From null at suse.de Tue Jan 2 12:30:02 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0006-1: moderate: Security update for libssh2_org Message-ID: <170419860258.9573.12077802093839853814@smelt2.prg2.suse.org> # Security update for libssh2_org Announcement ID: SUSE-SU-2024:0006-1 Rating: moderate References: * bsc#1218127 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libssh2_org fixes the following issues: * CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (Terrapin Attack) (bsc#1218127). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-6=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-6=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-6=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-6=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-6=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-6=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-6=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-6=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-6=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-6=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-6=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-6=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-6=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-6=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-6=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-6=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-6=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-6=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-6=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-6=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-6=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-6=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-6=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-6=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-6=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-6=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-6=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-6=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap 15.4 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * openSUSE Leap 15.5 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Manager Proxy 4.3 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE CaaS Platform 4.0 (x86_64) * libssh2-1-1.11.0-150000.4.22.1 * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-devel-1.11.0-150000.4.22.1 * libssh2-1-32bit-1.11.0-150000.4.22.1 * libssh2-1-32bit-debuginfo-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libssh2-1-debuginfo-1.11.0-150000.4.22.1 * libssh2-1-1.11.0-150000.4.22.1 * libssh2_org-debugsource-1.11.0-150000.4.22.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218127 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 12:30:07 -0000 Subject: SUSE-SU-2024:0005-1: important: Security update for gstreamer-plugins-bad Message-ID: <170419860719.9573.10543047491566835189@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2024:0005-1 Rating: important References: * bsc#1215792 * bsc#1217213 Cross-References: * CVE-2023-40475 * CVE-2023-44446 CVSS scores: * CVE-2023-40475 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-44446 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Desktop Applications Module 15-SP4 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * CVE-2023-44446: Fixed GStreamer MXF File Parsing Use-After-Free (bsc#1217213). * CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215792). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-5=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-5=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-5=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-5=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-5=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-5=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-5=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-5=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-5=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-5=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-5=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-5=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-5=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * gstreamer-transcoder-devel-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstVulkanXCB-1_0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-transcoder-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstVulkanWayland-1_0-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgsttranscoder-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstVulkan-1_0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * gstreamer-transcoder-debuginfo-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * typelib-1_0-GstTranscoder-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * openSUSE Leap 15.4 (x86_64) * gstreamer-plugins-bad-32bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstplay-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-32bit-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstva-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-32bit-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-32bit-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstva-1_0-0-32bit-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstplay-1_0-0-32bit-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-32bit-debuginfo-1.20.1-150400.3.15.1 * openSUSE Leap 15.4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * openSUSE Leap 15.4 (aarch64_ilp32) * gstreamer-plugins-bad-chromaprint-64bit-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstva-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-64bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstplay-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-64bit-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstva-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstplay-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-64bit-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-64bit-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-64bit-1.20.1-150400.3.15.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * Desktop Applications Module 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * libgsttranscoder-1_0-0-1.20.1-150400.3.15.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.15.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.15.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstisoff-1_0-0-1.20.1-150400.3.15.1 * libgstva-1_0-0-1.20.1-150400.3.15.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.15.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.15.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstvulkan-1_0-0-1.20.1-150400.3.15.1 * libgstcodecs-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1 * libgstmpegts-1_0-0-1.20.1-150400.3.15.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1 * SUSE Manager Proxy 4.3 (x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-1.20.1-150400.3.15.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.15.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.15.1 * libgstphotography-1_0-0-1.20.1-150400.3.15.1 * libgstplay-1_0-0-1.20.1-150400.