnp-1_2-1-32bit-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-32bit-1.4.3-150400.3.2.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgupnp-1_2-1-64bit-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-64bit-1.4.3-150400.3.2.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gupnp-debugsource-1.4.3-150400.3.2.1
* libgupnp-1_2-1-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-1.4.3-150400.3.2.1
* typelib-1_0-GUPnP-1_0-1.4.3-150400.3.2.1
* libgupnp-devel-1.4.3-150400.3.2.1
* openSUSE Leap 15.5 (x86_64)
* libgupnp-1_2-1-32bit-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-32bit-1.4.3-150400.3.2.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gupnp-debugsource-1.4.3-150400.3.2.1
* libgupnp-1_2-1-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-1.4.3-150400.3.2.1
* typelib-1_0-GUPnP-1_0-1.4.3-150400.3.2.1
* libgupnp-devel-1.4.3-150400.3.2.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* gupnp-debugsource-1.4.3-150400.3.2.1
* typelib-1_0-GUPnP-1_0-1.4.3-150400.3.2.1
* libgupnp-devel-1.4.3-150400.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* libgupnp-1_2-1-1.4.3-150400.3.2.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* gupnp-debugsource-1.4.3-150400.3.2.1
* libgupnp-1_2-1-debuginfo-1.4.3-150400.3.2.1
* libgupnp-1_2-1-1.4.3-150400.3.2.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1224398
1
0
SUSE-RU-2024:3495-1: moderate: Recommended update for release-notes-sles
by OPENSUSE-UPDATES 30 Sep '24
by OPENSUSE-UPDATES 30 Sep '24
30 Sep '24
# Recommended update for release-notes-sles
Announcement ID: SUSE-RU-2024:3495-1
Rating: moderate
References:
* bsc#933411
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for release-notes-sles fixes the following issue:
* Version update 15.6.20240926 (bsc#933411).
Corrected a wrong entry regarding 389 and OpenLDAP
* OpenLDAP will be replaced by 389 in future SLE versions
* OpenLDAP has been re-added to SLE 15 SP5 and SP6 to prolong the migration time window
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-2024-3495=1 SUSE-SLE-
INSTALLER-15-SP5-2024-3495=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3495=1 openSUSE-SLE-15.5-2024-3495=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3495=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3495=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3495=1
## Package List:
* SUSE Linux Enterprise Server 15 SP5 (noarch)
* release-notes-sles-15.5.20240926-150500.3.18.2
* openSUSE Leap 15.5 (noarch)
* release-notes-sles-15.5.20240926-150500.3.18.2
* SUSE Linux Enterprise High Performance Computing 15 SP5 (noarch)
* release-notes-sles-15.5.20240926-150500.3.18.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* release-notes-sles-15.5.20240926-150500.3.18.2
* SUSE Linux Enterprise Desktop 15 SP5 (noarch)
* release-notes-sles-15.5.20240926-150500.3.18.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=933411
1
0
30 Sep '24
# Recommended update for rsyslog
Announcement ID: SUSE-RU-2024:3496-1
Rating: moderate
References:
* bsc#1230984
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for rsyslog fixes the following issue:
* restart daemon after update at the end of the transaction (bsc#1230984).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3496=1 openSUSE-SLE-15.6-2024-3496=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3496=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3496=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* rsyslog-module-gssapi-8.2406.0-150600.12.6.2
* rsyslog-module-elasticsearch-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-udpspoof-8.2406.0-150600.12.6.2
* rsyslog-module-omtcl-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-omhttpfs-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-gcrypt-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-gtls-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-snmp-8.2406.0-150600.12.6.2
* rsyslog-module-mmnormalize-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-ossl-8.2406.0-150600.12.6.2
* rsyslog-module-gssapi-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-omtcl-8.2406.0-150600.12.6.2
* rsyslog-module-dbi-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-dbi-8.2406.0-150600.12.6.2
* rsyslog-module-mmnormalize-8.2406.0-150600.12.6.2
* rsyslog-8.2406.0-150600.12.6.2
* rsyslog-module-omamqp1-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-mysql-8.2406.0-150600.12.6.2
* rsyslog-module-gtls-8.2406.0-150600.12.6.2
* rsyslog-module-omamqp1-8.2406.0-150600.12.6.2
* rsyslog-debugsource-8.2406.0-150600.12.6.2
* rsyslog-module-udpspoof-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-ossl-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-pgsql-8.2406.0-150600.12.6.2
* rsyslog-module-elasticsearch-8.2406.0-150600.12.6.2
* rsyslog-module-kafka-8.2406.0-150600.12.6.2
* rsyslog-module-snmp-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-relp-8.2406.0-150600.12.6.2
* rsyslog-module-gcrypt-8.2406.0-150600.12.6.2
* rsyslog-module-kafka-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-doc-8.2406.0-150600.12.6.2
* rsyslog-module-pgsql-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-diag-tools-8.2406.0-150600.12.6.2
* rsyslog-module-relp-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-mysql-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-diag-tools-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-omhttpfs-8.2406.0-150600.12.6.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rsyslog-8.2406.0-150600.12.6.2
* rsyslog-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-debugsource-8.2406.0-150600.12.6.2
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* rsyslog-module-gssapi-8.2406.0-150600.12.6.2
* rsyslog-module-relp-8.2406.0-150600.12.6.2
* rsyslog-module-snmp-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-debugsource-8.2406.0-150600.12.6.2
* rsyslog-module-mmnormalize-8.2406.0-150600.12.6.2
* rsyslog-module-udpspoof-8.2406.0-150600.12.6.2
* rsyslog-module-udpspoof-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-pgsql-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-relp-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-gtls-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-mysql-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-snmp-8.2406.0-150600.12.6.2
* rsyslog-module-mmnormalize-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-mysql-8.2406.0-150600.12.6.2
* rsyslog-module-pgsql-8.2406.0-150600.12.6.2
* rsyslog-module-gssapi-debuginfo-8.2406.0-150600.12.6.2
* rsyslog-module-gtls-8.2406.0-150600.12.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230984
1
0
SUSE-RU-2024:3497-1: moderate: Recommended update for release-notes-sles
by OPENSUSE-UPDATES 30 Sep '24
by OPENSUSE-UPDATES 30 Sep '24
30 Sep '24
# Recommended update for release-notes-sles
Announcement ID: SUSE-RU-2024:3497-1
Rating: moderate
References:
* bsc#933411
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for release-notes-sles fixes the following issue:
* Version update 15.6.20240926 (bsc#933411).
Corrected a wrong entry regarding 389 and OpenLDAP
* OpenLDAP will be replaced by 389 in future SLE versions
* OpenLDAP has been re-added to SLE 15 SP5 and SP6 to prolong the migration time window
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-2024-3497=1 SUSE-SLE-
INSTALLER-15-SP6-2024-3497=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3497=1 openSUSE-SLE-15.6-2024-3497=1
* SUSE Linux Enterprise High Performance Computing 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3497=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3497=1
* SUSE Linux Enterprise Desktop 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3497=1
## Package List:
* SUSE Linux Enterprise Server 15 SP6 (noarch)
* release-notes-sles-15.6.20240926-150600.3.6.2
* openSUSE Leap 15.6 (noarch)
* release-notes-sles-15.6.20240926-150600.3.6.2
* SUSE Linux Enterprise High Performance Computing 15 SP6 (noarch)
* release-notes-sles-15.6.20240926-150600.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* release-notes-sles-15.6.20240926-150600.3.6.2
* SUSE Linux Enterprise Desktop 15 SP6 (noarch)
* release-notes-sles-15.6.20240926-150600.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=933411
1
0
SUSE-RU-2024:3485-1: moderate: Recommended update for libzypp, zypper
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Recommended update for libzypp, zypper
Announcement ID: SUSE-RU-2024:3485-1
Rating: moderate
References:
* bsc#1228647
* bsc#1230267
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has two fixes can now be installed.
## Description:
This update for libzypp, zypper fixes the following issues:
* API refactoring. Prevent zypper from using now private libzypp symbols
(bsc#1230267)
* single_rpmtrans: fix installation of .src.rpms (bsc#1228647)
* Fix wrong numbers used in CommitSummary skipped/failed messages.
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3485=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3485=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3485=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3485=1 SUSE-SLE-Product-SUSE-
Manager-Server-4.3-2024-3485=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3485=1 SUSE-SLE-
INSTALLER-15-SP4-2024-3485=1
* SUSE Linux Enterprise Desktop 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3485=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3485=1 SUSE-SLE-Product-SUSE-
Manager-Retail-Branch-Server-4.3-2024-3485=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3485=1 SUSE-
SLE-INSTALLER-15-SP4-2024-3485=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3485=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3485=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3485=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3485=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3485=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3485=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3485=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3485=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* zypper-1.14.77-150400.3.62.2
* zypper-debuginfo-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* PackageKit-debuginfo-1.2.4-150400.3.22.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.22.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.22.1
* PackageKit-backend-dnf-1.2.4-150400.3.22.1
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-1.2.4-150400.3.22.1
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* PackageKit-gstreamer-plugin-1.2.4-150400.3.22.1
* libzypp-debugsource-17.35.11-150400.3.90.1
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* PackageKit-1.2.4-150400.3.22.1
* libzypp-17.35.11-150400.3.90.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.22.1
* PackageKit-gtk3-module-1.2.4-150400.3.22.1
* libzypp-devel-doc-17.35.11-150400.3.90.1
* PackageKit-debugsource-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-backend-dnf-debuginfo-1.2.4-150400.3.22.1
* PackageKit-devel-1.2.4-150400.3.22.1
* openSUSE Leap 15.4 (noarch)
* PackageKit-branding-upstream-1.2.4-150400.3.22.1
* zypper-aptitude-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* PackageKit-lang-1.2.4-150400.3.22.1
* zypper-log-1.14.77-150400.3.62.2
* openSUSE Leap 15.4 (x86_64)
* libpackagekit-glib2-18-32bit-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-32bit-1.2.4-150400.3.22.1
* libpackagekit-glib2-18-32bit-debuginfo-1.2.4-150400.3.22.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpackagekit-glib2-18-64bit-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-64bit-1.2.4-150400.3.22.1
* libpackagekit-glib2-18-64bit-debuginfo-1.2.4-150400.3.22.1
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64)
* libzypp-17.35.11-150400.3.90.1
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64)
* libzypp-17.35.11-150400.3.90.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* PackageKit-1.2.4-150400.3.22.1
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* SUSE Manager Server 4.3 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* PackageKit-debugsource-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-1.2.4-150400.3.22.1
* zypper-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.22.1
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* PackageKit-1.2.4-150400.3.22.1
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* PackageKit-debuginfo-1.2.4-150400.3.22.1
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.22.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.22.1
* PackageKit-devel-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.22.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* PackageKit-lang-1.2.4-150400.3.22.1
* SUSE Linux Enterprise Desktop 15 SP4 (x86_64)
* libzypp-17.35.11-150400.3.90.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-devel-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Manager Proxy 4.3 (x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* PackageKit-1.2.4-150400.3.22.1
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* SUSE Manager Proxy 4.3 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* zypper-1.14.77-150400.3.62.2
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* zypper-needs-restarting-1.14.77-150400.3.62.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* PackageKit-debugsource-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-1.2.4-150400.3.22.1
* zypper-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.22.1
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* PackageKit-1.2.4-150400.3.22.1
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* PackageKit-debuginfo-1.2.4-150400.3.22.1
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.22.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.22.1
* PackageKit-devel-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.22.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* PackageKit-lang-1.2.4-150400.3.22.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* PackageKit-debugsource-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-1.2.4-150400.3.22.1
* zypper-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.22.1
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* PackageKit-1.2.4-150400.3.22.1
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* PackageKit-debuginfo-1.2.4-150400.3.22.1
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.22.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.22.1
* PackageKit-devel-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.22.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* PackageKit-lang-1.2.4-150400.3.22.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* zypper-1.14.77-150400.3.62.2
* zypper-debuginfo-1.14.77-150400.3.62.2
* libzypp-debuginfo-17.35.11-150400.3.90.1
* PackageKit-debuginfo-1.2.4-150400.3.22.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.22.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.22.1
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-1.2.4-150400.3.22.1
* PackageKit-gtk3-module-debuginfo-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* PackageKit-gstreamer-plugin-1.2.4-150400.3.22.1
* libzypp-debugsource-17.35.11-150400.3.90.1
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* PackageKit-1.2.4-150400.3.22.1
* libzypp-17.35.11-150400.3.90.1
* PackageKit-gstreamer-plugin-debuginfo-1.2.4-150400.3.22.1
* PackageKit-gtk3-module-1.2.4-150400.3.22.1
* PackageKit-debugsource-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-devel-1.2.4-150400.3.22.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* PackageKit-lang-1.2.4-150400.3.22.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* PackageKit-debugsource-1.2.4-150400.3.22.1
* libpackagekit-glib2-devel-1.2.4-150400.3.22.1
* zypper-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-debuginfo-1.2.4-150400.3.22.1
* libzypp-debugsource-17.35.11-150400.3.90.1
* zypper-debuginfo-1.14.77-150400.3.62.2
* libpackagekit-glib2-18-1.2.4-150400.3.22.1
* zypper-debugsource-1.14.77-150400.3.62.2
* PackageKit-1.2.4-150400.3.22.1
* libzypp-debuginfo-17.35.11-150400.3.90.1
* libzypp-17.35.11-150400.3.90.1
* PackageKit-debuginfo-1.2.4-150400.3.22.1
* libzypp-devel-17.35.11-150400.3.90.1
* PackageKit-devel-debuginfo-1.2.4-150400.3.22.1
* typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.22.1
* PackageKit-devel-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-1.2.4-150400.3.22.1
* PackageKit-backend-zypp-debuginfo-1.2.4-150400.3.22.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* zypper-log-1.14.77-150400.3.62.2
* zypper-needs-restarting-1.14.77-150400.3.62.2
* PackageKit-lang-1.2.4-150400.3.22.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228647
* https://bugzilla.suse.com/show_bug.cgi?id=1230267
1
0
SUSE-FU-2024:3486-1: low: Feature update for python-looseversion, python-pyzmq, python-msgpack
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Feature update for python-looseversion, python-pyzmq, python-msgpack
Announcement ID: SUSE-FU-2024:3486-1
Rating: low
References:
* jsc#PED-5848
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Python 3 Module 15-SP5
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature can now be installed.
## Description:
This update for python-looseversion, python-pyzmq, python-msgpack fixes the
following issues:
* Add python311-looseversion, python311-pyzmq and python311-msgpack.
(jsc#PED-5848)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3486=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3486=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3486=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-3486=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3486=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3486=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3486=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3486=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3486=1
## Package List:
* openSUSE Leap 15.4 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* openSUSE Leap 15.5 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* openSUSE Leap 15.6 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* Python 3 Module 15-SP5 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* Python 3 Module 15-SP6 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python311-msgpack-debuginfo-1.0.7-150400.10.3.1
* python311-pyzmq-25.1.2-150400.12.3.1
* python311-pyzmq-debuginfo-25.1.2-150400.12.3.1
* python311-msgpack-1.0.7-150400.10.3.1
* python-pyzmq-debugsource-25.1.2-150400.12.3.1
* python311-pyzmq-devel-25.1.2-150400.12.3.1
* python-msgpack-debugsource-1.0.7-150400.10.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python311-looseversion-1.3.0-150400.10.3.1
## References:
* https://jira.suse.com/browse/PED-5848
1
0
27 Sep '24
# Recommended update for logrotate
Announcement ID: SUSE-RU-2024:3487-1
Rating: moderate
References:
* jsc#PED-10366
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains one feature can now be installed.
## Description:
This update for logrotate fixes the following issues:
* Backport 'ignoreduplicates' configuration flag (jsc#PED-10366)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3487=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3487=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3487=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3487=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3487=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3487=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3487=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3487=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3487=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3487=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3487=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3487=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3487=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3487=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3487=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3487=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3487=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3487=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3487=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Manager Proxy 4.3 (x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* logrotate-3.18.1-150400.3.10.1
* logrotate-debuginfo-3.18.1-150400.3.10.1
* logrotate-debugsource-3.18.1-150400.3.10.1
## References:
* https://jira.suse.com/browse/PED-10366
1
0
openSUSE-SU-2024:0319-1: moderate: Security update for coredns
by opensuse-securityďĽ opensuse.org 27 Sep '24
by opensuse-securityďĽ opensuse.org 27 Sep '24
27 Sep '24
openSUSE Security Update: Security update for coredns
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0319-1
Rating: moderate
References:
Cross-References: CVE-2022-27191 CVE-2022-28948 CVE-2023-28452
CVE-2023-30464 CVE-2024-0874 CVE-2024-22189
CVSS scores:
CVE-2022-27191 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-28948 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2024-22189 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for coredns fixes the following issues:
Update to version 1.11.3:
* optimize the performance for high qps (#6767)
* bump deps
* Fix zone parser error handling (#6680)
* Add alternate option to forward plugin (#6681)
* fix: plugin/file: return error when parsing the file fails (#6699)
* [fix:documentation] Clarify autopath README (#6750)
* Fix outdated test (#6747)
* Bump go version from 1.21.8 to 1.21.11 (#6755)
* Generate zplugin.go correctly with third-party plugins (#6692)
* dnstap: uses pointer receiver for small response writer (#6644)
* chore: fix function name in comment (#6608)
* [plugin/forward] Strip local zone from IPV6 nameservers (#6635)
- fixes CVE-2023-30464
- fixes CVE-2023-28452
Update to upstream head (git commit #5a52707):
* bump deps to address security issue CVE-2024-22189
* Return RcodeServerFailure when DNS64 has no next plugin (#6590)
* add plusserver to adopters (#6565)
* Change the log flags to be a variable that can be set prior to calling
Run (#6546)
* Enable Prometheus native histograms (#6524)
* forward: respect context (#6483)
* add client labels to k8s plugin metadata (#6475)
* fix broken link in webpage (#6488)
* Repo controlled Go version (#6526)
* removed the mutex locks with atomic bool (#6525)
Update to version 1.11.2:
* rewrite: fix multi request concurrency issue in cname rewrite (#6407)
* plugin/tls: respect the path specified by root plugin (#6138)
* plugin/auto: warn when auto is unable to read elements of the
directory tree (#6333)
* fix: make the codeowners link relative (#6397)
* plugin/etcd: the etcd client adds the DialKeepAliveTime parameter
(#6351)
* plugin/cache: key cache on Checking Disabled (CD) bit (#6354)
* Use the correct root domain name in the proxy plugin's TestHealthX
tests (#6395)
* Add PITS Global Data Recovery Services as an adopter (#6304)
* Handle UDP responses that overflow with TC bit with test case (#6277)
* plugin/rewrite: add rcode as a rewrite option (#6204)
- CVE-2024-0874: coredns: CD bit response is cached and served later
- Update to version 1.11.1:
* Revert “plugin/forward: Continue waiting after receiving malformed
responses
* plugin/dnstap: add support for “extra” field in payload
* plugin/cache: fix keepttl parsing
- Update to version 1.11.0:
* Adds support for accepting DNS connections over QUIC (doq).