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40475.html * https://www.suse.com/security/cve/CVE-2023-44446.html * https://bugzilla.suse.com/show_bug.cgi?id=1215792 * https://bugzilla.suse.com/show_bug.cgi?id=1217213 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:11 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 12:30:11 -0000 Subject: SUSE-SU-2024:0004-1: important: Security update for webkit2gtk3 Message-ID: <170419861119.9573.4524526081736181414@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0004-1 Rating: important References: * bsc#1215868 * bsc#1215869 * bsc#1215870 * bsc#1218032 * bsc#1218033 Cross-References: * CVE-2023-32359 * CVE-2023-39928 * CVE-2023-40451 * CVE-2023-41074 * CVE-2023-42883 * CVE-2023-42890 CVSS scores: * CVE-2023-32359 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32359 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39928 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-39928 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42883 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42890 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42890 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP4 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). * CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of- service (bsc#1218032). * CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). * CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1218032, bsc#1215868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-4=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-4=1 * Desktop Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-4=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-4=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-4=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-4=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-4=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-4=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-4=1 openSUSE-SLE-15.4-2024-4=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-4=1 ## Package List: * Basesystem Module 15-SP4 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * Basesystem Module 15-SP5 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP5 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * Development Tools Module 15-SP5 (noarch) * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Manager Proxy 4.3 (x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * webkit2gtk3-minibrowser-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit-jsc-4-2.42.4-150400.4.70.3 * webkit-jsc-6.0-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * webkit-jsc-4.1-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk3-minibrowser-2.42.4-150400.4.70.3 * webkit-jsc-6.0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4.1-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-devel-2.42.4-150400.4.70.3 * typelib-1_0-WebKitWebProcessExtension-6_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-6_0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit-6_0-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (x86_64) * libwebkit2gtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-2.42.4-150400.4.70.3 * openSUSE Leap 15.4 (aarch64_ilp32) * libwebkit2gtk-4_1-0-64bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-64bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-64bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-64bit-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.42.4-150400.4.70.3 * openSUSE Leap 15.5 (noarch) * WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 * WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 * WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-minibrowser-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 * webkit-jsc-4-2.42.4-150400.4.70.3 * webkit-jsc-6.0-debuginfo-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 * webkit2gtk4-minibrowser-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 * webkit-jsc-4.1-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk3-debugsource-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 * webkit-jsc-6.0-2.42.4-150400.4.70.3 * webkit2gtk3-minibrowser-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-2.42.4-150400.4.70.3 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4-debuginfo-2.42.4-150400.4.70.3 * webkit-jsc-4.1-2.42.4-150400.4.70.3 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 * webkit2gtk4-devel-2.42.4-150400.4.70.3 * typelib-1_0-WebKitWebProcessExtension-6_0-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-debugsource-2.42.4-150400.4.70.3 * webkit2gtk3-devel-2.42.4-150400.4.70.3 * webkit2gtk3-soup2-minibrowser-debuginfo-2.42.4-150400.4.70.3 * typelib-1_0-JavaScriptCore-6_0-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 * typelib-1_0-WebKit-6_0-2.42.4-150400.4.70.3 * libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 * webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150400.4.70.3 * webkit2gtk4-debugsource-2.42.4-150400.4.70.3 * openSUSE Leap 15.5 (x86_64) * libwebkit2gtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_1-0-32bit-2.42.4-150400.4.70.3 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.42.4-150400.4.70.3 * libwebkit2gtk-4_0-37-32bit-2.42.4-150400.4.70.3 ## References: * https://www.suse.com/security/cve/CVE-2023-32359.html * https://www.suse.com/security/cve/CVE-2023-39928.html * https://www.suse.com/security/cve/CVE-2023-40451.html * https://www.suse.com/security/cve/CVE-2023-41074.html * https://www.suse.com/security/cve/CVE-2023-42883.html * https://www.suse.com/security/cve/CVE-2023-42890.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215869 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218032 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 12:30:15 -0000 Subject: SUSE-SU-2024:0003-1: important: Security update for webkit2gtk3 Message-ID: <170419861571.9573.8444294980729450465@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0003-1 Rating: important References: * bsc#1215868 * bsc#1215870 * bsc#1218032 * bsc#1218033 Cross-References: * CVE-2023-32359 * CVE-2023-39928 * CVE-2023-41074 * CVE-2023-42883 * CVE-2023-42890 CVSS scores: * CVE-2023-32359 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32359 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39928 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-39928 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42883 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42890 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42890 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). * CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of- service (bsc#1218032). * CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). * CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1215868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-3=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.97.3 * typelib-1_0-WebKit2-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.97.3 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.97.3 * webkit2gtk3-debugsource-2.42.4-150200.97.3 * libjavascriptcoregtk-4_0-18-2.42.4-150200.97.3 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.97.3 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.97.3 * webkit2gtk3-devel-2.42.4-150200.97.3 * libwebkit2gtk-4_0-37-2.42.4-150200.97.3 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.97.3 ## References: * https://www.suse.com/security/cve/CVE-2023-32359.html * https://www.suse.com/security/cve/CVE-2023-39928.html * https://www.suse.com/security/cve/CVE-2023-41074.html * https://www.suse.com/security/cve/CVE-2023-42883.html * https://www.suse.com/security/cve/CVE-2023-42890.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218032 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 12:30:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 12:30:18 -0000 Subject: SUSE-SU-2024:0002-1: important: Security update for webkit2gtk3 Message-ID: <170419861800.9573.7124931725638014825@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0002-1 Rating: important References: * bsc#1215868 * bsc#1215869 * bsc#1215870 * bsc#1218032 * bsc#1218033 Cross-References: * CVE-2023-32359 * CVE-2023-39928 * CVE-2023-40451 * CVE-2023-41074 * CVE-2023-42883 * CVE-2023-42890 CVSS scores: * CVE-2023-32359 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-32359 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39928 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-39928 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40451 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-41074 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42883 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42883 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-42890 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42890 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). * CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of- service (bsc#1218032). * CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). * CVE-2023-39928: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215868). * CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1215868). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-2=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-2=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-2=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 * SUSE CaaS Platform 4.0 (x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2-4_0-2.42.4-150000.3.163.2 * libjavascriptcoregtk-4_0-18-2.42.4-150000.3.163.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150000.3.163.2 * webkit2gtk3-debugsource-2.42.4-150000.3.163.2 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-2.42.4-150000.3.163.2 * libwebkit2gtk-4_0-37-2.42.4-150000.3.163.2 * webkit2gtk3-devel-2.42.4-150000.3.163.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150000.3.163.2 * SUSE CaaS Platform 4.0 (noarch) * libwebkit2gtk3-lang-2.42.4-150000.3.163.2 ## References: * https://www.suse.com/security/cve/CVE-2023-32359.html * https://www.suse.com/security/cve/CVE-2023-39928.html * https://www.suse.com/security/cve/CVE-2023-40451.html * https://www.suse.com/security/cve/CVE-2023-41074.html * https://www.suse.com/security/cve/CVE-2023-42883.html * https://www.suse.com/security/cve/CVE-2023-42890.html * https://bugzilla.suse.com/show_bug.cgi?id=1215868 * https://bugzilla.suse.com/show_bug.cgi?id=1215869 * https://bugzilla.suse.com/show_bug.cgi?id=1215870 * https://bugzilla.suse.com/show_bug.cgi?id=1218032 * https://bugzilla.suse.com/show_bug.cgi?id=1218033 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 16:30:03 -0000 Subject: SUSE-SU-2024:0012-1: important: Security update for postfix Message-ID: <170421300380.30528.11015387758374472702@smelt2.prg2.suse.org> # Security update for postfix Announcement ID: SUSE-SU-2024:0012-1 Rating: important References: * bsc#1218304 * bsc#1218314 Cross-References: * CVE-2023-51764 CVSS scores: * CVE-2023-51764 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP4 * Legacy Module 15-SP4 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * Server Applications Module 15-SP4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for postfix fixes the following issues: * CVE-2023-51764: Fixed SMTP smuggling attack (bsc#1218304). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-12=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-12=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-12=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-12=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-12=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-12=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-12=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-12=1 * Legacy Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2024-12=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2024-12=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-12=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-12=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-12=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-12=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-12=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-12=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-12=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-12=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-12=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Manager Proxy 4.3 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Manager Proxy 4.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Manager Server 4.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Enterprise Storage 7.1 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-postgresql-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * postfix-postgresql-debuginfo-3.5.9-150300.5.15.1 * openSUSE Leap 15.3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-postgresql-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * postfix-postgresql-debuginfo-3.5.9-150300.5.15.1 * openSUSE Leap 15.4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * Basesystem Module 15-SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * Legacy Module 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postfix-doc-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postfix-ldap-debuginfo-3.5.9-150300.5.15.1 * postfix-debugsource-3.5.9-150300.5.15.1 * postfix-mysql-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debugsource-3.5.9-150300.5.15.1 * postfix-ldap-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-debuginfo-3.5.9-150300.5.15.1 * postfix-devel-3.5.9-150300.5.15.1 * postfix-bdb-3.5.9-150300.5.15.1 * postfix-3.5.9-150300.5.15.1 * postfix-mysql-3.5.9-150300.5.15.1 * postfix-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-debuginfo-3.5.9-150300.5.15.1 * postfix-bdb-lmdb-3.5.9-150300.5.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postfix-doc-3.5.9-150300.5.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51764.html * https://bugzilla.suse.com/show_bug.cgi?id=1218304 * https://bugzilla.suse.com/show_bug.cgi?id=1218314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 16:30:12 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 16:30:12 -0000 Subject: SUSE-SU-2024:0010-1: moderate: Security update for polkit Message-ID: <170421301293.30528.13467596478712098715@smelt2.prg2.suse.org> # Security update for polkit Announcement ID: SUSE-SU-2024:0010-1 Rating: moderate References: * bsc#1209282 Affected Products: * Basesystem Module 15-SP4 * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for polkit fixes the following issues: * Change permissions for rules folders (bsc#1209282) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-10=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-10=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-10=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-10=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-10=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-10=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-10=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-10=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-10=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-10=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-10=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * typelib-1_0-Polkit-1_0-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-devel-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * polkit-devel-0.116-150200.3.12.1 * openSUSE Leap 15.4 (x86_64) * libpolkit0-32bit-debuginfo-0.116-150200.3.12.1 * libpolkit0-32bit-0.116-150200.3.12.1 * openSUSE Leap 15.4 (noarch) * polkit-doc-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * typelib-1_0-Polkit-1_0-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-devel-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * polkit-devel-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libpolkit0-0.116-150200.3.12.1 * polkit-debugsource-0.116-150200.3.12.1 * polkit-0.116-150200.3.12.1 * libpolkit0-debuginfo-0.116-150200.3.12.1 * polkit-debuginfo-0.116-150200.