* Adds CNAME target rewrites to the rewrite plugin.
* Plus many bug fixes, and some security improvements.
* This release introduces the following backward incompatible changes:
+ In the kubernetes plugin, we have dropped support for watching
Endpoint and Endpointslice v1beta, since all supported K8s versions
now use Endpointslice.
+ The bufsize plugin changed its default size limit value to 1232
+ Some changes to forward plugin metrics.
- Update to version 1.10.1:
* Corrected architecture labels in multi-arch image manifest
* A new plugin timeouts that allows configuration of server listener
timeout durations
* acl can drop queries as an action
* template supports creating responses with extended DNS errors
* New weighted policy in loadbalance
* Option to serve original record TTLs from cache
- Update to version 1.10.0:
* core: add log listeners for k8s_event plugin (#5451)
* core: log DoH HTTP server error logs in CoreDNS format (#5457)
* core: warn when domain names are not in RFC1035 preferred syntax (#5414)
* plugin/acl: add support for extended DNS errors (#5532)
* plugin/bufsize: do not expand query UDP buffer size if already set to a
smaller value (#5602)
* plugin/cache: add cache disable option (#5540)
* plugin/cache: add metadata for wildcard record responses (#5308)
* plugin/cache: add option to adjust SERVFAIL response cache TTL (#5320)
* plugin/cache: correct responses to Authenticated Data requests (#5191)
* plugin/dnstap: add identity and version support for the dnstap plugin
(#5555)
* plugin/file: add metadata for wildcard record responses (#5308)
* plugin/forward: enable multiple forward declarations (#5127)
* plugin/forward: health_check needs to normalize a specified domain name
(#5543)
* plugin/forward: remove unused coredns_forward_sockets_open metric
(#5431)
* plugin/header: add support for query modification (#5556)
* plugin/health: bypass proxy in self health check (#5401)
* plugin/health: don't go lameduck when reloading (#5472)
* plugin/k8s_external: add support for PTR requests (#5435)
* plugin/k8s_external: resolve headless services (#5505)
* plugin/kubernetes: make kubernetes client log in CoreDNS format (#5461)
* plugin/ready: reset list of readiness plugins on startup (#5492)
* plugin/rewrite: add PTR records to supported types (#5565)
* plugin/rewrite: fix a crash in rewrite plugin when rule type is missing
(#5459)
* plugin/rewrite: fix out-of-index issue in rewrite plugin (#5462)
* plugin/rewrite: support min and max TTL values (#5508)
* plugin/trace : make zipkin HTTP reporter more configurable using
Corefile (#5460)
* plugin/trace: read trace context info from headers for DOH (#5439)
* plugin/tsig: add new plugin TSIG for validating TSIG requests and
signing responses (#4957)
* core: update gopkg.in/yaml.v3 to fix CVE-2022-28948
* core: update golang.org/x/crypto to fix CVE-2022-27191
* plugin/acl: adding a check to parse out zone info
* plugin/dnstap: support FQDN TCP endpoint
* plugin/errors: add stacktrace option to log a stacktrace during panic
recovery
* plugin/template: return SERVFAIL for zone-match regex-no-match case
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-319=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 x86_64):
coredns-1.11.3-bp156.4.3.1
- openSUSE Backports SLE-15-SP6 (noarch):
coredns-extras-1.11.3-bp156.4.3.1
References:
https://www.suse.com/security/cve/CVE-2022-27191.html
https://www.suse.com/security/cve/CVE-2022-28948.html
https://www.suse.com/security/cve/CVE-2023-28452.html
https://www.suse.com/security/cve/CVE-2023-30464.html
https://www.suse.com/security/cve/CVE-2024-0874.html
https://www.suse.com/security/cve/CVE-2024-22189.html
1
0
27 Sep '24
# Security update for python3
Announcement ID: SUSE-SU-2024:3470-1
Rating: important
References:
* bsc#1227233
* bsc#1227378
* bsc#1227999
* bsc#1228780
* bsc#1229596
* bsc#1230227
Cross-References:
* CVE-2024-5642
* CVE-2024-6232
* CVE-2024-6923
* CVE-2024-7592
CVSS scores:
* CVE-2024-5642 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2024-6232 ( SUSE ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-6232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6923 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* Development Tools Module 15-SP5
* Development Tools Module 15-SP6
* openSUSE Leap 15.3
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves four vulnerabilities and has two security fixes can now be
installed.
## Description:
This update for python3 fixes the following issues:
* CVE-2024-6923: Fixed uncontrolled CPU resource consumption when in
http.cookies module (bsc#1228780).
* CVE-2024-5642: Fixed buffer overread when NPN is used and invalid values are
sent to the OpenSSL API (bsc#1227233).
* CVE-2024-7592: Fixed Email header injection due to unquoted newlines
(bsc#1229596).
* CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to
ReDoS. (bsc#1230227)
Bug fixes:
* %{profileopt} variable is set according to the variable %{do_profiling}
(bsc#1227999).
* Stop using %%defattr, it seems to be breaking proper executable attributes
on /usr/bin/ scripts (bsc#1227378).
* Remove %suse_update_desktop_file macro as it is not useful any more.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3470=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3470=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3470=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3470=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3470=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3470=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3470=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3470=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3470=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3470=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3470=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3470=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3470=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3470=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3470=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3470=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3470=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3470=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3470=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3470=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3470=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3470=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3470=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3470=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3470=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3470=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3470=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-doc-3.6.15-150300.10.72.1
* python3-testsuite-debuginfo-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-testsuite-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* python3-doc-devhelp-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.72.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.72.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* libpython3_6m1_0-64bit-3.6.15-150300.10.72.1
* libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.72.1
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-doc-3.6.15-150300.10.72.1
* python3-testsuite-debuginfo-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-testsuite-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* python3-doc-devhelp-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* openSUSE Leap 15.5 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.72.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.72.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-doc-3.6.15-150300.10.72.1
* python3-testsuite-debuginfo-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-testsuite-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* python3-doc-devhelp-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_6m1_0-32bit-3.6.15-150300.10.72.1
* libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Manager Proxy 4.3 (x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-curses-debuginfo-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-dbm-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* python3-curses-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* python3-devel-debuginfo-3.6.15-150300.10.72.1
* python3-tk-3.6.15-150300.10.72.1
* python3-dbm-debuginfo-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-idle-3.6.15-150300.10.72.1
* python3-tools-3.6.15-150300.10.72.1
* python3-devel-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* python3-tk-debuginfo-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* python3-core-debugsource-3.6.15-150300.10.72.1
* python3-debuginfo-3.6.15-150300.10.72.1
* python3-base-debuginfo-3.6.15-150300.10.72.1
* python3-base-3.6.15-150300.10.72.1
* libpython3_6m1_0-3.6.15-150300.10.72.1
* libpython3_6m1_0-debuginfo-3.6.15-150300.10.72.1
* python3-debugsource-3.6.15-150300.10.72.1
* python3-3.6.15-150300.10.72.1
## References:
* https://www.suse.com/security/cve/CVE-2024-5642.html
* https://www.suse.com/security/cve/CVE-2024-6232.html
* https://www.suse.com/security/cve/CVE-2024-6923.html
* https://www.suse.com/security/cve/CVE-2024-7592.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227233
* https://bugzilla.suse.com/show_bug.cgi?id=1227378
* https://bugzilla.suse.com/show_bug.cgi?id=1227999
* https://bugzilla.suse.com/show_bug.cgi?id=1228780
* https://bugzilla.suse.com/show_bug.cgi?id=1229596
* https://bugzilla.suse.com/show_bug.cgi?id=1230227
1
0
SUSE-RU-2024:3471-1: moderate: Recommended update for yast2-registration
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Recommended update for yast2-registration
Announcement ID: SUSE-RU-2024:3471-1
Rating: moderate
References:
* jsc#PED-8817
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that contains one feature can now be installed.
## Description:
This update for yast2-registration fixes the following issues:
* Disable the SLE_BCI repository after registration (jsc#PED-8817).
* Software update to v4.6.3
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3471=1 openSUSE-SLE-15.6-2024-3471=1
* SUSE Linux Enterprise High Performance Computing 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3471=1
* SUSE Linux Enterprise Server 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3471=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3471=1
* SUSE Linux Enterprise Desktop 15 SP6
zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2024-3471=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3471=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* yast2-registration-4.6.3-150600.3.6.2
* SUSE Linux Enterprise High Performance Computing 15 SP6 (noarch)
* yast2-registration-4.6.3-150600.3.6.2
* SUSE Linux Enterprise Server 15 SP6 (noarch)
* yast2-registration-4.6.3-150600.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* yast2-registration-4.6.3-150600.3.6.2
* SUSE Linux Enterprise Desktop 15 SP6 (noarch)
* yast2-registration-4.6.3-150600.3.6.2
* Basesystem Module 15-SP6 (noarch)
* yast2-registration-4.6.3-150600.3.6.2
## References:
* https://jira.suse.com/browse/PED-8817
1
0
27 Sep '24
# Recommended update for libsodium
Announcement ID: SUSE-RU-2024:3472-1
Rating: important
References:
* bsc#1148184
* bsc#1199282
* jsc#PM-3243
* jsc#SLE-24629
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* openSUSE Leap Micro 5.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains two features and has two fixes can now be installed.
## Description:
This update for libsodium fixes the following issues:
libsodium:
* Version update from 1.0.16 to 1.0.18 (bsc#1199282, jsc#PM-3243,
jsc#SLE-24629)
* Emscripten: print and printErr functions are overridden to send errors to
the console, if there is one
* Emscripten: UTF8ToString() is now exported since Pointer_stringify() has
been deprecated
* Libsodium version detection has been fixed in the CMake recipe
* Generic hashing got a 10% speedup on AVX2.
* New target: WebAssembly/WASI (compile with dist-builds/wasm32-wasi.sh)
* New functions to map a hash to an edwards25519 point or get a random point:
core_ed25519_from_hash() and core_ed25519_random()
* crypto_core_ed25519_scalar_mul() has been implemented for scalar*scalar (mod
L) multiplication
* Support for the Ristretto group has been implemented for interoperability
with wasm-crypto
* Improvements have been made to the test suite
* Portability improvements have been made
* 'randombytes_salsa20' has been 'renamed to randombytes_internal'
* Support for NativeClient has been removed
* Most ((nonnull)) attributes have been relaxed to allow 0-length inputs to be
NULL.
* The -ftree-vectorize and -ftree-slp-vectorize compiler switches are now
used, if available, for optimized builds
* For the full list of changes please consult the packaged ChangeLog
* Disable LTO to bypass build failures on Power PC architecture (bsc#1148184)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3472=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3472=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3472=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3472=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3472=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3472=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3472=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3472=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3472=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3472=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3472=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3472=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3472=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3472=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3472=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3472=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3472=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3472=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3472=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3472=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3472=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3472=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3472=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3472=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3472=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3472=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3472=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3472=1
## Package List:
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* openSUSE Leap 15.5 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* openSUSE Leap 15.6 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* Basesystem Module 15-SP5 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* Basesystem Module 15-SP6 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Manager Proxy 4.3 (x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Manager Server 4.3 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libsodium-devel-1.0.18-150000.4.8.1
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libsodium23-32bit-1.0.18-150000.4.8.1
* libsodium23-32bit-debuginfo-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libsodium23-debuginfo-1.0.18-150000.4.8.1
* libsodium23-1.0.18-150000.4.8.1
* libsodium-debugsource-1.0.18-150000.4.8.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1148184
* https://bugzilla.suse.com/show_bug.cgi?id=1199282
* https://jira.suse.com/browse/PM-3243
* https://jira.suse.com/browse/SLE-24629
1
0
SUSE-RU-2024:3473-1: moderate: Recommended update for postgresql, postgresql-pgagent
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Recommended update for postgresql, postgresql-pgagent
Announcement ID: SUSE-RU-2024:3473-1
Rating: moderate
References:
* bsc#1230423
Affected Products:
* Legacy Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for postgresq, postgresql-pgagentl fixes the following issues:
* Relax the dependency of extensions on the server version from exact
major.minor to greater or equal, after Tom Lane confirmed on the PostgreSQL
packagers list that ABI stability is being taken care of between minor
releases. (bsc#1230423)
postgresql-pgagent is rebuilt with updated requirements.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3473=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3473=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3473=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3473=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3473=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3473=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3473=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3473=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3473=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3473=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3473=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3473=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql10-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql10-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql12-pgagent-4.0.0-150400.17.2.1
* postgresql12-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql12-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql10-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* openSUSE Leap 15.4 (noarch)
* postgresql-llvmjit-16-150400.4.15.2
* postgresql-server-16-150400.4.15.2
* postgresql-test-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* postgresql-llvmjit-devel-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql10-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql10-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql12-pgagent-4.0.0-150400.17.2.1
* postgresql12-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql12-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql10-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql10-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql10-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql12-pgagent-4.0.0-150400.17.2.1
* postgresql12-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql12-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql10-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* postgresql-llvmjit-16-150400.4.15.2
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* postgresql-llvmjit-devel-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* postgresql-llvmjit-16-150400.4.15.2
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* postgresql-llvmjit-devel-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* postgresql-16-150400.4.15.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* postgresql-llvmjit-16-150400.4.15.2
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* postgresql-llvmjit-devel-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* postgresql-llvmjit-16-150400.4.15.2
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* postgresql-llvmjit-devel-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql13-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql13-pgagent-debugsource-4.0.0-150400.17.2.1
* postgresql13-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Manager Proxy 4.3 (noarch)
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* SUSE Manager Proxy 4.3 (x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
* SUSE Manager Server 4.3 (noarch)
* postgresql-server-16-150400.4.15.2
* postgresql-plpython-16-150400.4.15.2
* postgresql-pltcl-16-150400.4.15.2
* postgresql-devel-16-150400.4.15.2
* postgresql-server-devel-16-150400.4.15.2
* postgresql-16-150400.4.15.2
* postgresql-docs-16-150400.4.15.2
* postgresql-contrib-16-150400.4.15.2
* postgresql-plperl-16-150400.4.15.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* postgresql14-pgagent-4.0.0-150400.17.2.1
* postgresql14-pgagent-debuginfo-4.0.0-150400.17.2.1
* postgresql14-pgagent-debugsource-4.0.0-150400.17.2.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230423
1
0
27 Sep '24
# Recommended update for open-iscsi
Announcement ID: SUSE-RU-2024:3475-1
Rating: moderate
References:
* bsc#1206132
Affected Products:
* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that has one fix can now be installed.