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 2 20:33:56 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 02 Jan 2024 20:33:56 -0000 Subject: SUSE-SU-2024:0014-1: moderate: Security update for w3m Message-ID: <170422763628.19586.1419450232160999963@smelt2.prg2.suse.org> # Security update for w3m Announcement ID: SUSE-SU-2024:0014-1 Rating: moderate References: * bsc#1218226 Cross-References: * CVE-2023-4255 CVSS scores: * CVE-2023-4255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for w3m fixes the following issues: * CVE-2023-4255: Fixed out-of-bounds write in function checkType() in etc.c (bsc#1218226). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-14=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-14=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-14=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * w3m-debuginfo-0.5.3.git20161120-161.9.1 * w3m-0.5.3.git20161120-161.9.1 * w3m-debugsource-0.5.3.git20161120-161.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * w3m-debuginfo-0.5.3.git20161120-161.9.1 * w3m-0.5.3.git20161120-161.9.1 * w3m-debugsource-0.5.3.git20161120-161.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * w3m-debuginfo-0.5.3.git20161120-161.9.1 * w3m-0.5.3.git20161120-161.9.1 * w3m-debugsource-0.5.3.git20161120-161.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4255.html * https://bugzilla.suse.com/show_bug.cgi?id=1218226 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 4 12:30:04 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 04 Jan 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0030-1: moderate: Security update for libcryptopp Message-ID: <170437140404.6535.12500518115646370801@smelt2.prg2.suse.org> # Security update for libcryptopp Announcement ID: SUSE-SU-2024:0030-1 Rating: moderate References: * bsc#1218219 Cross-References: * CVE-2023-50980 CVSS scores: * CVE-2023-50980 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-50980 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libcryptopp fixes the following issues: * CVE-2023-50980: Fixed DoS via malformed DER public key file (bsc#1218219). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-30=1 openSUSE-SLE-15.4-2024-30=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-30=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-30=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-30=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.3.1 * libcryptopp8_6_0-32bit-8.6.0-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libcryptopp8_6_0-64bit-8.6.0-150400.3.3.1 * libcryptopp8_6_0-64bit-debuginfo-8.6.0-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.3.1 * libcryptopp8_6_0-32bit-8.6.0-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libcryptopp-devel-8.6.0-150400.3.3.1 * libcryptopp8_6_0-8.6.0-150400.3.3.1 * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.3.1 * libcryptopp-debugsource-8.6.0-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50980.html * https://bugzilla.suse.com/show_bug.cgi?id=1218219 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 12:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 05 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0035-1: important: Security update for python-paramiko Message-ID: <170445780357.8875.17583491095732568434@smelt2.prg2.suse.org> # Security update for python-paramiko Announcement ID: SUSE-SU-2024:0035-1 Rating: important References: * bsc#1218168 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-paramiko fixes the following issues: * CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity aka Terrapin Attack (bsc#bsc#1218168). * Update to 3.4.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-35=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-35=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-35=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-35=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-35=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-35=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-35=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-35=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * openSUSE Leap 15.5 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * Python 3 Module 15-SP5 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python311-paramiko-3.4.0-150400.13.6.1 * python-paramiko-doc-3.4.0-150400.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218168 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 12:30:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 05 Jan 2024 12:30:05 -0000 Subject: SUSE-SU-2024:0034-1: moderate: Security update for python-aiohttp Message-ID: <170445780564.8875.11882875312984493071@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:0034-1 Rating: moderate References: * bsc#1217684 Cross-References: * CVE-2023-49081 CVSS scores: * CVE-2023-49081 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-49081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2023-49081: fixed an HTTP header injection via a crafted version (bsc#1217684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-34=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-34=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-34=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-34=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-34=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-34=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-doc-3.6.0-150100.3.15.1 * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * python-aiohttp-doc-3.6.0-150100.3.15.1 * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python-aiohttp-doc-3.6.0-150100.3.15.1 * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.6.0-150100.3.15.1 * python3-aiohttp-debuginfo-3.6.0-150100.3.15.1 * python3-aiohttp-3.6.0-150100.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49081.html * https://bugzilla.suse.com/show_bug.cgi?id=1217684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 12:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 05 Jan 2024 12:30:07 -0000 Subject: SUSE-SU-2024:0033-1: moderate: Security update for python-aiohttp Message-ID: <170445780767.8875.12203436040123318513@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:0033-1 Rating: moderate References: * bsc#1217684 Cross-References: * CVE-2023-49081 CVSS scores: * CVE-2023-49081 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-49081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: * CVE-2023-49081: fixed an HTTP header injection via a crafted version (bsc#1217684). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-33=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-33=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-33=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-3.8.5-150400.10.8.1 * python311-aiohttp-debuginfo-3.8.5-150400.10.8.1 * python-aiohttp-debugsource-3.8.5-150400.10.8.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-3.8.5-150400.10.8.1 * python311-aiohttp-debuginfo-3.8.5-150400.10.8.1 * python-aiohttp-debugsource-3.8.5-150400.10.8.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-aiohttp-3.8.5-150400.10.8.1 * python311-aiohttp-debuginfo-3.8.5-150400.10.8.1 * python-aiohttp-debugsource-3.8.5-150400.10.8.