## Description:
This update for open-iscsi fixes the following issue:
* Fix issue with yast restarting the iscsid service without first restarting
the iscsid socket (bsc#1206132).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-3475=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3475=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3475=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3475=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3475=1
* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-3475=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3475=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-3475=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* open-iscsi-devel-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* open-iscsi-devel-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* open-iscsi-devel-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* open-iscsi-devel-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* open-iscsi-devel-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* open-iscsi-debuginfo-2.1.7-150300.32.27.4
* iscsiuio-0.7.8.6-150300.32.27.4
* open-iscsi-debugsource-2.1.7-150300.32.27.4
* open-iscsi-2.1.7-150300.32.27.4
* iscsiuio-debuginfo-0.7.8.6-150300.32.27.4
* libopeniscsiusr0_2_0-2.1.7-150300.32.27.4
* libopeniscsiusr0_2_0-debuginfo-2.1.7-150300.32.27.4
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1206132
1
0
27 Sep '24
# Recommended update for curl
Announcement ID: SUSE-RU-2024:3476-1
Rating: moderate
References:
* bsc#1230516
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for curl fixes the following issue:
* Make special characters in URL work with aws-sigv4 (bsc#1230516).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3476=1 openSUSE-SLE-15.6-2024-3476=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3476=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libcurl4-debuginfo-8.6.0-150600.4.9.2
* libcurl-devel-8.6.0-150600.4.9.2
* curl-debugsource-8.6.0-150600.4.9.2
* curl-8.6.0-150600.4.9.2
* curl-debuginfo-8.6.0-150600.4.9.2
* libcurl4-8.6.0-150600.4.9.2
* openSUSE Leap 15.6 (x86_64)
* libcurl-devel-32bit-8.6.0-150600.4.9.2
* libcurl4-32bit-8.6.0-150600.4.9.2
* libcurl4-32bit-debuginfo-8.6.0-150600.4.9.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* libcurl4-64bit-8.6.0-150600.4.9.2
* libcurl-devel-64bit-8.6.0-150600.4.9.2
* libcurl4-64bit-debuginfo-8.6.0-150600.4.9.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcurl4-debuginfo-8.6.0-150600.4.9.2
* libcurl-devel-8.6.0-150600.4.9.2
* curl-debugsource-8.6.0-150600.4.9.2
* curl-8.6.0-150600.4.9.2
* curl-debuginfo-8.6.0-150600.4.9.2
* libcurl4-8.6.0-150600.4.9.2
* Basesystem Module 15-SP6 (x86_64)
* libcurl4-32bit-8.6.0-150600.4.9.2
* libcurl4-32bit-debuginfo-8.6.0-150600.4.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230516
1
0
27 Sep '24
# Recommended update for curl
Announcement ID: SUSE-RU-2024:3477-1
Rating: moderate
References:
* bsc#1230516
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for curl fixes the following issue:
* Make special characters in URL work with aws-sigv4 (bsc#1230516).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3477=1
* SUSE Linux Enterprise High Performance Computing 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3477=1
* SUSE Linux Enterprise Server 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3477=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3477=1 SUSE-SLE-Product-SUSE-
Manager-Server-4.3-2024-3477=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-3477=1 SUSE-SLE-Product-
SLES_SAP-15-SP4-2024-3477=1
* SUSE Linux Enterprise High Performance Computing 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3477=1
* SUSE Linux Enterprise Server 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3477=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3477=1
* SUSE Linux Enterprise Desktop 15 SP5
zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-3477=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3477=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-3477=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3477=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-3477=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3477=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3477=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3477=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3477=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3477=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3477=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3477=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3477=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3477=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3477=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* openSUSE Leap 15.5 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl-devel-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64)
* libcurl4-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x)
* libcurl4-8.0.1-150400.5.53.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Manager Server 4.3 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64)
* libcurl4-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libcurl4-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Desktop 15 SP5 (x86_64)
* libcurl4-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* Basesystem Module 15-SP5 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* SUSE Manager Proxy 4.3 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libcurl4-8.0.1-150400.5.53.2
* libcurl-devel-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
* openSUSE Leap 15.4 (x86_64)
* libcurl4-32bit-8.0.1-150400.5.53.2
* libcurl-devel-32bit-8.0.1-150400.5.53.2
* libcurl4-32bit-debuginfo-8.0.1-150400.5.53.2
* openSUSE Leap 15.4 (aarch64_ilp32)
* libcurl4-64bit-debuginfo-8.0.1-150400.5.53.2
* libcurl-devel-64bit-8.0.1-150400.5.53.2
* libcurl4-64bit-8.0.1-150400.5.53.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* libcurl4-8.0.1-150400.5.53.2
* libcurl4-debuginfo-8.0.1-150400.5.53.2
* curl-8.0.1-150400.5.53.2
* curl-debugsource-8.0.1-150400.5.53.2
* curl-debuginfo-8.0.1-150400.5.53.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230516
1
0
27 Sep '24
# Security update for quagga
Announcement ID: SUSE-SU-2024:3478-1
Rating: important
References:
* bsc#1202023
* bsc#1229438
* bsc#1230866
Cross-References:
* CVE-2017-15865
* CVE-2022-37032
* CVE-2024-44070
CVSS scores:
* CVE-2017-15865 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2017-15865 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2017-15865 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-37032 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-37032 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-44070 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44070 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44070 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP5
* Server Applications Module 15-SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for quagga fixes the following issues:
* CVE-2017-15865: sensitive information disclosed when malformed BGP UPDATE
packets are processed. (bsc#1230866)
* CVE-2024-44070: crash when parsing Tunnel Encap attribute due to no length
check. (bsc#1229438)
* CVE-2022-37032: out-of-bounds read when parsing a BGP capability message due
to incorrect size check. (bsc#1202023)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3478=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3478=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3478=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3478=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3478=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3478=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3478=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3478=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3478=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3478=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3478=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3478=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Manager Proxy 4.3 (x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* quagga-1.1.1-150400.12.8.1
* libospf0-1.1.1-150400.12.8.1
* libospfapiclient0-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-debuginfo-1.1.1-150400.12.8.1
* libzebra1-debuginfo-1.1.1-150400.12.8.1
* libospfapiclient0-1.1.1-150400.12.8.1
* libfpm_pb0-1.1.1-150400.12.8.1
* quagga-debugsource-1.1.1-150400.12.8.1
* libospf0-debuginfo-1.1.1-150400.12.8.1
* quagga-devel-1.1.1-150400.12.8.1
* quagga-debuginfo-1.1.1-150400.12.8.1
* libquagga_pb0-1.1.1-150400.12.8.1
* libzebra1-1.1.1-150400.12.8.1
* libfpm_pb0-debuginfo-1.1.1-150400.12.8.1
## References:
* https://www.suse.com/security/cve/CVE-2017-15865.html
* https://www.suse.com/security/cve/CVE-2022-37032.html
* https://www.suse.com/security/cve/CVE-2024-44070.html
* https://bugzilla.suse.com/show_bug.cgi?id=1202023
* https://bugzilla.suse.com/show_bug.cgi?id=1229438
* https://bugzilla.suse.com/show_bug.cgi?id=1230866
1
0
27 Sep '24
# Recommended update for deltarpm
Announcement ID: SUSE-RU-2024:3479-1
Rating: moderate
References:
* bsc#1230547
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for deltarpm fixes the following issue:
* Version update with support for archive files bigger than 2GByte
(bsc#1230547).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3479=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3479=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3479=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3479=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3479=1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3479=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3479=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3479=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3479=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3479=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3479=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3479=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3479=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3479=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3479=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3479=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3479=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3479=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3479=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* python2-deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* python2-deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* python2-deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* python2-deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Manager Proxy 4.3 (x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* python3-deltarpm-3.6.5-150000.5.6.3
* python3-deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* python3-deltarpm-3.6.5-150000.5.6.3
* python3-deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* python2-deltarpm-debuginfo-3.6.5-150000.5.6.3
* deltarpm-3.6.5-150000.5.6.3
* deltarpm-debuginfo-3.6.5-150000.5.6.3
* python2-deltarpm-3.6.5-150000.5.6.3
* deltarpm-debugsource-3.6.5-150000.5.6.3
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230547
1
0
27 Sep '24
# Recommended update for mdadm
Announcement ID: SUSE-RU-2024:3480-1
Rating: moderate
References:
* bsc#1226413
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for mdadm fixes the following issues:
* Detail: remove duplicated code (bsc#1226413).
* mdadm: Fix native --detail --export (bsc#1226413).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3480=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3480=1 openSUSE-SLE-15.6-2024-3480=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* mdadm-4.3-150600.3.6.2
* mdadm-debuginfo-4.3-150600.3.6.2
* mdadm-debugsource-4.3-150600.3.6.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* mdadm-4.3-150600.3.6.2
* mdadm-debuginfo-4.3-150600.3.6.2
* mdadm-debugsource-4.3-150600.3.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1226413
1
0
27 Sep '24
# Recommended update for mdadm
Announcement ID: SUSE-RU-2024:3481-1
Rating: moderate
References:
* bsc#1226413
Affected Products:
* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one fix can now be installed.
## Description:
This update for mdadm fixes the following issues:
* mdadm: define DEV_MD_DIR (bsc#1226413).
* mdadm: refactor ident-name handling (bsc#1226413).
* mdadm: Follow POSIX Portable Character Set (bsc#1226413).
* Detail: remove duplicated code (bsc#1226413).
* mdadm: Fix native --detail --export (bsc#1226413).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3481=1 openSUSE-SLE-15.5-2024-3481=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3481=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3481=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3481=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* mdadm-4.2-150500.6.6.2
* mdadm-debuginfo-4.2-150500.6.6.2
* mdadm-debugsource-4.2-150500.6.6.2
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* mdadm-4.2-150500.6.6.2
* mdadm-debuginfo-4.2-150500.6.6.2
* mdadm-debugsource-4.2-150500.6.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* mdadm-4.2-150500.6.6.2
* mdadm-debuginfo-4.2-150500.6.6.2
* mdadm-debugsource-4.2-150500.6.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* mdadm-4.2-150500.6.6.2
* mdadm-debuginfo-4.2-150500.6.6.2
* mdadm-debugsource-4.2-150500.6.6.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1226413
1
0
27 Sep '24
# Recommended update for realmd
Announcement ID: SUSE-RU-2024:3482-1
Rating: moderate
References:
* bsc#1230334
Affected Products:
* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that has one fix can now be installed.
## Description:
This update for realmd fixes the following issues:
* Use 'additional dns hostnames' with net ads join; (bsc#1230334).
* Use 'dnshostname' with net ads join;(bsc#1230334).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3482=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3482=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3482=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3482=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3482=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3482=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-3482=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3482=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3482=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3482=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3482=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3482=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3482=1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3482=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3482=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3482=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3482=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3482=1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3482=1
## Package List:
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Manager Proxy 4.3 (x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Manager Proxy 4.3 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Manager Server 4.3 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Enterprise Storage 7.1 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* openSUSE Leap 15.5 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* openSUSE Leap 15.6 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* Basesystem Module 15-SP5 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* Basesystem Module 15-SP6 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* realmd-debugsource-0.16.3-150200.3.9.2
* realmd-debuginfo-0.16.3-150200.3.9.2
* realmd-0.16.3-150200.3.9.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* realmd-lang-0.16.3-150200.3.9.2
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230334
1
0
27 Sep '24
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2024:3483-1
Rating: important
References:
* bsc#1193629
* bsc#1194111
* bsc#1194765
* bsc#1194869
* bsc#1196261
* bsc#1196516
* bsc#1196894
* bsc#1198017
* bsc#1203329
* bsc#1203330
* bsc#1203360
* bsc#1205462
* bsc#1206006
* bsc#1206258
* bsc#1206843
* bsc#1207158
* bsc#1208783
* bsc#1210644
* bsc#1213580
* bsc#1213632
* bsc#1214285
* bsc#1216834
* bsc#1220428
* bsc#1220877
* bsc#1220962
* bsc#1221269
* bsc#1221326
* bsc#1221630
* bsc#1221645
* bsc#1222335
* bsc#1222350
* bsc#1222372
* bsc#1222387
* bsc#1222634
* bsc#1222808
* bsc#1222967
* bsc#1223074
* bsc#1223191
* bsc#1223508
* bsc#1223720
* bsc#1223742
* bsc#1223777
* bsc#1223803
* bsc#1223807
* bsc#1224105
* bsc#1224415
* bsc#1224496
* bsc#1224510
* bsc#1224542
* bsc#1224578
* bsc#1224639
* bsc#1225162
* bsc#1225352
* bsc#1225428
* bsc#1225524
* bsc#1225578
* bsc#1225582
* bsc#1225773
* bsc#1225814
* bsc#1225827
* bsc#1225832
* bsc#1225903
* bsc#1226168
* bsc#1226530
* bsc#1226613
* bsc#1226742
* bsc#1226765
* bsc#1226798
* bsc#1226801
* bsc#1226874
* bsc#1226885
* bsc#1227079
* bsc#1227623
* bsc#1227761
* bsc#1227830
* bsc#1227863
* bsc#1227867
* bsc#1227929
* bsc#1227937
* bsc#1227958
* bsc#1228020
* bsc#1228065
* bsc#1228114
* bsc#1228410
* bsc#1228426
* bsc#1228427
* bsc#1228429
* bsc#1228446
* bsc#1228447
* bsc#1228449
* bsc#1228450
* bsc#1228452
* bsc#1228456
* bsc#1228463
* bsc#1228466
* bsc#1228467
* bsc#1228469
* bsc#1228480
* bsc#1228481
* bsc#1228482
* bsc#1228483
* bsc#1228484
* bsc#1228485
* bsc#1228487
* bsc#1228489
* bsc#1228491
* bsc#1228493
* bsc#1228494
* bsc#1228495
* bsc#1228496
* bsc#1228501
* bsc#1228503
* bsc#1228509
* bsc#1228513
* bsc#1228515
* bsc#1228516
* bsc#1228526
* bsc#1228531
* bsc#1228563
* bsc#1228564
* bsc#1228567
* bsc#1228576
* bsc#1228579
* bsc#1228584
* bsc#1228588
* bsc#1228590
* bsc#1228615
* bsc#1228616
* bsc#1228635
* bsc#1228636
* bsc#1228654
* bsc#1228656
* bsc#1228658
* bsc#1228660
* bsc#1228662
* bsc#1228667
* bsc#1228673
* bsc#1228677
* bsc#1228687
* bsc#1228706
* bsc#1228708
* bsc#1228710
* bsc#1228718
* bsc#1228720
* bsc#1228721
* bsc#1228722
* bsc#1228724
* bsc#1228726
* bsc#1228727
* bsc#1228733
* bsc#1228748
* bsc#1228766
* bsc#1228779
* bsc#1228801
* bsc#1228850
* bsc#1228857
* bsc#1228959
* bsc#1228964
* bsc#1228966
* bsc#1228967
* bsc#1228979
* bsc#1228988
* bsc#1228989
* bsc#1228991
* bsc#1228992
* bsc#1229042
* bsc#1229054
* bsc#1229086
* bsc#1229136
* bsc#1229154
* bsc#1229187
* bsc#1229188
* bsc#1229190
* bsc#1229287
* bsc#1229290
* bsc#1229292
* bsc#1229296
* bsc#1229297
* bsc#1229301
* bsc#1229303
* bsc#1229304
* bsc#1229305
* bsc#1229307
* bsc#1229309
* bsc#1229312
* bsc#1229314
* bsc#1229315
* bsc#1229317
* bsc#1229318
* bsc#1229319
* bsc#1229327
* bsc#1229341
* bsc#1229345
* bsc#1229346
* bsc#1229347
* bsc#1229349
* bsc#1229350
* bsc#1229351
* bsc#1229354
* bsc#1229356
* bsc#1229357
* bsc#1229358
* bsc#1229359
* bsc#1229360
* bsc#1229366
* bsc#1229370
* bsc#1229373
* bsc#1229374
* bsc#1229381
* bsc#1229382
* bsc#1229383
* bsc#1229386
* bsc#1229388
* bsc#1229391
* bsc#1229392
* bsc#1229395
* bsc#1229398
* bsc#1229399
* bsc#1229400
* bsc#1229407
* bsc#1229409
* bsc#1229410
* bsc#1229411
* bsc#1229413
* bsc#1229414
* bsc#1229417
* bsc#1229418
* bsc#1229444
* bsc#1229453
* bsc#1229454
* bsc#1229481
* bsc#1229482
* bsc#1229488
* bsc#1229489
* bsc#1229490
* bsc#1229493
* bsc#1229495
* bsc#1229497
* bsc#1229500
* bsc#1229503
* bsc#1229506
* bsc#1229507
* bsc#1229508
* bsc#1229509
* bsc#1229510
* bsc#1229512
* bsc#1229516
* bsc#1229521
* bsc#1229522
* bsc#1229523
* bsc#1229524
* bsc#1229525
* bsc#1229526
* bsc#1229527
* bsc#1229528
* bsc#1229529
* bsc#1229531
* bsc#1229533
* bsc#1229535
* bsc#1229536
* bsc#1229537
* bsc#1229540
* bsc#1229544
* bsc#1229545
* bsc#1229546
* bsc#1229547
* bsc#1229548
* bsc#1229554
* bsc#1229557
* bsc#1229558
* bsc#1229559
* bsc#1229560
* bsc#1229562
* bsc#1229564
* bsc#1229565
* bsc#1229566
* bsc#1229568
* bsc#1229569
* bsc#1229572
* bsc#1229573
* bsc#1229576
* bsc#1229581
* bsc#1229588
* bsc#1229598
* bsc#1229603
* bsc#1229604
* bsc#1229605
* bsc#1229608
* bsc#1229611
* bsc#1229612
* bsc#1229613
* bsc#1229614
* bsc#1229615
* bsc#1229616
* bsc#1229617
* bsc#1229620
* bsc#1229622
* bsc#1229623
* bsc#1229624
* bsc#1229625
* bsc#1229626
* bsc#1229628
* bsc#1229629
* bsc#1229630
* bsc#1229631
* bsc#1229632
* bsc#1229635
* bsc#1229636
* bsc#1229637
* bsc#1229638
* bsc#1229639
* bsc#1229641
* bsc#1229642
* bsc#1229643
* bsc#1229645
* bsc#1229657
* bsc#1229658
* bsc#1229662
* bsc#1229664
* bsc#1229707
* bsc#1229739
* bsc#1229743
* bsc#1229746
* bsc#1229754
* bsc#1229755
* bsc#1229756
* bsc#1229759
* bsc#1229761
* bsc#1229767
* bsc#1229768
* bsc#1229781
* bsc#1229784
* bsc#1229787
* bsc#1229788
* bsc#1229789
* bsc#1229792
* bsc#1229820
* bsc#1230413
* jsc#PED-8491
* jsc#PED-8779
Cross-References:
* CVE-2021-4204
* CVE-2021-4441
* CVE-2021-47106
* CVE-2021-47517
* CVE-2021-47546
* CVE-2022-0500
* CVE-2022-23222
* CVE-2022-38457
* CVE-2022-40133
* CVE-2022-4382
* CVE-2022-48645
* CVE-2022-48706
* CVE-2022-48808
* CVE-2022-48865
* CVE-2022-48868
* CVE-2022-48869
* CVE-2022-48870
* CVE-2022-48871
* CVE-2022-48872
* CVE-2022-48873
* CVE-2022-48875
* CVE-2022-48878
* CVE-2022-48880
* CVE-2022-48881
* CVE-2022-48882
* CVE-2022-48883
* CVE-2022-48884
* CVE-2022-48885
* CVE-2022-48886
* CVE-2022-48887
* CVE-2022-48888
* CVE-2022-48889
* CVE-2022-48890
* CVE-2022-48891
* CVE-2022-48893
* CVE-2022-48896
* CVE-2022-48898
* CVE-2022-48899
* CVE-2022-48903
* CVE-2022-48904
* CVE-2022-48905
* CVE-2022-48906
* CVE-2022-48907
* CVE-2022-48909
* CVE-2022-48910
* CVE-2022-48912
* CVE-2022-48913
* CVE-2022-48914
* CVE-2022-48915
* CVE-2022-48916
* CVE-2022-48917
* CVE-2022-48918
* CVE-2022-48919
* CVE-2022-48920
* CVE-2022-48921
* CVE-2022-48923
* CVE-2022-48924
* CVE-2022-48925
* CVE-2022-48926
* CVE-2022-48927
* CVE-2022-48928
* CVE-2022-48929
* CVE-2022-48930
* CVE-2022-48931
* CVE-2022-48932
* CVE-2022-48934
* CVE-2022-48937
* CVE-2022-48938
* CVE-2022-48939
* CVE-2022-48940
* CVE-2022-48941
* CVE-2022-48942
* CVE-2022-48943
* CVE-2023-3610
* CVE-2023-52458
* CVE-2023-52489
* CVE-2023-52498
* CVE-2023-52581
* CVE-2023-52859
* CVE-2023-52887
* CVE-2023-52889
* CVE-2023-52893
* CVE-2023-52894
* CVE-2023-52896
* CVE-2023-52898
* CVE-2023-52899
* CVE-2023-52900
* CVE-2023-52901
* CVE-2023-52904
* CVE-2023-52905
* CVE-2023-52906
* CVE-2023-52907
* CVE-2023-52908
* CVE-2023-52909
* CVE-2023-52910
* CVE-2023-52911
* CVE-2023-52912
* CVE-2023-52913
* CVE-2024-26631
* CVE-2024-26668
* CVE-2024-26669
* CVE-2024-26677
* CVE-2024-26735
* CVE-2024-26808
* CVE-2024-26812
* CVE-2024-26835
* CVE-2024-26851
* CVE-2024-27010
* CVE-2024-27011
* CVE-2024-27016
* CVE-2024-27024
* CVE-2024-27079
* CVE-2024-27403
* CVE-2024-31076
* CVE-2024-35897
* CVE-2024-35902
* CVE-2024-35945
* CVE-2024-35971
* CVE-2024-36009
* CVE-2024-36013
* CVE-2024-36270
* CVE-2024-36286
* CVE-2024-36489
* CVE-2024-36929
* CVE-2024-36933
* CVE-2024-36936
* CVE-2024-36962
* CVE-2024-38554
* CVE-2024-38602
* CVE-2024-38662
* CVE-2024-39489
* CVE-2024-40905
* CVE-2024-40978
* CVE-2024-40980
* CVE-2024-40995
* CVE-2024-41000
* CVE-2024-41007
* CVE-2024-41009
* CVE-2024-41011
* CVE-2024-41016
* CVE-2024-41020
* CVE-2024-41022
* CVE-2024-41035
* CVE-2024-41036
* CVE-2024-41038
* CVE-2024-41039
* CVE-2024-41042
* CVE-2024-41045
* CVE-2024-41056
* CVE-2024-41060
* CVE-2024-41062
* CVE-2024-41065
* CVE-2024-41068
* CVE-2024-41073
* CVE-2024-41079
* CVE-2024-41080
* CVE-2024-41087
* CVE-2024-41088
* CVE-2024-41089
* CVE-2024-41092
* CVE-2024-41093
* CVE-2024-41095
* CVE-2024-41097
* CVE-2024-41098
* CVE-2024-42069
* CVE-2024-42074
* CVE-2024-42076
* CVE-2024-42077
* CVE-2024-42080
* CVE-2024-42082
* CVE-2024-42085
* CVE-2024-42086
* CVE-2024-42087
* CVE-2024-42089
* CVE-2024-42090
* CVE-2024-42092
* CVE-2024-42095
* CVE-2024-42097
* CVE-2024-42098
* CVE-2024-42101
* CVE-2024-42104
* CVE-2024-42106
* CVE-2024-42107
* CVE-2024-42110
* CVE-2024-42114
* CVE-2024-42115
* CVE-2024-42119
* CVE-2024-42120
* CVE-2024-42121
* CVE-2024-42126
* CVE-2024-42127
* CVE-2024-42130
* CVE-2024-42137
* CVE-2024-42139
* CVE-2024-42142
* CVE-2024-42143
* CVE-2024-42148
* CVE-2024-42152
* CVE-2024-42155
* CVE-2024-42156
* CVE-2024-42157
* CVE-2024-42158
* CVE-2024-42162
* CVE-2024-42223
* CVE-2024-42225
* CVE-2024-42228
* CVE-2024-42229
* CVE-2024-42230
* CVE-2024-42232
* CVE-2024-42236
* CVE-2024-42237
* CVE-2024-42238
* CVE-2024-42239
* CVE-2024-42240
* CVE-2024-42244
* CVE-2024-42246
* CVE-2024-42247
* CVE-2024-42268
* CVE-2024-42271
* CVE-2024-42274
* CVE-2024-42276
* CVE-2024-42277
* CVE-2024-42280
* CVE-2024-42281
* CVE-2024-42283
* CVE-2024-42284
* CVE-2024-42285
* CVE-2024-42286
* CVE-2024-42287
* CVE-2024-42288
* CVE-2024-42289
* CVE-2024-42291
* CVE-2024-42292
* CVE-2024-42295
* CVE-2024-42301
* CVE-2024-42302
* CVE-2024-42308
* CVE-2024-42309
* CVE-2024-42310
* CVE-2024-42311
* CVE-2024-42312
* CVE-2024-42313
* CVE-2024-42315
* CVE-2024-42318