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49081.html * https://bugzilla.suse.com/show_bug.cgi?id=1217684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 5 16:30:14 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 05 Jan 2024 16:30:14 -0000 Subject: SUSE-SU-2024:0037-1: low: Security update for libxkbcommon Message-ID: <170447221466.27142.589438336197410310@smelt2.prg2.suse.org> # Security update for libxkbcommon Announcement ID: SUSE-SU-2024:0037-1 Rating: low References: * bsc#1105832 Cross-References: * CVE-2018-15853 * CVE-2018-15854 * CVE-2018-15855 * CVE-2018-15856 * CVE-2018-15857 * CVE-2018-15858 * CVE-2018-15859 * CVE-2018-15861 * CVE-2018-15862 * CVE-2018-15863 * CVE-2018-15864 CVSS scores: * CVE-2018-15853 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15853 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15854 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15854 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15855 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15855 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15856 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15856 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15857 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15857 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2018-15858 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15858 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15859 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15859 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15861 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15861 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15862 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15862 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15863 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15863 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-15864 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-15864 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for libxkbcommon fixes the following issues: Fixed multiple memory handling and correctness issues (bsc#1105832): * CVE-2018-15859 * CVE-2018-15856 * CVE-2018-15858 * CVE-2018-15864 * CVE-2018-15863 * CVE-2018-15862 * CVE-2018-15861 * CVE-2018-15855 * CVE-2018-15854 * CVE-2018-15857 * CVE-2018-15853 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-37=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-37=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-37=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-37=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libxkbcommon-x11-devel-0.6.1-9.3.1 * libxkbcommon-devel-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libxkbcommon0-0.6.1-9.3.1 * libxkbcommon-x11-0-0.6.1-9.3.1 * libxkbcommon0-debuginfo-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-0.6.1-9.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libxkbcommon0-32bit-0.6.1-9.3.1 * libxkbcommon0-debuginfo-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-32bit-0.6.1-9.3.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libxkbcommon0-0.6.1-9.3.1 * libxkbcommon-x11-0-0.6.1-9.3.1 * libxkbcommon0-debuginfo-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-0.6.1-9.3.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libxkbcommon0-debuginfo-32bit-0.6.1-9.3.1 * libxkbcommon0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-32bit-0.6.1-9.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libxkbcommon0-0.6.1-9.3.1 * libxkbcommon-x11-0-0.6.1-9.3.1 * libxkbcommon0-debuginfo-0.6.1-9.3.1 * libxkbcommon-debugsource-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-0.6.1-9.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libxkbcommon0-32bit-0.6.1-9.3.1 * libxkbcommon0-debuginfo-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-32bit-0.6.1-9.3.1 * libxkbcommon-x11-0-debuginfo-32bit-0.6.1-9.3.1 ## References: * https://www.suse.com/security/cve/CVE-2018-15853.html * https://www.suse.com/security/cve/CVE-2018-15854.html * https://www.suse.com/security/cve/CVE-2018-15855.html * https://www.suse.com/security/cve/CVE-2018-15856.html * https://www.suse.com/security/cve/CVE-2018-15857.html * https://www.suse.com/security/cve/CVE-2018-15858.html * https://www.suse.com/security/cve/CVE-2018-15859.html * https://www.suse.com/security/cve/CVE-2018-15861.html * https://www.suse.com/security/cve/CVE-2018-15862.html * https://www.suse.com/security/cve/CVE-2018-15863.html * https://www.suse.com/security/cve/CVE-2018-15864.html * https://bugzilla.suse.com/show_bug.cgi?id=1105832 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:30:01 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 16:30:01 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170473140191.20776.12552636647563643882@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:33:04 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 16:33:04 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170473158498.20776.4853504607894062744@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 16:36:06 -0000 Subject: SUSE-SU-2024:0063-1: important: Security update for qt6-base Message-ID: <170473176680.21472.12493123252907832957@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2024:0063-1 Rating: important References: * bsc#1218413 * jsc#PED-6193 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-63=1 openSUSE-SLE-15.5-2024-63=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-63=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-63=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-6.4.2-150500.3.14.1 * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-mysql-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * qt6-sql-postgresql-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * qt6-sql-postgresql-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-private-devel-6.4.2-150500.3.14.1 * qt6-base-examples-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-sql-mysql-debuginfo-6.4.2-150500.3.14.1 * qt6-network-private-devel-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * qt6-networkinformation-nm-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * qt6-xml-private-devel-6.4.2-150500.3.14.1 * qt6-base-docs-qch-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.14.1 * qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-examples-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * qt6-dbus-private-devel-6.4.2-150500.3.14.1 * qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 * qt6-test-private-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-cups-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-printsupport-private-devel-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * qt6-base-docs-html-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * openSUSE Leap 15.5 (noarch) * qt6-docs-common-6.4.2-150500.3.14.1 * qt6-base-private-devel-6.4.2-150500.3.14.1 * qt6-base-devel-6.4.2-150500.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 * qt6-gui-devel-6.4.2-150500.3.14.1 * qt6-openglwidgets-devel-6.4.2-150500.3.14.1 * qt6-dbus-devel-6.4.2-150500.3.14.1 * qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 * qt6-sql-sqlite-6.4.2-150500.3.14.1 * libQt6Network6-6.4.2-150500.3.14.1 * libQt6Concurrent6-6.4.2-150500.3.14.1 * libQt6Sql6-6.4.2-150500.3.14.1 * qt6-sql-devel-6.4.2-150500.3.14.1 * libQt6PrintSupport6-debuginfo-6.4.2-150500.3.14.1 * libQt6Sql6-debuginfo-6.4.2-150500.3.14.1 * qt6-base-debuginfo-6.4.2-150500.3.14.1 * libQt6Xml6-6.4.2-150500.3.14.1 * qt6-core-private-devel-6.4.2-150500.3.14.1 * qt6-printsupport-devel-6.4.2-150500.3.14.1 * libQt6Core6-6.4.2-150500.3.14.1 * libQt6OpenGL6-6.4.2-150500.3.14.1 * qt6-network-devel-6.4.2-150500.3.14.1 * qt6-network-tls-6.4.2-150500.3.14.1 * qt6-sql-sqlite-debuginfo-6.4.2-150500.3.14.1 * qt6-test-devel-6.4.2-150500.3.14.1 * qt6-xml-devel-6.4.2-150500.3.14.1 * libQt6Xml6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGL6-debuginfo-6.4.2-150500.3.14.1 * libQt6Concurrent6-debuginfo-6.4.2-150500.3.14.1 * libQt6Gui6-6.4.2-150500.3.14.1 * libQt6Widgets6-6.4.2-150500.3.14.1 * qt6-base-debugsource-6.4.2-150500.3.14.1 * libQt6Test6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 * qt6-concurrent-devel-6.4.2-150500.3.14.1 * qt6-network-tls-debuginfo-6.4.2-150500.3.14.1 * qt6-base-common-devel-6.4.2-150500.3.14.1 * qt6-gui-private-devel-6.4.2-150500.3.14.1 * libQt6Test6-6.4.2-150500.3.14.1 * qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 * qt6-widgets-devel-6.4.2-150500.3.14.1 * libQt6Core6-debuginfo-6.4.2-150500.3.14.1 * libQt6DBus6-6.4.2-150500.3.14.1 * libQt6PrintSupport6-6.4.2-150500.3.14.1 * libQt6Widgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-widgets-private-devel-6.4.2-150500.3.14.1 * libQt6DBus6-debuginfo-6.4.2-150500.3.14.1 * libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.14.1 * qt6-opengl-devel-6.4.2-150500.3.14.1 * libQt6Gui6-debuginfo-6.4.2-150500.3.14.1 * qt6-core-devel-6.4.2-150500.3.14.1 * qt6-opengl-private-devel-6.4.2-150500.3.14.1 * qt6-base-common-devel-debuginfo-6.4.2-150500.3.14.1 * libQt6Network6-debuginfo-6.4.2-150500.3.14.1 * SUSE Package Hub 15 15-SP5 (noarch) * qt6-base-devel-6.4.2-150500.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 * https://jira.suse.com/browse/PED-6193 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:36:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 16:36:18 -0000 Subject: SUSE-SU-2024:0058-1: important: Security update for wireshark Message-ID: <170473177880.21472.2631626247410196883@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:0058-1 Rating: important References: * bsc#1218504 * bsc#1218505 Cross-References: * CVE-2024-0208 * CVE-2024-0209 CVSS scores: * CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Updated to Wireshark 3.6.20: * CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504). * CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-58=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-58=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-58=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Proxy 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE CaaS Platform 4.0 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0208.html * https://www.suse.com/security/cve/CVE-2024-0209.html * https://bugzilla.suse.com/show_bug.cgi?id=1218504 * https://bugzilla.suse.com/show_bug.cgi?id=1218505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 16:39:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 16:39:22 -0000 Subject: SUSE-SU-2024:0058-1: important: Security update for wireshark Message-ID: <170473196297.21472.653019048961477470@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:0058-1 Rating: important References: * bsc#1218504 * bsc#1218505 Cross-References: * CVE-2024-0208 * CVE-2024-0209 CVSS scores: * CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Updated to Wireshark 3.6.20: * CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504). * CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-58=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-58=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-58=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Proxy 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * SUSE CaaS Platform 4.0 (x86_64) * libwiretap12-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwireshark15-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0208.html * https://www.suse.com/security/cve/CVE-2024-0209.html * https://bugzilla.suse.com/show_bug.cgi?id=1218504 * https://bugzilla.suse.com/show_bug.cgi?id=1218505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0058-1: important: Security update for wireshark Message-ID: <170474580344.7941.9960666965206223485@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2024:0058-1 Rating: important References: * bsc#1218504 * bsc#1218505 Cross-References: * CVE-2024-0208 * CVE-2024-0209 CVSS scores: * CVE-2024-0208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * Updated to Wireshark 3.6.20: * CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504). * CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-58=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-58=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-58=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-58=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-58=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-58=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-58=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-58=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-58=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-58=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-58=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Manager Proxy 4.3 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 * SUSE CaaS Platform 4.0 (x86_64) * libwireshark15-3.6.20-150000.3.109.1 * libwiretap12-3.6.20-150000.3.109.1 * wireshark-debugsource-3.6.20-150000.3.109.1 * wireshark-debuginfo-3.6.20-150000.3.109.1 * libwireshark15-debuginfo-3.6.20-150000.3.109.1 * libwiretap12-debuginfo-3.6.20-150000.3.109.1 * wireshark-3.6.20-150000.3.109.1 * libwsutil13-debuginfo-3.6.20-150000.3.109.1 * wireshark-ui-qt-debuginfo-3.6.20-150000.3.109.1 * wireshark-devel-3.6.20-150000.3.109.1 * wireshark-ui-qt-3.6.20-150000.3.109.1 * libwsutil13-3.6.20-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0208.html * https://www.suse.com/security/cve/CVE-2024-0209.html * https://bugzilla.suse.com/show_bug.cgi?id=1218504 * https://bugzilla.suse.com/show_bug.cgi?id=1218505 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 20:30:07 -0000 Subject: SUSE-SU-2024:0057-1: important: Security update for eclipse-jgit, jsch Message-ID: <170474580702.7941.14446565972694203580@smelt2.prg2.suse.org> # Security update for eclipse-jgit, jsch Announcement ID: SUSE-SU-2024:0057-1 Rating: important References: * bsc#1209646 * bsc#1211955 * bsc#1215298 * jsc#PED-6376 * jsc#PED-6377 Cross-References: * CVE-2023-4759 CVSS scores: * CVE-2023-4759 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-4759 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability, contains two features and has two security fixes can now be installed. ## Description: This update for eclipse-jgit, jsch fixes the following issues: Security fix: \- CVE-2023-4759: Fixed an arbitrary file overwrite which might have occurred with a specially crafted git repository and a case-insensitive filesystem. (bsc#1215298) Other fixes: jsch was updated to version 0.2.9: \- Added support for various algorithms \- Migrated from `com.jcraft:jsch` to `com.github.mwiede:jsch` fork (bsc#1211955): * Alias to the old artifact since the new one is drop-in replacement * Keep the old OSGi bundle symbolic name to avoid extensive patching of eclipse stack \- Updated to version 0.2.9: * For the full list of changes please consult the upstream changelogs below for each version updated: \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.9 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.8 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.7 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.6 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.5 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.4 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.3 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.2 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.1 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.2.0 