* CVE-2024-42319
* CVE-2024-42320
* CVE-2024-42322
* CVE-2024-43816
* CVE-2024-43818
* CVE-2024-43819
* CVE-2024-43821
* CVE-2024-43823
* CVE-2024-43829
* CVE-2024-43830
* CVE-2024-43831
* CVE-2024-43834
* CVE-2024-43837
* CVE-2024-43839
* CVE-2024-43841
* CVE-2024-43842
* CVE-2024-43846
* CVE-2024-43849
* CVE-2024-43853
* CVE-2024-43854
* CVE-2024-43856
* CVE-2024-43858
* CVE-2024-43860
* CVE-2024-43861
* CVE-2024-43863
* CVE-2024-43866
* CVE-2024-43867
* CVE-2024-43871
* CVE-2024-43872
* CVE-2024-43873
* CVE-2024-43879
* CVE-2024-43880
* CVE-2024-43882
* CVE-2024-43883
* CVE-2024-43884
* CVE-2024-43889
* CVE-2024-43892
* CVE-2024-43893
* CVE-2024-43894
* CVE-2024-43895
* CVE-2024-43899
* CVE-2024-43900
* CVE-2024-43902
* CVE-2024-43903
* CVE-2024-43904
* CVE-2024-43905
* CVE-2024-43907
* CVE-2024-43908
* CVE-2024-43909
* CVE-2024-44938
* CVE-2024-44939
* CVE-2024-44947
CVSS scores:
* CVE-2021-4204 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-4204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-4441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4441 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47106 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-0500 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-0500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-23222 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-23222 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-38457 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-40133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-40133 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-4382 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4382 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48808 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48869 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48869 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48870 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-48871 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48872 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48872 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48875 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48878 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48878 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-48878 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48880 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48881 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48881 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-48882 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48882 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48883 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48883 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48884 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48884 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48885 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-48885 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-48885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48896 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48899 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48904 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48905 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48906 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-48906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48907 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48909 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48910 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48912 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48912 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48914 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48914 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48917 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48919 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48919 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48919 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48920 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48920 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48921 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48923 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48923 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48931 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48937 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48938 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48938 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48939 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-48940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48941 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48943 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3610 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52489 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52887 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-52887 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52896 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52898 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52898 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52899 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52906 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52909 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52910 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52912 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52912 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52913 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26812 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26835 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-26851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27024 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27403 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-31076 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35945 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36270 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36286 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-36489 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36929 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36936 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36962 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38554 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38662 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-39489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-39489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40905 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40978 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40980 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-40995 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41009 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41011 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41011 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41020 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41020 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41022 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41022 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41038 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
* CVE-2024-41038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41039 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-41039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41045 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41062 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41065 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41065 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41068 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41088 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-41093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42082 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42086 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42086 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-42087 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42089 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42097 ( SUSE ): 2.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-42097 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-42104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42114 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42143 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42143 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-42148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42152 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42155 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-42155 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42155 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42156 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42157 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42158 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42162 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42225 ( NVD ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-42230 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42230 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42230 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42232 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42232 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42236 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42236 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-42236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42238 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42247 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-42268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42271 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42271 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42271 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42274 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42283 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42284 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42285 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42286 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42287 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42288 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42289 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42301 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42301 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42302 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-42311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43872 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43882 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43882 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43883 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43883 ( SUSE ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43884 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43884 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43892 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43892 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43893 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43893 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43894 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43894 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43900 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-43902 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43908 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-43909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44938 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44938 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-44938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44939 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-44939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44939 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44947 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2024-44947 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-44947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* Legacy Module 15-SP5
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Workstation Extension 15 SP5
An update that solves 296 vulnerabilities, contains two features and has 42
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate
(bsc#1229454).
* CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
* CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
* CVE-2024-43883: Do not drop references before new references are gained
(bsc#1229707).
* CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
* CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
* CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-
IP-has-been-disabled-on.patch (bsc#1226798)
* CVE-2023-52489: Fix race in accessing memory_section->usage (bsc#1221326).
* CVE-2024-43893: Check uartclk for zero to avoid divide by zero
(bsc#1229759).
* CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
* CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
* CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
* CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).
* CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
* CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
* CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
* CVE-2024-43904: Add null checks for 'stream' and 'plane' before
dereferencing (bsc#1229768)
* CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
* CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
* CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
* CVE-2022-48920: Get rid of warning on transaction commit when using
flushoncommit (bsc#1229658).
* CVE-2023-52906: Fix warning during failed attribute validation
(bsc#1229527).
* CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage.
(bsc#1229503)
* CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
* CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
* CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
* CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
* CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is
large (bsc#1229605)
* CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
* CVE-2024-42156: Wipe copies of clear-key structures on failure
(bsc#1228722).
* CVE-2023-52899: Add exception protection processing for vd in
axi_chan_handle_err function (bsc#1229569).
* CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings
(bsc#1228720).
* CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
* CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
* CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
* CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
* CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy()
(bsc#1220962)
* CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool
(bsc#1225428).
* CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
* CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
* CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
* CVE-2024-35897: Discard table flag update with pending basechain deletion
(bsc#1224510).
* CVE-2024-27403: Restore const specifier in flow_offload_route_init()
(bsc#1224415).
* CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
* CVE-2024-43819: Reject memory region operations for ucontrol VMs
(bsc#1229290 git-fixes).
* CVE-2024-26668: Reject configurations that cause integer overflow
(bsc#1222335).
* CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
* CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain
(bsc#1222634).
* CVE-2024-27016: Validate pppoe header (bsc#1223807).
* CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
* CVE-2023-52581: Fix memleak when more than 255 elements expired
(bsc#1220877).
* CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
* CVE-2024-43837: Fix updating attached freplace prog in prog_array map
(bsc#1229297).
* CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
* CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
* CVE-2024-43834: Fix invalid wait context of page_pool_destroy()
(bsc#1229314)
* CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu()
(bsc#1226801)
* CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
* CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157
git-fixes).
* CVE-2024-26677: Blacklist e7870cf13d20 (" Fix delayed ACKs to not set the
reference serial number") (bsc#1222387)
* CVE-2024-36009: Blacklist 467324bcfe1a ("ax25: Fix netdev refcount issue")
(bsc#1224542)
* CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
* CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
* CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error
(bsc#1229382)
* CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
* CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
* CVE-2024-43854: Initialize integrity buffer to zero before writing it to
media (bsc#1229345)
* CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
* CVE-2024-42308: Update DRM patch reference (bsc#1229411)
* CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
* CVE-2024-42318: Do not lose track of restrictions on cred_transfer
(bsc#1229351).
* CVE-2024-26669: Fix chain template offload (bsc#1222350).
* CVE-2023-52889: Fix null pointer deref when receiving skb during sock
creation (bsc#1229287,).
* CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features()
(bsc#1223508).
* CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2024-36933: Use correct mac_offset to unwind gso skb in
nsh_gso_segment() (bsc#1225832).
* CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block()
(bsc#1229370).
* CVE-2024-42319: Move devm_mbox_controller_register() after
devm_pm_runtime_enable() (bsc#1229350).
* CVE-2024-43860: Skip over memory region when node value is NULL
(bsc#1229319).
* CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
* CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
* CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
* CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures
(bsc#1229301).
* CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
* CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
* CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
* CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers()
(bsc#1228616).
* CVE-2024-42246: Remap EPERM in case of connection failure in
xs_tcp_setup_socket (bsc#1228989).
* CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop().
(bsc#1228959)
* CVE-2024-26735: Fix possible use-after-free and null-ptr-deref
(bsc#1222372).
* CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2
(bsc#1228493).
* CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash
(bsc#1226885).
* CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from
__netif_rx() (bsc#1228501).
* CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
* CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
* CVE-2023-52498: Fix possible deadlocks in core system-wide PM code
(bsc#1221269).
* CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
* CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown
(bsc#1227958).
* CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
* CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
* CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
* CVE-2024-42139: Fix improper extts handling (bsc#1228503).
* CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
* CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
* CVE-2024-42162: Account for stopped queues when reading NIC stats
(bsc#1228706).
* CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
* CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
* CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be
exploited to achieve local privilege escalation (bsc#1213580).
* CVE-2024-42228: Using uninitialized value *size when calling
amdgpu_vce_cs_reloc (bsc#1228667).
* CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc()
(bsc#1227830).
* CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (git-fixes
CVE-2024-38602 bsc#1226613).
* CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
* CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs
(bsc#1225814).
* CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
* CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).
The following non-security bugs were fixed:
* Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
* Indicate support for the Generic Event Device thru _OSC (git-fixes).
* Rework system-level device notification handling (git-fixes).
* Drop nocrt parameter (git-fixes).
* x86: s2 Post-increment variables when getting constraints (git-fixes).
* Do not cross .backup mountpoint from backup volume (git-fixes).
* Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
* Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
* Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
* Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).
* line6: Fix racy access to midibuf (stable-fixes).
* Relax start tick time check for slave timer elements (git-fixes).
* Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).
* Re-add ScratchAmp quirk entries (git-fixes).
* Support Yamaha P-125 quirk entry (stable-fixes).
* Fix UBSAN warning in parse_audio_unit() (stable-fixes).
* arm64: initialize all values of acpi_early_node_map to (git-fixes)
* arm64: initialize all values of acpi_early_node_map to (git-fixes)
* arm64: Add Neoverse-V2 part (git-fixes)
* arm64: armv8_ Fix warning in isndep cpuhp starting process (git-fixes)
* arm64: armv8_ Fix warning in isndep cpuhp starting process (git-fixes)
* arm64: Restore spec_bar() macro (git-fixes)
* arm64: Add missing .field_width for GIC system registers (git-fixes)
* arm64: Fix the visibility of compat hwcaps (git-fixes)
* arm64: Force HWCAP to be based on the sysreg visible to (git-fixes)
* arm64: Add Cortex-A720 definitions (git-fixes)
* arm64: Add Cortex-A725 definitions (git-fixes)
* arm64: Add Cortex-X1C definitions (git-fixes)
* arm64: Add Cortex-X3 definitions (git-fixes)
* arm64: Add Cortex-X4 definitions (git-fixes)
* arm64: Add Cortex-X925 definitions (git-fixes)
* arm64: Add Neoverse-V3 definitions (git-fixes)
* arm64: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: Increase VOP clk rate on RK3328 (git-fixes)
* arm64: Expand speculative SSBS workaround (again) (git-fixes)
* arm64: Expand speculative SSBS workaround (git-fixes)
* arm64: Unify speculative SSBS errata logic (git-fixes) Also update default
configuration.
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* arm64: Fix KASAN random tag seed initialization (git-fixes)
* wcd938 Correct Soundwire ports mask (git-fixes).
* wsa881 Correct Soundwire ports mask (git-fixes).
* fix irq scheduling issue with PREEMPT_RT (git-fixes).
* Introduce async_schedule_dev_nocall() (bsc#1221269).
* Split async_schedule_node_domain() (bsc#1221269).
* Fix usage of __hci_cmd_sync_status (git-fixes).
* hci_ Fix not handling hibernation actions (git-fixes).
* l2 always unlock channel in l2cap_conless_channel() (git-fixes).
* L2 Fix deadlock (git-fixes).
* Fix a kernel verifier crash in stacksafe() (bsc#1225903).
* remove unused declaring of bpf_kprobe_override (git-fixes).
* fix leak of qgroup extent records after transaction abort (git-fixes).
* make btrfs_destroy_delayed_refs() return void (git-fixes).
* remove unnecessary prototype declarations at disk-io.c (git-fixes).
* update fs features directory asynchronously (bsc#1226168).
* propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418).
* issue a cap release immediately if no cap exists (bsc#1225162).
* periodically flush the cap releases (bsc#1225162).
* Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161
ltc#200588 git-fixes).
* cpuidle, Evaluate LPI arch_flags for broadcast timer (git-fixes).
* Fix register ID of SPSR_FIQ (git-fixes).
* add missing MODULE_DESCRIPTION() macros (stable-fixes).
* Add labels for both Valve Steam Deck revisions (stable-fixes).
* Add quirk for Aya Neo KUN (stable-fixes).
* Add quirk for Lenovo Yoga Tab 3 X90F (stable-fixes).
* Add quirk for Nanote UMPC-01 (stable-fixes).
* Add quirk for OrangePi Neo (stable-fixes).
* drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values
can be stored (stable-fixes).
* Add NULL check for 'afb' before dereferencing in
amdgpu_dm_plane_handle_cursor_update (stable-fixes).
* avoid using null object of framebuffer (git-fixes).
* Fix && vs || typos (git-fixes).
* Skip Recompute DSC Params if no Stream on Link (stable-fixes).
* Validate hw_points_num before using it (stable-fixes).
* Fix the null pointer dereference for vega10_hwmgr (stable-fixes).
* Actually check flags for all context ops (stable-fixes).
* Add lock around VF RLCG interface (stable-fixes).
* fix dereference null return value for the function amdgpu_vm_pt_parent
(stable-fixes).
* Fix the null pointer dereference to ras_manager (stable-fixes).
* Validate TA binary size (stable-fixes).
* drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
* Fix the null pointer dereference for smu7 (stable-fixes).
* Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).
* Fix the param type of set_power_profile_mode (stable-fixes).
* analogix_ properly handle zero sized AUX transactions (stable-fixes).
* tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
* fix null pointer dereference in drm_client_modeset_probe (git-fixes).
* drm/dp_ Skip CSN if topology probing is not done yet (stable-fixes).
* set gp bus_stop bit before hard reset (stable-fixes).
* reset the link phy params before link training (git-fixes).
* cleanup FB if dpu_format_populate_layout fails (git-fixes).
* do not play tricks with debug macros (git-fixes).
* Zero-initialize iosys_map (stable-fixes).
* fix inode->i_blocks for non-512 byte sector size device (git-fixes).
* fix potential deadlock on __exfat_get_dentry_set (git-fixes).
* redefine DIR_DELETED as the bad cluster number (git-fixes).
* support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
* fs/netfs/fscache_ add missing "n_accesses" check (bsc#1229453).
* Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
* Add might_sleep() to disable_irq() (git-fixes).
* Always limit the affinity to online CPUs (git-fixes).
* Do not return error on missing optional irq_request_resources() (git-fixes).
* Take the proposed affinity at face value if force==true (git-fixes).
* genirq/cpuhotplug, x86 Prevent vector leak during CPU offline (git-fixes).
* genirq/generic_ Make irq_remove_generic_chip() irqdomain aware (git-fixes).
* Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes).
* Do not try to remove non-existing sysfs files (git-fixes).
* Exclude managed interrupts in irq_matrix_allocated() (git-fixes).
* Shutdown managed interrupts with unsatifiable affinities (git-fixes).
* gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-
fixes).
* fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-
fixes).
* i2 Improve handling of stuck alerts (git-fixes).
* i2 Send alert notifications to all devices if source not found (git-fixes).
* Convert comma to semicolon (git-fixes).
* ip6_ Fix broken GRO (bsc#1229444).
* ipv6: fix incorrect unregister order (git-fixes).
* Drop bogus fwspec-mapping error handling (git-fixes).
* Fix association race (git-fixes).
* Fix disassociation race (git-fixes).
* Fix domain registration race (git-fixes).
* Fix mapping-creation race (git-fixes).
* Fixed unbalanced fwnode get and put (git-fixes).
* Look for existing mapping only once (git-fixes).
* Refactor __irq_domain_alloc_irqs() (git-fixes).
* Report irq number for NOMAP domains (git-fixes).
* Revert "mm: prevent derefencing NULL ptr in pfn_section_valid()"
(bsc#1230413).
* Revert "mm, kmsan: fix infinite recursion due to RCU critical section"
(bsc#1230413).
* Revert "mm/sparsemem: fix race in accessing memory_section->usage"
(bsc#1230413).
* kernel/irq/irqdomain. fix memory leak with using debugfs_lookup() (git-
fixes).
* Fix to check symbol prefixes correctly (git-fixes).
* move from strlcpy with unused retval to strscpy (git-fixes).
* protect concurrent access to mem_cgroup_idr (git-fixes).
* mm, fix infinite recursion due to RCU critical section (git-fixes).
* prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
* dw_ allow biu and ciu clocks to defer (git-fixes).
* mmc_ Fix NULL dereference on allocation failure (git-fixes).
* ks8851: Fix another TX stall caused by wrong ISR flag handling (git-fixes).
* ks8851: Fix deadlock with the SPI chip variant (git-fixes).
* ks8851: Fix potential TX stall after interface reopen (git-fixes).
* ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
* Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491
bsc#1226530).
* Fix doorbell out of order violation and avoid unnecessary doorbell rings
(bsc#1229154).
* Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).
* Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).
* remove two BUG() from skb_checksum_help() (bsc#1229312).
* qmi_ fix memory leak for not ip packets (git-fixes).
* fix possible cp null dereference (git-fixes).
* initialize noop_qdisc owner (git-fixes).
* pn533: Add poll mod list filling check (git-fixes).
* expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
* make the rpc_stat per net namespace (git-fixes).
* add posix ACLs to struct nfsd_attrs (git-fixes).
* add security label to struct nfsd_attrs (git-fixes).
* fix regression with setting ACLs (git-fixes).
* Fix strncpy() fortify warning (git-fixes).
* Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
* introduce struct nfsd_attrs (git-fixes).
* move from strlcpy with unused retval to strscpy (git-fixes).
* Optimize DRC bucket pruning (git-fixes).
* return error if nfs4_setacl fails (git-fixes).
* set attributes when creating symlinks (git-fixes).
* use locks_inode_context helper (git-fixes).
* nilfs2: Remove check for PageError (git-fixes).
* nvme_ scan namespaces asynchronously (bsc#1224105).
* ocfs2: use coarse time for new created files (git-fixes).
* Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
* perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-
fixes).
* platform/x86 Add support for ACPI based probing (jsc#PED-8779).
* platform/x86 Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
* platform/x86 Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).
* platform/x86 Check HSMP support on AMD family of processors (jsc#PED-8779).
* platform/x86 Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).
* platform/x86 Create static func to handle platdev (jsc#PED-8779).
* platform/x86 Define a struct to hold mailbox regs (jsc#PED-8779).
* platform/x86 Move dev from platdev to hsmp_socket (jsc#PED-8779).
* platform/x86 Move hsmp_test to probe (jsc#PED-8779).
* platform/x86 Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
* platform/x86 Remove extra parenthesis and add a space (jsc#PED-8779).
* platform/x86 Restructure sysfs group creation (jsc#PED-8779).
* platform/x86 switch to use device_add_groups() (jsc#PED-8779).
* axp288_ Fix constant_charge_voltage writes (git-fixes).
* axp288_ Round constant_charge_voltage writes down (git-fixes).
* Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
* Mark .opd section read-only (bsc#1194869).
* use generic version of arch_is_kernel_initmem_freed() (bsc#1194869).
* xor_ Add '-mhard-float' to CFLAGS (bsc#1194869).
* powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n
(bsc#1194869).
* Avoid clang null pointer arithmetic warnings (bsc#1194869).
* powerpc/kexec_ fix cpus node update to FDT (bsc#1194869).
* make the update_cpus_node() function public (bsc#1194869).
* split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
* Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).
* Whitelist dtl slub object for copying to userspace (bsc#1194869).
* Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).
* Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588
git-fixes).
* Check cpu id in commands "c#", "dp#" and "dx#" (bsc#1194869).
* RDMA/mana_ Use virtual address in dma regions for MRs (git-fixes).
* Fix incomplete state save in rxe_requester (git-fixes)
* Fix rxe_modify_srq (git-fixes)
* Handle zero length rdma (git-fixes)
* Move work queue code to subroutines (git-fixes)
* s390 get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
* s390 Make use of invalid opcode produce a link error (git-fixes
bsc#1227079).
* s390 Split and rework cpacf query functions (git-fixes bsc#1229187).
* s390 fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190).
* s390 fix error recovery leading to data corruption on ESE devices (git-fixes
bsc#1229573).
* s390 Prevent release of buffer in I/O (git-fixes bsc#1229572).
* s390 Panic for set and remove shared access UVC errors (git-fixes
bsc#1229188).
* Fix scldiv calculation (git-fixes).
* add a struct rpc_stats arg to rpc_create_args (git-fixes).
* Fix a race to wake a sync task (git-fixes).
* fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
* fix compat_sys_io_pgetevents_time64 usage (git-fixes).
* Return from tracing_buffers_read() if the file has been closed (bsc#1229136
git-fixes).
* add check for crypto_shash_tfm_digest (git-fixes).
* dbg_orphan_ Fix missed key type checking (git-fixes).
* Fix adding orphan entry twice for the same inode (git-fixes).
* Fix unattached xattr inode if powercut happens after deleting (git-fixes).
* fix potential memory leak in vfio_intx_enable() (git-fixes).
* fix wgds rev 3 exact size (git-fixes).
* duplicate static structs used in driver instances (git-fixes).
* x86 drop the duplicate APM_MINOR_DEV macro (git-fixes).
* x86 Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes).
* x86 Fix pti_clone_entry_text() for i386 (git-fixes).
* x86 Check if fixed MTRRs exist before saving them (git-fixes).
* x86 Work around false positive kmemleak report in msr_build_context() (git-
fixes).
* Fix missing interval for missing_owner in xfs fsmap (git-fixes).
* Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
* use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
* Fix Panther point NULL pointer deref at full-speed re-enumeration (git-
fixes).
* Fix rpcrdma_reqs_reset() (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-3483=1 openSUSE-SLE-15.5-2024-3483=1
* openSUSE Leap Micro 5.5
zypper in -t patch openSUSE-Leap-Micro-5.5-2024-3483=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-3483=1
* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-3483=1
* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-3483=1
* Legacy Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-3483=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-3483=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-3483=1
* SUSE Linux Enterprise Workstation Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-3483=1
## Package List:
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (noarch)
* kernel-docs-html-5.14.21-150500.55.80.2
* kernel-source-5.14.21-150500.55.80.2
* kernel-macros-5.14.21-150500.55.80.2
* kernel-source-vanilla-5.14.21-150500.55.80.2
* kernel-devel-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (ppc64le x86_64)
* kernel-debug-devel-5.14.21-150500.55.80.2
* kernel-debug-livepatch-devel-5.14.21-150500.55.80.2
* kernel-debug-debugsource-5.14.21-150500.55.80.2
* kernel-debug-devel-debuginfo-5.14.21-150500.55.80.2
* kernel-debug-debuginfo-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.80.2
* kernel-kvmsmall-vdso-5.14.21-150500.55.80.2
* kernel-debug-vdso-5.14.21-150500.55.80.2
* kernel-default-vdso-5.14.21-150500.55.80.2
* kernel-debug-vdso-debuginfo-5.14.21-150500.55.80.2
* kernel-default-vdso-debuginfo-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.80.2
* kernel-kvmsmall-debugsource-5.14.21-150500.55.80.2
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.80.2
* kernel-default-base-rebuild-5.14.21-150500.55.80.2.150500.6.35.6
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.80.2
* kernel-kvmsmall-devel-5.14.21-150500.55.80.2
* kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* gfs2-kmp-default-5.14.21-150500.55.80.2
* dlm-kmp-default-debuginfo-5.14.21-150500.55.80.2
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-obs-build-debugsource-5.14.21-150500.55.80.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.80.2
* cluster-md-kmp-default-5.14.21-150500.55.80.2
* kernel-default-livepatch-5.14.21-150500.55.80.2
* dlm-kmp-default-5.14.21-150500.55.80.2
* kernel-default-extra-5.14.21-150500.55.80.2
* kernel-syms-5.14.21-150500.55.80.1
* kernel-obs-qa-5.14.21-150500.55.80.1
* kselftests-kmp-default-5.14.21-150500.55.80.2
* kernel-default-livepatch-devel-5.14.21-150500.55.80.2
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.80.2
* ocfs2-kmp-default-5.14.21-150500.55.80.2
* kernel-default-devel-debuginfo-5.14.21-150500.55.80.2
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.80.2
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.80.2
* kernel-obs-build-5.14.21-150500.55.80.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.80.2
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-optional-5.14.21-150500.55.80.2
* reiserfs-kmp-default-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-1-150500.11.3.2
* kernel-livepatch-SLE15-SP5_Update_19-debugsource-1-150500.11.3.2
* kernel-livepatch-5_14_21-150500_55_80-default-1-150500.11.3.2
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.80.2
* kernel-zfcpdump-debugsource-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.80.1
* openSUSE Leap 15.5 (aarch64)
* dtb-arm-5.14.21-150500.55.80.1
* gfs2-kmp-64kb-5.14.21-150500.55.80.2
* kernel-64kb-debuginfo-5.14.21-150500.55.80.2
* dtb-amazon-5.14.21-150500.55.80.1
* kernel-64kb-debugsource-5.14.21-150500.55.80.2
* dtb-altera-5.14.21-150500.55.80.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.80.2
* dtb-lg-5.14.21-150500.55.80.1
* dtb-exynos-5.14.21-150500.55.80.1
* dtb-rockchip-5.14.21-150500.55.80.1
* dtb-qcom-5.14.21-150500.55.80.1
* ocfs2-kmp-64kb-5.14.21-150500.55.80.2
* dtb-amlogic-5.14.21-150500.55.80.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.80.2
* kselftests-kmp-64kb-5.14.21-150500.55.80.2
* dtb-nvidia-5.14.21-150500.55.80.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.80.2
* cluster-md-kmp-64kb-5.14.21-150500.55.80.2
* dtb-amd-5.14.21-150500.55.80.1
* dtb-xilinx-5.14.21-150500.55.80.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.80.2
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.80.2
* dtb-allwinner-5.14.21-150500.55.80.1
* dtb-broadcom-5.14.21-150500.55.80.1
* dtb-socionext-5.14.21-150500.55.80.1
* dtb-sprd-5.14.21-150500.55.80.1
* dtb-freescale-5.14.21-150500.55.80.1
* kernel-64kb-devel-5.14.21-150500.55.80.2
* dtb-apm-5.14.21-150500.55.80.1
* dtb-apple-5.14.21-150500.55.80.1
* dlm-kmp-64kb-5.14.21-150500.55.80.2
* kernel-64kb-optional-5.14.21-150500.55.80.2
* reiserfs-kmp-64kb-5.14.21-150500.55.80.2
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.80.2
* kernel-64kb-extra-5.14.21-150500.55.80.2
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.80.2
* dtb-cavium-5.14.21-150500.55.80.1
* dtb-marvell-5.14.21-150500.55.80.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.80.2
* kernel-64kb-livepatch-devel-5.14.21-150500.55.80.2
* dtb-hisilicon-5.14.21-150500.55.80.1
* dtb-mediatek-5.14.21-150500.55.80.1
* dtb-renesas-5.14.21-150500.55.80.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.80.2
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.80.2
* openSUSE Leap Micro 5.5 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150500.55.80.2
* openSUSE Leap Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
* openSUSE Leap Micro 5.5 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.80.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (aarch64)
* kernel-64kb-debuginfo-5.14.21-150500.55.80.2
* kernel-64kb-debugsource-5.14.21-150500.55.80.2
* kernel-64kb-devel-5.14.21-150500.55.80.2
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-5.14.21-150500.55.80.2
* kernel-default-devel-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (noarch)
* kernel-macros-5.14.21-150500.55.80.2
* kernel-devel-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.80.2
* Basesystem Module 15-SP5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.80.2
* kernel-zfcpdump-debugsource-5.14.21-150500.55.80.2
* Development Tools Module 15-SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.80.2
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-5.14.21-150500.55.80.1
* kernel-syms-5.14.21-150500.55.80.1
* kernel-obs-build-debugsource-5.14.21-150500.55.80.1
* Development Tools Module 15-SP5 (noarch)
* kernel-source-5.14.21-150500.55.80.2
* Legacy Module 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.80.2
* Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.80.2
* reiserfs-kmp-default-5.14.21-150500.55.80.2
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.80.2
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_19-debugsource-1-150500.11.3.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-livepatch-5_14_21-150500_55_80-default-1-150500.11.3.2
* kernel-default-livepatch-devel-5.14.21-150500.55.80.2
* kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-1-150500.11.3.2
* kernel-default-livepatch-5.14.21-150500.55.80.2
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* dlm-kmp-default-5.14.21-150500.55.80.2
* dlm-kmp-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.80.2
* gfs2-kmp-default-5.14.21-150500.55.80.2
* ocfs2-kmp-default-5.14.21-150500.55.80.2
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.80.2
* cluster-md-kmp-default-5.14.21-150500.55.80.2
* SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.80.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.80.2
* SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64)
* kernel-default-extra-5.14.21-150500.55.80.2
* kernel-default-debuginfo-5.14.21-150500.55.80.2
* kernel-default-extra-debuginfo-5.14.21-150500.55.80.2
* kernel-default-debugsource-5.14.21-150500.55.80.2
## References:
* https://www.suse.com/security/cve/CVE-2021-4204.html
* https://www.suse.com/security/cve/CVE-2021-4441.html
* https://www.suse.com/security/cve/CVE-2021-47106.html
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47546.html
* https://www.suse.com/security/cve/CVE-2022-0500.html
* https://www.suse.com/security/cve/CVE-2022-23222.html
* https://www.suse.com/security/cve/CVE-2022-38457.html
* https://www.suse.com/security/cve/CVE-2022-40133.html
* https://www.suse.com/security/cve/CVE-2022-4382.html
* https://www.suse.com/security/cve/CVE-2022-48645.html
* https://www.suse.com/security/cve/CVE-2022-48706.html
* https://www.suse.com/security/cve/CVE-2022-48808.html
* https://www.suse.com/security/cve/CVE-2022-48865.html
* https://www.suse.com/security/cve/CVE-2022-48868.html
* https://www.suse.com/security/cve/CVE-2022-48869.html
* https://www.suse.com/security/cve/CVE-2022-48870.html
* https://www.suse.com/security/cve/CVE-2022-48871.html
* https://www.suse.com/security/cve/CVE-2022-48872.html
* https://www.suse.com/security/cve/CVE-2022-48873.html
* https://www.suse.com/security/cve/CVE-2022-48875.html
* https://www.suse.com/security/cve/CVE-2022-48878.html
* https://www.suse.com/security/cve/CVE-2022-48880.html
* https://www.suse.com/security/cve/CVE-2022-48881.html
* https://www.suse.com/security/cve/CVE-2022-48882.html
* https://www.suse.com/security/cve/CVE-2022-48883.html
* https://www.suse.com/security/cve/CVE-2022-48884.html
* https://www.suse.com/security/cve/CVE-2022-48885.html
* https://www.suse.com/security/cve/CVE-2022-48886.html
* https://www.suse.com/security/cve/CVE-2022-48887.html
* https://www.suse.com/security/cve/CVE-2022-48888.html
* https://www.suse.com/security/cve/CVE-2022-48889.html
* https://www.suse.com/security/cve/CVE-2022-48890.html
* https://www.suse.com/security/cve/CVE-2022-48891.html
* https://www.suse.com/security/cve/CVE-2022-48893.html
* https://www.suse.com/security/cve/CVE-2022-48896.html
* https://www.suse.com/security/cve/CVE-2022-48898.html
* https://www.suse.com/security/cve/CVE-2022-48899.html
* https://www.suse.com/security/cve/CVE-2022-48903.html
* https://www.suse.com/security/cve/CVE-2022-48904.html
* https://www.suse.com/security/cve/CVE-2022-48905.html
* https://www.suse.com/security/cve/CVE-2022-48906.html
* https://www.suse.com/security/cve/CVE-2022-48907.html
* https://www.suse.com/security/cve/CVE-2022-48909.html
* https://www.suse.com/security/cve/CVE-2022-48910.html
* https://www.suse.com/security/cve/CVE-2022-48912.html
* https://www.suse.com/security/cve/CVE-2022-48913.html
* https://www.suse.com/security/cve/CVE-2022-48914.html
* https://www.suse.com/security/cve/CVE-2022-48915.html
* https://www.suse.com/security/cve/CVE-2022-48916.html
* https://www.suse.com/security/cve/CVE-2022-48917.html
* https://www.suse.com/security/cve/CVE-2022-48918.html
* https://www.suse.com/security/cve/CVE-2022-48919.html
* https://www.suse.com/security/cve/CVE-2022-48920.html
* https://www.suse.com/security/cve/CVE-2022-48921.html
* https://www.suse.com/security/cve/CVE-2022-48923.html
* https://www.suse.com/security/cve/CVE-2022-48924.html
* https://www.suse.com/security/cve/CVE-2022-48925.html
* https://www.suse.com/security/cve/CVE-2022-48926.html
* https://www.suse.com/security/cve/CVE-2022-48927.html
* https://www.suse.com/security/cve/CVE-2022-48928.html
* https://www.suse.com/security/cve/CVE-2022-48929.html
* https://www.suse.com/security/cve/CVE-2022-48930.html
* https://www.suse.com/security/cve/CVE-2022-48931.html
* https://www.suse.com/security/cve/CVE-2022-48932.html
* https://www.suse.com/security/cve/CVE-2022-48934.html
* https://www.suse.com/security/cve/CVE-2022-48937.html
* https://www.suse.com/security/cve/CVE-2022-48938.html
* https://www.suse.com/security/cve/CVE-2022-48939.html
* https://www.suse.com/security/cve/CVE-2022-48940.html
* https://www.suse.com/security/cve/CVE-2022-48941.html
* https://www.suse.com/security/cve/CVE-2022-48942.html
* https://www.suse.com/security/cve/CVE-2022-48943.html
* https://www.suse.com/security/cve/CVE-2023-3610.html
* https://www.suse.com/security/cve/CVE-2023-52458.html
* https://www.suse.com/security/cve/CVE-2023-52489.html
* https://www.suse.com/security/cve/CVE-2023-52498.html
* https://www.suse.com/security/cve/CVE-2023-52581.html
* https://www.suse.com/security/cve/CVE-2023-52859.html
* https://www.suse.com/security/cve/CVE-2023-52887.html
* https://www.suse.com/security/cve/CVE-2023-52889.html
* https://www.suse.com/security/cve/CVE-2023-52893.html
* https://www.suse.com/security/cve/CVE-2023-52894.html
* https://www.suse.com/security/cve/CVE-2023-52896.html
* https://www.suse.com/security/cve/CVE-2023-52898.html
* https://www.suse.com/security/cve/CVE-2023-52899.html
* https://www.suse.com/security/cve/CVE-2023-52900.html
* https://www.suse.com/security/cve/CVE-2023-52901.html
* https://www.suse.com/security/cve/CVE-2023-52904.html
* https://www.suse.com/security/cve/CVE-2023-52905.html
* https://www.suse.com/security/cve/CVE-2023-52906.html
* https://www.suse.com/security/cve/CVE-2023-52907.html
* https://www.suse.com/security/cve/CVE-2023-52908.html
* https://www.suse.com/security/cve/CVE-2023-52909.html
* https://www.suse.com/security/cve/CVE-2023-52910.html
* https://www.suse.com/security/cve/CVE-2023-52911.html
* https://www.suse.com/security/cve/CVE-2023-52912.html
* https://www.suse.com/security/cve/CVE-2023-52913.html
* https://www.suse.com/security/cve/CVE-2024-26631.html
* https://www.suse.com/security/cve/CVE-2024-26668.html
* https://www.suse.com/security/cve/CVE-2024-26669.html
* https://www.suse.com/security/cve/CVE-2024-26677.html
* https://www.suse.com/security/cve/CVE-2024-26735.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26812.html
* https://www.suse.com/security/cve/CVE-2024-26835.html
* https://www.suse.com/security/cve/CVE-2024-26851.html
* https://www.suse.com/security/cve/CVE-2024-27010.html
* https://www.suse.com/security/cve/CVE-2024-27011.html
* https://www.suse.com/security/cve/CVE-2024-27016.html
* https://www.suse.com/security/cve/CVE-2024-27024.html
* https://www.suse.com/security/cve/CVE-2024-27079.html
* https://www.suse.com/security/cve/CVE-2024-27403.html
* https://www.suse.com/security/cve/CVE-2024-31076.html
* https://www.suse.com/security/cve/CVE-2024-35897.html
* https://www.suse.com/security/cve/CVE-2024-35902.html
* https://www.suse.com/security/cve/CVE-2024-35945.html
* https://www.suse.com/security/cve/CVE-2024-35971.html
* https://www.suse.com/security/cve/CVE-2024-36009.html
* https://www.suse.com/security/cve/CVE-2024-36013.html
* https://www.suse.com/security/cve/CVE-2024-36270.html
* https://www.suse.com/security/cve/CVE-2024-36286.html
* https://www.suse.com/security/cve/CVE-2024-36489.html
* https://www.suse.com/security/cve/CVE-2024-36929.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-36936.html
* https://www.suse.com/security/cve/CVE-2024-36962.html
* https://www.suse.com/security/cve/CVE-2024-38554.html
* https://www.suse.com/security/cve/CVE-2024-38602.html
* https://www.suse.com/security/cve/CVE-2024-38662.html
* https://www.suse.com/security/cve/CVE-2024-39489.html
* https://www.suse.com/security/cve/CVE-2024-40905.html
* https://www.suse.com/security/cve/CVE-2024-40978.html
* https://www.suse.com/security/cve/CVE-2024-40980.html
* https://www.suse.com/security/cve/CVE-2024-40995.html
* https://www.suse.com/security/cve/CVE-2024-41000.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-41009.html
* https://www.suse.com/security/cve/CVE-2024-41011.html
* https://www.suse.com/security/cve/CVE-2024-41016.html
* https://www.suse.com/security/cve/CVE-2024-41020.html
* https://www.suse.com/security/cve/CVE-2024-41022.html
* https://www.suse.com/security/cve/CVE-2024-41035.html
* https://www.suse.com/security/cve/CVE-2024-41036.html
* https://www.suse.com/security/cve/CVE-2024-41038.html
* https://www.suse.com/security/cve/CVE-2024-41039.html
* https://www.suse.com/security/cve/CVE-2024-41042.html
* https://www.suse.com/security/cve/CVE-2024-41045.html
* https://www.suse.com/security/cve/CVE-2024-41056.html
* https://www.suse.com/security/cve/CVE-2024-41060.html
* https://www.suse.com/security/cve/CVE-2024-41062.html
* https://www.suse.com/security/cve/CVE-2024-41065.html
* https://www.suse.com/security/cve/CVE-2024-41068.html
* https://www.suse.com/security/cve/CVE-2024-41073.html
* https://www.suse.com/security/cve/CVE-2024-41079.html
* https://www.suse.com/security/cve/CVE-2024-41080.html
* https://www.suse.com/security/cve/CVE-2024-41087.html
* https://www.suse.com/security/cve/CVE-2024-41088.html
* https://www.suse.com/security/cve/CVE-2024-41089.html
* https://www.suse.com/security/cve/CVE-2024-41092.html
* https://www.suse.com/security/cve/CVE-2024-41093.html
* https://www.suse.com/security/cve/CVE-2024-41095.html
* https://www.suse.com/security/cve/CVE-2024-41097.html
* https://www.suse.com/security/cve/CVE-2024-41098.html
* https://www.suse.com/security/cve/CVE-2024-42069.html
* https://www.suse.com/security/cve/CVE-2024-42074.html
* https://www.suse.com/security/cve/CVE-2024-42076.html
* https://www.suse.com/security/cve/CVE-2024-42077.html
* https://www.suse.com/security/cve/CVE-2024-42080.html
* https://www.suse.com/security/cve/CVE-2024-42082.html
* https://www.suse.com/security/cve/CVE-2024-42085.html
* https://www.suse.com/security/cve/CVE-2024-42086.html
* https://www.suse.com/security/cve/CVE-2024-42087.html
* https://www.suse.com/security/cve/CVE-2024-42089.html
* https://www.suse.com/security/cve/CVE-2024-42090.html
* https://www.suse.com/security/cve/CVE-2024-42092.html
* https://www.suse.com/security/cve/CVE-2024-42095.html
* https://www.suse.com/security/cve/CVE-2024-42097.html
* https://www.suse.com/security/cve/CVE-2024-42098.html
* https://www.suse.com/security/cve/CVE-2024-42101.html
* https://www.suse.com/security/cve/CVE-2024-42104.html
* https://www.suse.com/security/cve/CVE-2024-42106.html
* https://www.suse.com/security/cve/CVE-2024-42107.html
* https://www.suse.com/security/cve/CVE-2024-42110.html
* https://www.suse.com/security/cve/CVE-2024-42114.html
* https://www.suse.com/security/cve/CVE-2024-42115.html
* https://www.suse.com/security/cve/CVE-2024-42119.html
* https://www.suse.com/security/cve/CVE-2024-42120.html
* https://www.suse.com/security/cve/CVE-2024-42121.html
* https://www.suse.com/security/cve/CVE-2024-42126.html
* https://www.suse.com/security/cve/CVE-2024-42127.html
* https://www.suse.com/security/cve/CVE-2024-42130.html
* https://www.suse.com/security/cve/CVE-2024-42137.html
* https://www.suse.com/security/cve/CVE-2024-42139.html
* https://www.suse.com/security/cve/CVE-2024-42142.html
* https://www.suse.com/security/cve/CVE-2024-42143.html
* https://www.suse.com/security/cve/CVE-2024-42148.html
* https://www.suse.com/security/cve/CVE-2024-42152.html
* https://www.suse.com/security/cve/CVE-2024-42155.html
* https://www.suse.com/security/cve/CVE-2024-42156.html
* https://www.suse.com/security/cve/CVE-2024-42157.html
* https://www.suse.com/security/cve/CVE-2024-42158.html
* https://www.suse.com/security/cve/CVE-2024-42162.html
* https://www.suse.com/security/cve/CVE-2024-42223.html
* https://www.suse.com/security/cve/CVE-2024-42225.html
* https://www.suse.com/security/cve/CVE-2024-42228.html
* https://www.suse.com/security/cve/CVE-2024-42229.html
* https://www.suse.com/security/cve/CVE-2024-42230.html
* https://www.suse.com/security/cve/CVE-2024-42232.html
* https://www.suse.com/security/cve/CVE-2024-42236.html
* https://www.suse.com/security/cve/CVE-2024-42237.html
* https://www.suse.com/security/cve/CVE-2024-42238.html
* https://www.suse.com/security/cve/CVE-2024-42239.html
* https://www.suse.com/security/cve/CVE-2024-42240.html
* https://www.suse.com/security/cve/CVE-2024-42244.html
* https://www.suse.com/security/cve/CVE-2024-42246.html
* https://www.suse.com/security/cve/CVE-2024-42247.html
* https://www.suse.com/security/cve/CVE-2024-42268.html
* https://www.suse.com/security/cve/CVE-2024-42271.html
* https://www.suse.com/security/cve/CVE-2024-42274.html
* https://www.suse.com/security/cve/CVE-2024-42276.html
* https://www.suse.com/security/cve/CVE-2024-42277.html
* https://www.suse.com/security/cve/CVE-2024-42280.html
* https://www.suse.com/security/cve/CVE-2024-42281.html
* https://www.suse.com/security/cve/CVE-2024-42283.html
* https://www.suse.com/security/cve/CVE-2024-42284.html
* https://www.suse.com/security/cve/CVE-2024-42285.html
* https://www.suse.com/security/cve/CVE-2024-42286.html
* https://www.suse.com/security/cve/CVE-2024-42287.html
* https://www.suse.com/security/cve/CVE-2024-42288.html
* https://www.suse.com/security/cve/CVE-2024-42289.html
* https://www.suse.com/security/cve/CVE-2024-42291.html
* https://www.suse.com/security/cve/CVE-2024-42292.html
* https://www.suse.com/security/cve/CVE-2024-42295.html
* https://www.suse.com/security/cve/CVE-2024-42301.html
* https://www.suse.com/security/cve/CVE-2024-42302.html
* https://www.suse.com/security/cve/CVE-2024-42308.html
* https://www.suse.com/security/cve/CVE-2024-42309.html
* https://www.suse.com/security/cve/CVE-2024-42310.html
* https://www.suse.com/security/cve/CVE-2024-42311.html
* https://www.suse.com/security/cve/CVE-2024-42312.html
* https://www.suse.com/security/cve/CVE-2024-42313.html
* https://www.suse.com/security/cve/CVE-2024-42315.html
* https://www.suse.com/security/cve/CVE-2024-42318.html
* https://www.suse.com/security/cve/CVE-2024-42319.html
* https://www.suse.com/security/cve/CVE-2024-42320.html
* https://www.suse.com/security/cve/CVE-2024-42322.html
* https://www.suse.com/security/cve/CVE-2024-43816.html
* https://www.suse.com/security/cve/CVE-2024-43818.html
* https://www.suse.com/security/cve/CVE-2024-43819.html
* https://www.suse.com/security/cve/CVE-2024-43821.html
* https://www.suse.com/security/cve/CVE-2024-43823.html
* https://www.suse.com/security/cve/CVE-2024-43829.html
* https://www.suse.com/security/cve/CVE-2024-43830.html
* https://www.suse.com/security/cve/CVE-2024-43831.html
* https://www.suse.com/security/cve/CVE-2024-43834.html
* https://www.suse.com/security/cve/CVE-2024-43837.html
* https://www.suse.com/security/cve/CVE-2024-43839.html
* https://www.suse.com/security/cve/CVE-2024-43841.html
* https://www.suse.com/security/cve/CVE-2024-43842.html
* https://www.suse.com/security/cve/CVE-2024-43846.html
* https://www.suse.com/security/cve/CVE-2024-43849.html
* https://www.suse.com/security/cve/CVE-2024-43853.html
* https://www.suse.com/security/cve/CVE-2024-43854.html
* https://www.suse.com/security/cve/CVE-2024-43856.html
* https://www.suse.com/security/cve/CVE-2024-43858.html
* https://www.suse.com/security/cve/CVE-2024-43860.html
* https://www.suse.com/security/cve/CVE-2024-43861.html
* https://www.suse.com/security/cve/CVE-2024-43863.html
* https://www.suse.com/security/cve/CVE-2024-43866.html
* https://www.suse.com/security/cve/CVE-2024-43867.html
* https://www.suse.com/security/cve/CVE-2024-43871.html
* https://www.suse.com/security/cve/CVE-2024-43872.html
* https://www.suse.com/security/cve/CVE-2024-43873.html
* https://www.suse.com/security/cve/CVE-2024-43879.html
* https://www.suse.com/security/cve/CVE-2024-43880.html
* https://www.suse.com/security/cve/CVE-2024-43882.html
* https://www.suse.com/security/cve/CVE-2024-43883.html
* https://www.suse.com/security/cve/CVE-2024-43884.html
* https://www.suse.com/security/cve/CVE-2024-43889.html
* https://www.suse.com/security/cve/CVE-2024-43892.html
* https://www.suse.com/security/cve/CVE-2024-43893.html
* https://www.suse.com/security/cve/CVE-2024-43894.html
* https://www.suse.com/security/cve/CVE-2024-43895.html
* https://www.suse.com/security/cve/CVE-2024-43899.html
* https://www.suse.com/security/cve/CVE-2024-43900.html
* https://www.suse.com/security/cve/CVE-2024-43902.html
* https://www.suse.com/security/cve/CVE-2024-43903.html
* https://www.suse.com/security/cve/CVE-2024-43904.html
* https://www.suse.com/security/cve/CVE-2024-43905.html
* https://www.suse.com/security/cve/CVE-2024-43907.html
* https://www.suse.com/security/cve/CVE-2024-43908.html
* https://www.suse.com/security/cve/CVE-2024-43909.html
* https://www.suse.com/security/cve/CVE-2024-44938.html
* https://www.suse.com/security/cve/CVE-2024-44939.html
* https://www.suse.com/security/cve/CVE-2024-44947.html
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194111
* https://bugzilla.suse.com/show_bug.cgi?id=1194765
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196261
* https://bugzilla.suse.com/show_bug.cgi?id=1196516
* https://bugzilla.suse.com/show_bug.cgi?id=1196894
* https://bugzilla.suse.com/show_bug.cgi?id=1198017
* https://bugzilla.suse.com/show_bug.cgi?id=1203329
* https://bugzilla.suse.com/show_bug.cgi?id=1203330
* https://bugzilla.suse.com/show_bug.cgi?id=1203360
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1206006
* https://bugzilla.suse.com/show_bug.cgi?id=1206258
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1207158
* https://bugzilla.suse.com/show_bug.cgi?id=1208783
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1213580
* https://bugzilla.suse.com/show_bug.cgi?id=1213632
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1216834
* https://bugzilla.suse.com/show_bug.cgi?id=1220428
* https://bugzilla.suse.com/show_bug.cgi?id=1220877
* https://bugzilla.suse.com/show_bug.cgi?id=1220962
* https://bugzilla.suse.com/show_bug.cgi?id=1221269
* https://bugzilla.suse.com/show_bug.cgi?id=1221326
* https://bugzilla.suse.com/show_bug.cgi?id=1221630
* https://bugzilla.suse.com/show_bug.cgi?id=1221645
* https://bugzilla.suse.com/show_bug.cgi?id=1222335
* https://bugzilla.suse.com/show_bug.cgi?id=1222350
* https://bugzilla.suse.com/show_bug.cgi?id=1222372
* https://bugzilla.suse.com/show_bug.cgi?id=1222387
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1222808
* https://bugzilla.suse.com/show_bug.cgi?id=1222967
* https://bugzilla.suse.com/show_bug.cgi?id=1223074
* https://bugzilla.suse.com/show_bug.cgi?id=1223191
* https://bugzilla.suse.com/show_bug.cgi?id=1223508
* https://bugzilla.suse.com/show_bug.cgi?id=1223720
* https://bugzilla.suse.com/show_bug.cgi?id=1223742
* https://bugzilla.suse.com/show_bug.cgi?id=1223777
* https://bugzilla.suse.com/show_bug.cgi?id=1223803
* https://bugzilla.suse.com/show_bug.cgi?id=1223807
* https://bugzilla.suse.com/show_bug.cgi?id=1224105
* https://bugzilla.suse.com/show_bug.cgi?id=1224415
* https://bugzilla.suse.com/show_bug.cgi?id=1224496
* https://bugzilla.suse.com/show_bug.cgi?id=1224510
* https://bugzilla.suse.com/show_bug.cgi?id=1224542
* https://bugzilla.suse.com/show_bug.cgi?id=1224578
* https://bugzilla.suse.com/show_bug.cgi?id=1224639
* https://bugzilla.suse.com/show_bug.cgi?id=1225162
* https://bugzilla.suse.com/show_bug.cgi?id=1225352
* https://bugzilla.suse.com/show_bug.cgi?id=1225428
* https://bugzilla.suse.com/show_bug.cgi?id=1225524
* https://bugzilla.suse.com/show_bug.cgi?id=1225578
* https://bugzilla.suse.com/show_bug.cgi?id=1225582
* https://bugzilla.suse.com/show_bug.cgi?id=1225773
* https://bugzilla.suse.com/show_bug.cgi?id=1225814
* https://bugzilla.suse.com/show_bug.cgi?id=1225827
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1225903
* https://bugzilla.suse.com/show_bug.cgi?id=1226168
* https://bugzilla.suse.com/show_bug.cgi?id=1226530
* https://bugzilla.suse.com/show_bug.cgi?id=1226613
* https://bugzilla.suse.com/show_bug.cgi?id=1226742
* https://bugzilla.suse.com/show_bug.cgi?id=1226765
* https://bugzilla.suse.com/show_bug.cgi?id=1226798
* https://bugzilla.suse.com/show_bug.cgi?id=1226801
* https://bugzilla.suse.com/show_bug.cgi?id=1226874
* https://bugzilla.suse.com/show_bug.cgi?id=1226885
* https://bugzilla.suse.com/show_bug.cgi?id=1227079
* https://bugzilla.suse.com/show_bug.cgi?id=1227623
* https://bugzilla.suse.com/show_bug.cgi?id=1227761
* https://bugzilla.suse.com/show_bug.cgi?id=1227830
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227867
* https://bugzilla.suse.com/show_bug.cgi?id=1227929
* https://bugzilla.suse.com/show_bug.cgi?id=1227937
* https://bugzilla.suse.com/show_bug.cgi?id=1227958
* https://bugzilla.suse.com/show_bug.cgi?id=1228020
* https://bugzilla.suse.com/show_bug.cgi?id=1228065
* https://bugzilla.suse.com/show_bug.cgi?id=1228114
* https://bugzilla.suse.com/show_bug.cgi?id=1228410
* https://bugzilla.suse.com/show_bug.cgi?id=1228426
* https://bugzilla.suse.com/show_bug.cgi?id=1228427
* https://bugzilla.suse.com/show_bug.cgi?id=1228429
* https://bugzilla.suse.com/show_bug.cgi?id=1228446
* https://bugzilla.suse.com/show_bug.cgi?id=1228447
* https://bugzilla.suse.com/show_bug.cgi?id=1228449
* https://bugzilla.suse.com/show_bug.cgi?id=1228450
* https://bugzilla.suse.com/show_bug.cgi?id=1228452
* https://bugzilla.suse.com/show_bug.cgi?id=1228456
* https://bugzilla.suse.com/show_bug.cgi?id=1228463
* https://bugzilla.suse.com/show_bug.cgi?id=1228466
* https://bugzilla.suse.com/show_bug.cgi?id=1228467
* https://bugzilla.suse.com/show_bug.cgi?id=1228469
* https://bugzilla.suse.com/show_bug.cgi?id=1228480
* https://bugzilla.suse.com/show_bug.cgi?id=1228481
* https://bugzilla.suse.com/show_bug.cgi?id=1228482
* https://bugzilla.suse.com/show_bug.cgi?id=1228483
* https://bugzilla.suse.com/show_bug.cgi?id=1228484
* https://bugzilla.suse.com/show_bug.cgi?id=1228485
* https://bugzilla.suse.com/show_bug.cgi?id=1228487
* https://bugzilla.suse.com/show_bug.cgi?id=1228489
* https://bugzilla.suse.com/show_bug.cgi?id=1228491
* https://bugzilla.suse.com/show_bug.cgi?id=1228493
* https://bugzilla.suse.com/show_bug.cgi?id=1228494
* https://bugzilla.suse.com/show_bug.cgi?id=1228495
* https://bugzilla.suse.com/show_bug.cgi?id=1228496
* https://bugzilla.suse.com/show_bug.cgi?id=1228501
* https://bugzilla.suse.com/show_bug.cgi?id=1228503
* https://bugzilla.suse.com/show_bug.cgi?id=1228509
* https://bugzilla.suse.com/show_bug.cgi?id=1228513
* https://bugzilla.suse.com/show_bug.cgi?id=1228515
* https://bugzilla.suse.com/show_bug.cgi?id=1228516
* https://bugzilla.suse.com/show_bug.cgi?id=1228526
* https://bugzilla.suse.com/show_bug.cgi?id=1228531
* https://bugzilla.suse.com/show_bug.cgi?id=1228563
* https://bugzilla.suse.com/show_bug.cgi?id=1228564
* https://bugzilla.suse.com/show_bug.cgi?id=1228567
* https://bugzilla.suse.com/show_bug.cgi?id=1228576
* https://bugzilla.suse.com/show_bug.cgi?id=1228579
* https://bugzilla.suse.com/show_bug.cgi?id=1228584
* https://bugzilla.suse.com/show_bug.cgi?id=1228588
* https://bugzilla.suse.com/show_bug.cgi?id=1228590
* https://bugzilla.suse.com/show_bug.cgi?id=1228615
* https://bugzilla.suse.com/show_bug.cgi?id=1228616
* https://bugzilla.suse.com/show_bug.cgi?id=1228635
* https://bugzilla.suse.com/show_bug.cgi?id=1228636
* https://bugzilla.suse.com/show_bug.cgi?id=1228654
* https://bugzilla.suse.com/show_bug.cgi?id=1228656
* https://bugzilla.suse.com/show_bug.cgi?id=1228658
* https://bugzilla.suse.com/show_bug.cgi?id=1228660
* https://bugzilla.suse.com/show_bug.cgi?id=1228662
* https://bugzilla.suse.com/show_bug.cgi?id=1228667
* https://bugzilla.suse.com/show_bug.cgi?id=1228673
* https://bugzilla.suse.com/show_bug.cgi?id=1228677
* https://bugzilla.suse.com/show_bug.cgi?id=1228687
* https://bugzilla.suse.com/show_bug.cgi?id=1228706
* https://bugzilla.suse.com/show_bug.cgi?id=1228708
* https://bugzilla.suse.com/show_bug.cgi?id=1228710
* https://bugzilla.suse.com/show_bug.cgi?id=1228718
* https://bugzilla.suse.com/show_bug.cgi?id=1228720
* https://bugzilla.suse.com/show_bug.cgi?id=1228721
* https://bugzilla.suse.com/show_bug.cgi?id=1228722
* https://bugzilla.suse.com/show_bug.cgi?id=1228724
* https://bugzilla.suse.com/show_bug.cgi?id=1228726
* https://bugzilla.suse.com/show_bug.cgi?id=1228727
* https://bugzilla.suse.com/show_bug.cgi?id=1228733
* https://bugzilla.suse.com/show_bug.cgi?id=1228748
* https://bugzilla.suse.com/show_bug.cgi?id=1228766
* https://bugzilla.suse.com/show_bug.cgi?id=1228779
* https://bugzilla.suse.com/show_bug.cgi?id=1228801
* https://bugzilla.suse.com/show_bug.cgi?id=1228850
* https://bugzilla.suse.com/show_bug.cgi?id=1228857
* https://bugzilla.suse.com/show_bug.cgi?id=1228959
* https://bugzilla.suse.com/show_bug.cgi?id=1228964
* https://bugzilla.suse.com/show_bug.cgi?id=1228966
* https://bugzilla.suse.com/show_bug.cgi?id=1228967
* https://bugzilla.suse.com/show_bug.cgi?id=1228979
* https://bugzilla.suse.com/show_bug.cgi?id=1228988
* https://bugzilla.suse.com/show_bug.cgi?id=1228989
* https://bugzilla.suse.com/show_bug.cgi?id=1228991
* https://bugzilla.suse.com/show_bug.cgi?id=1228992
* https://bugzilla.suse.com/show_bug.cgi?id=1229042
* https://bugzilla.suse.com/show_bug.cgi?id=1229054
* https://bugzilla.suse.com/show_bug.cgi?id=1229086
* https://bugzilla.suse.com/show_bug.cgi?id=1229136
* https://bugzilla.suse.com/show_bug.cgi?id=1229154
* https://bugzilla.suse.com/show_bug.cgi?id=1229187
* https://bugzilla.suse.com/show_bug.cgi?id=1229188
* https://bugzilla.suse.com/show_bug.cgi?id=1229190
* https://bugzilla.suse.com/show_bug.cgi?id=1229287
* https://bugzilla.suse.com/show_bug.cgi?id=1229290
* https://bugzilla.suse.com/show_bug.cgi?id=1229292
* https://bugzilla.suse.com/show_bug.cgi?id=1229296
* https://bugzilla.suse.com/show_bug.cgi?id=1229297
* https://bugzilla.suse.com/show_bug.cgi?id=1229301
* https://bugzilla.suse.com/show_bug.cgi?id=1229303
* https://bugzilla.suse.com/show_bug.cgi?id=1229304
* https://bugzilla.suse.com/show_bug.cgi?id=1229305
* https://bugzilla.suse.com/show_bug.cgi?id=1229307
* https://bugzilla.suse.com/show_bug.cgi?id=1229309
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1229314
* https://bugzilla.suse.com/show_bug.cgi?id=1229315
* https://bugzilla.suse.com/show_bug.cgi?id=1229317
* https://bugzilla.suse.com/show_bug.cgi?id=1229318
* https://bugzilla.suse.com/show_bug.cgi?id=1229319
* https://bugzilla.suse.com/show_bug.cgi?id=1229327
* https://bugzilla.suse.com/show_bug.cgi?id=1229341
* https://bugzilla.suse.com/show_bug.cgi?id=1229345
* https://bugzilla.suse.com/show_bug.cgi?id=1229346
* https://bugzilla.suse.com/show_bug.cgi?id=1229347
* https://bugzilla.suse.com/show_bug.cgi?id=1229349
* https://bugzilla.suse.com/show_bug.cgi?id=1229350
* https://bugzilla.suse.com/show_bug.cgi?id=1229351
* https://bugzilla.suse.com/show_bug.cgi?id=1229354
* https://bugzilla.suse.com/show_bug.cgi?id=1229356
* https://bugzilla.suse.com/show_bug.cgi?id=1229357
* https://bugzilla.suse.com/show_bug.cgi?id=1229358
* https://bugzilla.suse.com/show_bug.cgi?id=1229359
* https://bugzilla.suse.com/show_bug.cgi?id=1229360
* https://bugzilla.suse.com/show_bug.cgi?id=1229366
* https://bugzilla.suse.com/show_bug.cgi?id=1229370
* https://bugzilla.suse.com/show_bug.cgi?id=1229373
* https://bugzilla.suse.com/show_bug.cgi?id=1229374
* https://bugzilla.suse.com/show_bug.cgi?id=1229381
* https://bugzilla.suse.com/show_bug.cgi?id=1229382
* https://bugzilla.suse.com/show_bug.cgi?id=1229383
* https://bugzilla.suse.com/show_bug.cgi?id=1229386
* https://bugzilla.suse.com/show_bug.cgi?id=1229388
* https://bugzilla.suse.com/show_bug.cgi?id=1229391
* https://bugzilla.suse.com/show_bug.cgi?id=1229392
* https://bugzilla.suse.com/show_bug.cgi?id=1229395
* https://bugzilla.suse.com/show_bug.cgi?id=1229398
* https://bugzilla.suse.com/show_bug.cgi?id=1229399
* https://bugzilla.suse.com/show_bug.cgi?id=1229400
* https://bugzilla.suse.com/show_bug.cgi?id=1229407
* https://bugzilla.suse.com/show_bug.cgi?id=1229409
* https://bugzilla.suse.com/show_bug.cgi?id=1229410
* https://bugzilla.suse.com/show_bug.cgi?id=1229411
* https://bugzilla.suse.com/show_bug.cgi?id=1229413
* https://bugzilla.suse.com/show_bug.cgi?id=1229414
* https://bugzilla.suse.com/show_bug.cgi?id=1229417
* https://bugzilla.suse.com/show_bug.cgi?id=1229418
* https://bugzilla.suse.com/show_bug.cgi?id=1229444
* https://bugzilla.suse.com/show_bug.cgi?id=1229453
* https://bugzilla.suse.com/show_bug.cgi?id=1229454
* https://bugzilla.suse.com/show_bug.cgi?id=1229481
* https://bugzilla.suse.com/show_bug.cgi?id=1229482
* https://bugzilla.suse.com/show_bug.cgi?id=1229488
* https://bugzilla.suse.com/show_bug.cgi?id=1229489
* https://bugzilla.suse.com/show_bug.cgi?id=1229490
* https://bugzilla.suse.com/show_bug.cgi?id=1229493
* https://bugzilla.suse.com/show_bug.cgi?id=1229495
* https://bugzilla.suse.com/show_bug.cgi?id=1229497
* https://bugzilla.suse.com/show_bug.cgi?id=1229500
* https://bugzilla.suse.com/show_bug.cgi?id=1229503
* https://bugzilla.suse.com/show_bug.cgi?id=1229506
* https://bugzilla.suse.com/show_bug.cgi?id=1229507
* https://bugzilla.suse.com/show_bug.cgi?id=1229508
* https://bugzilla.suse.com/show_bug.cgi?id=1229509
* https://bugzilla.suse.com/show_bug.cgi?id=1229510
* https://bugzilla.suse.com/show_bug.cgi?id=1229512
* https://bugzilla.suse.com/show_bug.cgi?id=1229516
* https://bugzilla.suse.com/show_bug.cgi?id=1229521
* https://bugzilla.suse.com/show_bug.cgi?id=1229522
* https://bugzilla.suse.com/show_bug.cgi?id=1229523
* https://bugzilla.suse.com/show_bug.cgi?id=1229524
* https://bugzilla.suse.com/show_bug.cgi?id=1229525
* https://bugzilla.suse.com/show_bug.cgi?id=1229526
* https://bugzilla.suse.com/show_bug.cgi?id=1229527
* https://bugzilla.suse.com/show_bug.cgi?id=1229528
* https://bugzilla.suse.com/show_bug.cgi?id=1229529
* https://bugzilla.suse.com/show_bug.cgi?id=1229531
* https://bugzilla.suse.com/show_bug.cgi?id=1229533
* https://bugzilla.suse.com/show_bug.cgi?id=1229535
* https://bugzilla.suse.com/show_bug.cgi?id=1229536
* https://bugzilla.suse.com/show_bug.cgi?id=1229537
* https://bugzilla.suse.com/show_bug.cgi?id=1229540
* https://bugzilla.suse.com/show_bug.cgi?id=1229544
* https://bugzilla.suse.com/show_bug.cgi?id=1229545
* https://bugzilla.suse.com/show_bug.cgi?id=1229546
* https://bugzilla.suse.com/show_bug.cgi?id=1229547
* https://bugzilla.suse.com/show_bug.cgi?id=1229548
* https://bugzilla.suse.com/show_bug.cgi?id=1229554
* https://bugzilla.suse.com/show_bug.cgi?id=1229557
* https://bugzilla.suse.com/show_bug.cgi?id=1229558
* https://bugzilla.suse.com/show_bug.cgi?id=1229559
* https://bugzilla.suse.com/show_bug.cgi?id=1229560
* https://bugzilla.suse.com/show_bug.cgi?id=1229562
* https://bugzilla.suse.com/show_bug.cgi?id=1229564
* https://bugzilla.suse.com/show_bug.cgi?id=1229565
* https://bugzilla.suse.com/show_bug.cgi?id=1229566
* https://bugzilla.suse.com/show_bug.cgi?id=1229568
* https://bugzilla.suse.com/show_bug.cgi?id=1229569
* https://bugzilla.suse.com/show_bug.cgi?id=1229572
* https://bugzilla.suse.com/show_bug.cgi?id=1229573
* https://bugzilla.suse.com/show_bug.cgi?id=1229576
* https://bugzilla.suse.com/show_bug.cgi?id=1229581
* https://bugzilla.suse.com/show_bug.cgi?id=1229588
* https://bugzilla.suse.com/show_bug.cgi?id=1229598
* https://bugzilla.suse.com/show_bug.cgi?id=1229603
* https://bugzilla.suse.com/show_bug.cgi?id=1229604
* https://bugzilla.suse.com/show_bug.cgi?id=1229605
* https://bugzilla.suse.com/show_bug.cgi?id=1229608
* https://bugzilla.suse.com/show_bug.cgi?id=1229611
* https://bugzilla.suse.com/show_bug.cgi?id=1229612
* https://bugzilla.suse.com/show_bug.cgi?id=1229613
* https://bugzilla.suse.com/show_bug.cgi?id=1229614
* https://bugzilla.suse.com/show_bug.cgi?id=1229615
* https://bugzilla.suse.com/show_bug.cgi?id=1229616
* https://bugzilla.suse.com/show_bug.cgi?id=1229617
* https://bugzilla.suse.com/show_bug.cgi?id=1229620
* https://bugzilla.suse.com/show_bug.cgi?id=1229622
* https://bugzilla.suse.com/show_bug.cgi?id=1229623
* https://bugzilla.suse.com/show_bug.cgi?id=1229624
* https://bugzilla.suse.com/show_bug.cgi?id=1229625
* https://bugzilla.suse.com/show_bug.cgi?id=1229626
* https://bugzilla.suse.com/show_bug.cgi?id=1229628
* https://bugzilla.suse.com/show_bug.cgi?id=1229629
* https://bugzilla.suse.com/show_bug.cgi?id=1229630
* https://bugzilla.suse.com/show_bug.cgi?id=1229631
* https://bugzilla.suse.com/show_bug.cgi?id=1229632
* https://bugzilla.suse.com/show_bug.cgi?id=1229635
* https://bugzilla.suse.com/show_bug.cgi?id=1229636
* https://bugzilla.suse.com/show_bug.cgi?id=1229637
* https://bugzilla.suse.com/show_bug.cgi?id=1229638
* https://bugzilla.suse.com/show_bug.cgi?id=1229639
* https://bugzilla.suse.com/show_bug.cgi?id=1229641
* https://bugzilla.suse.com/show_bug.cgi?id=1229642
* https://bugzilla.suse.com/show_bug.cgi?id=1229643
* https://bugzilla.suse.com/show_bug.cgi?id=1229645
* https://bugzilla.suse.com/show_bug.cgi?id=1229657
* https://bugzilla.suse.com/show_bug.cgi?id=1229658
* https://bugzilla.suse.com/show_bug.cgi?id=1229662
* https://bugzilla.suse.com/show_bug.cgi?id=1229664
* https://bugzilla.suse.com/show_bug.cgi?id=1229707
* https://bugzilla.suse.com/show_bug.cgi?id=1229739
* https://bugzilla.suse.com/show_bug.cgi?id=1229743
* https://bugzilla.suse.com/show_bug.cgi?id=1229746
* https://bugzilla.suse.com/show_bug.cgi?id=1229754
* https://bugzilla.suse.com/show_bug.cgi?id=1229755
* https://bugzilla.suse.com/show_bug.cgi?id=1229756
* https://bugzilla.suse.com/show_bug.cgi?id=1229759
* https://bugzilla.suse.com/show_bug.cgi?id=1229761
* https://bugzilla.suse.com/show_bug.cgi?id=1229767
* https://bugzilla.suse.com/show_bug.cgi?id=1229768
* https://bugzilla.suse.com/show_bug.cgi?id=1229781
* https://bugzilla.suse.com/show_bug.cgi?id=1229784
* https://bugzilla.suse.com/show_bug.cgi?id=1229787
* https://bugzilla.suse.com/show_bug.cgi?id=1229788
* https://bugzilla.suse.com/show_bug.cgi?id=1229789
* https://bugzilla.suse.com/show_bug.cgi?id=1229792
* https://bugzilla.suse.com/show_bug.cgi?id=1229820
* https://bugzilla.suse.com/show_bug.cgi?id=1230413
* https://jira.suse.com/browse/PED-8491
* https://jira.suse.com/browse/PED-8779
1
0
openSUSE-RU-2024:0317-1: moderate: Recommended update for upx
by maintenanceďĽ opensuse.org 27 Sep '24
by maintenanceďĽ opensuse.org 27 Sep '24
27 Sep '24
openSUSE Recommended Update: Recommended update for upx
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0317-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for upx fixes the following issues:
Update to release 4.1
* ELF: handle shared libraries with more than 2 PT_LOAD segments
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-317=1
Package List:
- openSUSE Backports SLE-15-SP5 (aarch64 ppc64le s390x x86_64):
upx-4.1.0-bp155.2.3.1
References:
1
0
openSUSE-RU-2024:0316-1: moderate: Recommended update for gh
by maintenanceďĽ opensuse.org 27 Sep '24
by maintenanceďĽ opensuse.org 27 Sep '24
27 Sep '24
openSUSE Recommended Update: Recommended update for gh
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0316-1
Rating: moderate
References:
Affected Products:
openSUSE Backports SLE-15-SP5
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
This update for gh fixes the following issues:
gh was updated to version 2.57.0:
* Update go-gh to use api subdomains
* Use api subdomains for commands using ghinstance package
* Add test for extension install fallback to amd64 on darwin
* suppress att verify output when no tty
* add att verify test for custom OIDC issuer
* build(deps): bump github.com/sigstore/sigstore-go from 0.6.1 to 0.6.2
* Suggest installing Rosetta when extension installation fails due to
missing `darwin-arm64` binary, but a `darwin-amd64` binary is available
* This commit introduces tenancy aware attestation policy building.
* use sigstore-go v0.6.2
* check specific err
* check err in GetLocalAttestations
* check for sigstore-go validation errs
* get latest sigstore-go commit
* handle os.PathError in GetLocalAttestations
* Move non-integration test to different test file
* print verify err
* check for os.PathError
* dont print err content
* update bundle file parsing err messages
* Expand active test cases
* Added `--active` flag to the `gh auth status` command
Update to version 2.56.0:
* Check for nil values to prevent nil dereference panic
* build(deps): bump actions/attest-build-provenance from 1.4.2 to 1.4.3
* Update linux install to point to GPG troubleshoot
* Revert "Remove note explaining 2 year old GPG ID change"
* Remove note explaining 2 year old GPG ID change
* Rename ProtobufBundle to Bundle
* Upgrade to sigstore-go v0.6.1
* `gh attestation verify` handles empty JSONL files (#9541)
* verify 2nd artifact without swapping order (#9532)
* Improve the help message for -F (#9525)
* build(deps): bump actions/attest-build-provenance from 1.4.1 to 1.4.2
(#9518)
* "offline" verification using the bundle of attestations without any
additional handling of the file (#9523)
* Drop surplus trailing space char in flag names in web
* Remove `Internal` from `gh repo create` prompt when owner is not an
org (#9465)
* Fix doc typo for `repo sync`
* Quote repo names consistently in `gh repo sync` stdout (#9491)
* update error message
* rename flag to bundle-from-oci
* fix the trimming of log filenames for `gh run view`
* Check http scheme as well
* Always print URL scheme to stdout
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-316=1
- openSUSE Backports SLE-15-SP5:
zypper in -t patch openSUSE-2024-316=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):
gh-2.57.0-bp156.2.12.1
gh-debuginfo-2.57.0-bp156.2.12.1
- openSUSE Backports SLE-15-SP6 (noarch):
gh-bash-completion-2.57.0-bp156.2.12.1
gh-fish-completion-2.57.0-bp156.2.12.1
gh-zsh-completion-2.57.0-bp156.2.12.1
- openSUSE Backports SLE-15-SP5 (aarch64 i586 ppc64le s390x x86_64):
gh-2.57.0-bp155.2.18.1
- openSUSE Backports SLE-15-SP5 (noarch):
gh-bash-completion-2.57.0-bp155.2.18.1
gh-fish-completion-2.57.0-bp155.2.18.1
gh-zsh-completion-2.57.0-bp155.2.18.1
References:
1
0
openSUSE-RU-2024:0315-1: python3-Django is needed in Backports:SLE-15-SP6 after all (jsc#PED-8919)
by maintenanceďĽ opensuse.org 27 Sep '24
by maintenanceďĽ opensuse.org 27 Sep '24
27 Sep '24
openSUSE Recommended Update: python3-Django is needed in Backports:SLE-15-SP6 after all (jsc#PED-8919)
______________________________________________________________________________
Announcement ID: openSUSE-RU-2024:0315-1
Rating: low
References:
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that has 0 recommended fixes can now be installed.
Description:
python3-Django is needed in Backports:SLE-15-SP6 after all (jsc#PED-8919)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-315=1
Package List:
- openSUSE Backports SLE-15-SP6 (noarch):
python3-Django-2.2.28-bp156.3.1
References:
1
0
openSUSE-SU-2024:0314-1: important: Security update for chromium
by opensuse-securityďĽ opensuse.org 27 Sep '24
by opensuse-securityďĽ opensuse.org 27 Sep '24
27 Sep '24
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2024:0314-1
Rating: important
References: #1230964
Cross-References: CVE-2024-9120 CVE-2024-9121 CVE-2024-9122
CVE-2024-9123
Affected Products:
openSUSE Backports SLE-15-SP6
______________________________________________________________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for chromium fixes the following issues:
Chromium 129.0.6668.70 (stable released 2024-09-24) (boo#1230964)
* CVE-2024-9120: Use after free in Dawn
* CVE-2024-9121: Inappropriate implementation in V8
* CVE-2024-9122: Type Confusion in V8
* CVE-2024-9123: Integer overflow in Skia
- bump BR for nodejs to minimal 20.0
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP6:
zypper in -t patch openSUSE-2024-314=1
Package List:
- openSUSE Backports SLE-15-SP6 (aarch64 x86_64):
chromedriver-129.0.6668.70-bp156.2.32.1
chromium-129.0.6668.70-bp156.2.32.1
References:
https://www.suse.com/security/cve/CVE-2024-9120.html
https://www.suse.com/security/cve/CVE-2024-9121.html
https://www.suse.com/security/cve/CVE-2024-9122.html
https://www.suse.com/security/cve/CVE-2024-9123.html
https://bugzilla.suse.com/1230964
1
0
SUSE-RU-2024:3469-1: moderate: Recommended update for python-kubernetes, python-recommonmark, python-Sphinx, python-sphinxcontrib-applehelp, python-sphinxcontrib-jquery
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Recommended update for python-kubernetes, python-recommonmark, python-Sphinx,
python-sphinxcontrib-applehelp, python-sphinxcontrib-jquery
Announcement ID: SUSE-RU-2024:3469-1
Rating: moderate
References:
* bsc#1223128
* jsc#PED-8481
Affected Products:
* Containers Module 15-SP5
* Containers Module 15-SP6
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP5
* Python 3 Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that contains one feature and has one fix can now be installed.
## Description:
This update for python-kubernetes, python-recommonmark, python-Sphinx, python-
sphinxcontrib-applehelp, python-sphinxcontrib-jquery contains the following
fixes:
Changes for python-kubernetes: \- add sle15_python_module_pythons, jsc#PED-8481
Changes for python-recommonmark:
* Initial shipment for python-recommonmark. Please check changelog for
detailed infromation.
Changes for python-Sphinx:
* Add patch to fix-test-expectation-for-enum-rendering-on-python-3.12.3.
(bsc#1223128)
* Disable test test_ext_imgconverter.
* Add upstream patch to make it work with python 3.11.7
* avoid xdist - not used by upstream and unstable (and not improving the build
time by more than 25%)
* remove setuptools requires
Changes for python-sphinxcontrib-applehelp:
* Add fix tests with python-Shpinx 7.2 jsc#PED-8481
Changes for python-sphinxcontrib-jquery:
* drop tests-with-sphinx-72 patch in order to
* add tests-with-sphinx-72-python312 patch to build with python 312+
* remove tests-with-sphinx-71 patch
* Add tests-with-sphinx-72 patch to fix tests with sphinx 7.2.
* add tests-with-sphinx-71 patch to fix tests with sphinx 7.1+
* Initial release of 4.1
No source changes rebuild to fulfill python-recommonmark dependencies on 15 SP4
for the following packages:
python311-Babel python311-CommonMark python311-Jinja2 python311-MarkupSafe
python311-alabaster python311-imagesize python311-snowballstemmer
python311-sphinx_rtd_theme python311-sphinxcontrib-devhelp
python311-sphinxcontrib-htmlhelp python311-sphinxcontrib-jsmath
python311-sphinxcontrib-qthelp python311-sphinxcontrib-serializinghtml
python311-sphinxcontrib-websupport
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-3469=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3469=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3469=1
* Containers Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-3469=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-3469=1
* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-3469=1
* Python 3 Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-3469=1
* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2024-3469=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3469=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3469=1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3469=1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3469=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3469=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* python311-Jinja2-3.1.2-150400.12.8.1
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* openSUSE Leap 15.4 (noarch)
* python311-kubernetes-26.1.0-150400.10.6.1
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-recommonmark-0.7.1-150400.10.3.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* openSUSE Leap 15.5 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* openSUSE Leap 15.6 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* Containers Module 15-SP5 (noarch)
* python311-kubernetes-26.1.0-150400.10.6.1
* python311-recommonmark-0.7.1-150400.10.3.1
* Containers Module 15-SP6 (noarch)
* python311-kubernetes-26.1.0-150400.10.6.1
* python311-recommonmark-0.7.1-150400.10.3.1
* Public Cloud Module 15-SP4 (noarch)
* python311-kubernetes-26.1.0-150400.10.6.1
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-recommonmark-0.7.1-150400.10.3.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64)
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* Python 3 Module 15-SP5 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* Python 3 Module 15-SP6 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* python311-MarkupSafe-debuginfo-2.1.3-150400.11.5.2
* python-MarkupSafe-debugsource-2.1.3-150400.11.5.2
* python311-MarkupSafe-2.1.3-150400.11.5.2
* python311-Jinja2-3.1.2-150400.12.8.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python311-sphinxcontrib-qthelp-1.0.3-150400.3.5.1
* python311-sphinxcontrib-devhelp-1.0.2-150400.3.5.1
* python311-sphinxcontrib-jsmath-1.0.1-150400.3.5.1
* python311-Babel-2.12.1-150400.8.5.1
* python311-sphinxcontrib-htmlhelp-2.0.1-150400.3.5.1
* python311-CommonMark-0.9.1-150400.9.5.1
* python311-Sphinx-latex-7.2.6-150400.3.10.1
* python311-sphinxcontrib-serializinghtml-1.1.9-150400.3.8.1
* python311-imagesize-1.4.1-150400.12.5.1
* python311-sphinxcontrib-websupport-1.2.4-150400.13.5.1
* python311-sphinxcontrib-applehelp-1.0.4-150400.3.7.1
* python311-snowballstemmer-2.2.0-150400.12.5.1
* python311-sphinx_rtd_theme-1.2.0-150400.12.5.1
* python311-sphinxcontrib-jquery-4.1-150400.9.7.1
* python311-alabaster-0.7.13-150400.12.5.1
* python311-Sphinx-7.2.6-150400.3.10.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1223128
* https://jira.suse.com/browse/PED-8481
1
0
SUSE-SU-2024:3468-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
Announcement ID: SUSE-SU-2024:3468-1
Rating: important
References:
* bsc#1225099
* bsc#1228349
Cross-References:
* CVE-2023-52846
* CVE-2024-40909
CVSS scores:
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_5 fixes several issues.
The following security issues were fixed:
* CVE-2024-40909: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).
* CVE-2023-52846: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3468=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3468=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-2-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-2-150600.2.1
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-2-150600.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-2-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-2-150600.2.1
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-2-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
1
0
SUSE-RU-2024:3466-1: moderate: Recommended update for perl-Bootloader
by OPENSUSE-UPDATES 27 Sep '24
by OPENSUSE-UPDATES 27 Sep '24
27 Sep '24
# Recommended update for perl-Bootloader
Announcement ID: SUSE-RU-2024:3466-1
Rating: moderate
References:
* bsc#1230070
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for perl-Bootloader fixes the following issues:
* Handle missing grub_installdevice on PowerPC (bsc#1230070)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3466=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3466=1 openSUSE-SLE-15.6-2024-3466=1
## Package List:
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* perl-Bootloader-1.8.2-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* perl-Bootloader-1.8.2-150600.3.3.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1230070
1
0
SUSE-RU-2024:3463-1: moderate: Recommended update for certification-sles-eal4
by OPENSUSE-UPDATES 26 Sep '24
by OPENSUSE-UPDATES 26 Sep '24
26 Sep '24
# Recommended update for certification-sles-eal4
Announcement ID: SUSE-RU-2024:3463-1
Rating: moderate
References:
* bsc#1228795
Affected Products:
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that has one fix can now be installed.
## Description:
This update for certification-sles-eal4 fixes the following issues:
* Revert the "remove the rootlogin package" as the openssh dropin
configuration handling was changed before shipment of SP6 (bsc#1228795)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3463=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3463=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* certification-sles-eal4-15.6+git20240925.229b814-150600.14.9.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* certification-sles-eal4-15.6+git20240925.229b814-150600.14.9.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1228795
1
0
# Optional update for glfw
Announcement ID: SUSE-OU-2024:3464-1
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6
An update that can now be installed.
## Description:
This update for glfw ships it againt for SUSE PackageHub 15 SP6.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3464=1 openSUSE-SLE-15.6-2024-3464=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-3464=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libglfw3-debuginfo-3.3.9-150600.3.2.1
* libglfw3-wayland-3.3.9-150600.3.2.1
* libglfw3-wayland-debuginfo-3.3.9-150600.3.2.1
* libglfw-devel-3.3.9-150600.3.2.1
* glfw-wayland-debugsource-3.3.9-150600.3.2.1
* glfw-debugsource-3.3.9-150600.3.2.1
* libglfw3-3.3.9-150600.3.2.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libglfw3-debuginfo-3.3.9-150600.3.2.1
* libglfw3-wayland-3.3.9-150600.3.2.1
* libglfw3-wayland-debuginfo-3.3.9-150600.3.2.1
* libglfw-devel-3.3.9-150600.3.2.1
* glfw-wayland-debugsource-3.3.9-150600.3.2.1
* glfw-debugsource-3.3.9-150600.3.2.1
* libglfw3-3.3.9-150600.3.2.1
1
0