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.71 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.70 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.69 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.68 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.67 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.66 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.65 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.64 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.63 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.62 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.61 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.60 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.59 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.58 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.57 \+ https://github.com/mwiede/jsch/releases/tag/jsch-0.1.56 eclipse-jgit: * Craft the jgit script from the real Main class of the jar file instead of using a jar launcher (bsc#1209646) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-57=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-57=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2024-57=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-57=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-57=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-57=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-57=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-57=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-57=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-57=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-57=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-57=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-57=1 ## Package List: * openSUSE Leap 15.4 (noarch) * jsch-demo-0.2.9-150200.11.10.1 * jsch-javadoc-0.2.9-150200.11.10.1 * jgit-javadoc-5.11.0-150200.3.15.2 * eclipse-jgit-5.11.0-150200.3.15.2 * jgit-5.11.0-150200.3.15.2 * jsch-0.2.9-150200.11.10.1 * openSUSE Leap 15.5 (noarch) * eclipse-jgit-5.11.0-150200.3.15.2 * jsch-demo-0.2.9-150200.11.10.1 * jsch-javadoc-0.2.9-150200.11.10.1 * jsch-0.2.9-150200.11.10.1 * Development Tools Module 15-SP4 (noarch) * jsch-0.2.9-150200.11.10.1 * Development Tools Module 15-SP5 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * jsch-0.2.9-150200.11.10.1 * SUSE Enterprise Storage 7.1 (noarch) * jsch-0.2.9-150200.11.10.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4759.html * https://bugzilla.suse.com/show_bug.cgi?id=1209646 * https://bugzilla.suse.com/show_bug.cgi?id=1211955 * https://bugzilla.suse.com/show_bug.cgi?id=1215298 * https://jira.suse.com/browse/PED-6376 * https://jira.suse.com/browse/PED-6377 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:09 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 20:30:09 -0000 Subject: SUSE-SU-2024:0056-1: low: Security update for helm3 Message-ID: <170474580906.7941.6920758909243246391@smelt2.prg2.suse.org> # Security update for helm3 Announcement ID: SUSE-SU-2024:0056-1 Rating: low References: * bsc#1206471 Cross-References: * CVE-2022-23526 CVSS scores: * CVE-2022-23526 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-23526 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise Server 15 SP1 An update that solves one vulnerability can now be installed. ## Description: This update for helm3 fixes the following issues: * CVE-2022-23526: Fixed Denial of service through schema file (bsc#1206471). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE CaaS Platform 4.0 (x86_64) * helm3-3.3.3-150100.1.15.1 ## References: * https://www.suse.com/security/cve/CVE-2022-23526.html * https://bugzilla.suse.com/show_bug.cgi?id=1206471 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:27 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 20:30:27 -0000 Subject: SUSE-SU-2024:0045-1: important: Security update for gcc13 Message-ID: <170474582788.7941.18404854219691508347@smelt2.prg2.suse.org> # Security update for gcc13 Announcement ID: SUSE-SU-2024:0045-1 Rating: important References: * bsc#1206480 * bsc#1206684 * bsc#1210557 * bsc#1211427 * bsc#1212101 * bsc#1213915 * bsc#1214052 * bsc#1214460 * bsc#1215427 * bsc#1216664 * jsc#PED-153 * jsc#PED-2005 * jsc#PED-252 * jsc#PED-253 * jsc#PED-6584 Cross-References: * CVE-2023-4039 CVSS scores: * CVE-2023-4039 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4039 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability, contains five features and has nine security fixes can now be installed. ## Description: This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the "Development Tools" module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: * install "gcc13" or "gcc13-c++" or one of the other "gcc13-COMPILER" frontend packages. * override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) * Work around third party app crash during C++ standard library initialization. [bsc#1216664] * Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427) * Bump included newlib to version 4.3.0. * Update to GCC trunk head (r13-5254-g05b9868b182bb9) * Redo floatn fixinclude pick-up to simply keep what is there. * Turn cross compiler to s390x to a glibc cross. [bsc#1214460] * Also handle -static-pie in the default-PIE specs * Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] * Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] * Add new x86-related intrinsics (amxcomplexintrin.h). * RISC-V: Add support for inlining subword atomic operations * Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. * Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. * Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. * Bump included newlib to version 4.3.0. * Also package libhwasan_preinit.o on aarch64. * Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. * Package libhwasan_preinit.o on x86_64. * Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] * Enable PRU flavour for gcc13 * update floatn fixinclude pickup to check each header separately (bsc#1206480) * Redo floatn fixinclude pick-up to simply keep what is there. * Bump libgo SONAME to libgo22. * Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. * Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. * Depend on at least LLVM 13 for GCN cross compiler. * Update embedded newlib to version 4.2.0 * Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-45=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4039.html * https://bugzilla.suse.com/show_bug.cgi?id=1206480 * https://bugzilla.suse.com/show_bug.cgi?id=1206684 * https://bugzilla.suse.com/show_bug.cgi?id=1210557 * https://bugzilla.suse.com/show_bug.cgi?id=1211427 * https://bugzilla.suse.com/show_bug.cgi?id=1212101 * https://bugzilla.suse.com/show_bug.cgi?id=1213915 * https://bugzilla.suse.com/show_bug.cgi?id=1214052 * https://bugzilla.suse.com/show_bug.cgi?id=1214460 * https://bugzilla.suse.com/show_bug.cgi?id=1215427 * https://bugzilla.suse.com/show_bug.cgi?id=1216664 * https://jira.suse.com/browse/PED-153 * https://jira.suse.com/browse/PED-2005 * https://jira.suse.com/browse/PED-252 * https://jira.suse.com/browse/PED-253 * https://jira.suse.com/browse/PED-6584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 8 20:30:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 08 Jan 2024 20:30:29 -0000 Subject: SUSE-SU-2024:0044-1: important: Security update for MozillaThunderbird Message-ID: <170474582960.7941.1020594309432104546@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:0044-1 Rating: important References: * bsc#1217974 Cross-References: * CVE-2023-50761 * CVE-2023-50762 * CVE-2023-6856 * CVE-2023-6857 * CVE-2023-6858 * CVE-2023-6859 * CVE-2023-6860 * CVE-2023-6861 * CVE-2023-6862 * CVE-2023-6863 * CVE-2023-6864 CVSS scores: * CVE-2023-50761 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2023-50762 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2023-6856 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6857 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2023-6858 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6859 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6860 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2023-6861 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6862 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6863 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6864 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Firefox Extended Support Release 115.6.0 ESR (bsc#1217974): * CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (bmo#1843782). * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023). * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791). * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144). * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669). * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118). * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042). * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901). * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. * CVE-2023-50762: Truncated signed text was shown with a valid OpenPGP signature (bmo#1862625). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-44=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-44=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-44=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-44=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-debuginfo-115.6.0-150200.8.142.2 * MozillaThunderbird-debugsource-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 * MozillaThunderbird-115.6.0-150200.8.142.2 * MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 ## References: * https://www.suse.com/security/cve/CVE-2023-50761.html * https://www.suse.com/security/cve/CVE-2023-50762.html * https://www.suse.com/security/cve/CVE-2023-6856.html * https://www.suse.com/security/cve/CVE-2023-6857.html * https://www.suse.com/security/cve/CVE-2023-6858.html * https://www.suse.com/security/cve/CVE-2023-6859.html * https://www.suse.com/security/cve/CVE-2023-6860.html * https://www.suse.com/security/cve/CVE-2023-6861.html * https://www.suse.com/security/cve/CVE-2023-6862.html * https://www.suse.com/security/cve/CVE-2023-6863.html * https://www.suse.com/security/cve/CVE-2023-6864.html * https://bugzilla.suse.com/show_bug.cgi?id=1217974 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Wed Jan 10 08:03:19 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:03:19 +0100 (CET) Subject: SUSE-CU-2024:78-1: Security update of suse/sle-micro/5.3/toolbox Message-ID: <20240110080319.D20AFFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:78-1 Container Tags : suse/sle-micro/5.3/toolbox:12.1 , suse/sle-micro/5.3/toolbox:12.1-5.2.288 , suse/sle-micro/5.3/toolbox:latest Container Release : 5.2.288 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:04:35 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:04:35 +0100 (CET) Subject: SUSE-CU-2024:80-1: Security update of suse/sle-micro/5.4/toolbox Message-ID: <20240110080435.5E044FD1F@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:80-1 Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-4.2.186 , suse/sle-micro/5.4/toolbox:latest Container Release : 4.2.186 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:05:48 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:05:48 +0100 (CET) Subject: SUSE-CU-2024:84-1: Security update of suse/389-ds Message-ID: <20240110080548.B22E5FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:84-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-17.7 , suse/389-ds:latest Container Release : 17.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:06:06 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:06 +0100 (CET) Subject: SUSE-CU-2024:86-1: Security update of bci/dotnet-aspnet Message-ID: <20240110080606.78DDFFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:86-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-19.1 , bci/dotnet-aspnet:6.0.25 , bci/dotnet-aspnet:6.0.25-19.1 Container Release : 19.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:06:24 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:06:24 +0100 (CET) Subject: SUSE-CU-2024:88-1: Security update of bci/dotnet-aspnet Message-ID: <20240110080624.5EAE1FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:88-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-19.1 , bci/dotnet-aspnet:7.0.14 , bci/dotnet-aspnet:7.0.14-19.1 , bci/dotnet-aspnet:latest Container Release : 19.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:07:00 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:00 +0100 (CET) Subject: SUSE-CU-2024:92-1: Security update of bci/dotnet-sdk Message-ID: <20240110080700.DA529FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:92-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-18.1 , bci/dotnet-sdk:6.0.25 , bci/dotnet-sdk:6.0.25-18.1 Container Release : 18.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:07:23 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:23 +0100 (CET) Subject: SUSE-CU-2024:94-1: Security update of bci/dotnet-sdk Message-ID: <20240110080723.60848FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:94-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-20.1 , bci/dotnet-sdk:7.0.14 , bci/dotnet-sdk:7.0.14-20.1 , bci/dotnet-sdk:latest Container Release : 20.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:07:41 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:07:41 +0100 (CET) Subject: SUSE-CU-2024:96-1: Security update of bci/dotnet-runtime Message-ID: <20240110080741.E0FC9FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:96-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-18.1 , bci/dotnet-runtime:6.0.25 , bci/dotnet-runtime:6.0.25-18.1 Container Release : 18.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 08:08:00 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 09:08:00 +0100 (CET) Subject: SUSE-CU-2024:98-1: Security update of bci/dotnet-runtime Message-ID: <20240110080800.ACCE3FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:98-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-20.1 , bci/dotnet-runtime:7.0.14 , bci/dotnet-runtime:7.0.14-20.1 , bci/dotnet-runtime:latest Container Release : 20.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From null at suse.de Wed Jan 10 08:36:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 08:36:06 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170487576649.2330.9245886664089989323@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 08:39:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 08:39:07 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170487594791.2318.983511515935262827@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:04 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0076-1: moderate: Security update for hawk2 Message-ID: <170488980424.13849.13106302971141353802@smelt2.prg2.suse.org> # Security update for hawk2 Announcement ID: SUSE-SU-2024:0076-1 Rating: moderate References: * bsc#1206217 * bsc#1207930 * bsc#1208533 * bsc#1213454 * bsc#1215438 * bsc#1215976 * bsc#1216508 * bsc#1216571 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP1 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has eight security fixes can now be installed. ## Description: This update for hawk2 fixes the following issues: * Fixed HttpOnly secure flag by default (bsc#1216508). * Fixed CSRF in errors_controller.rb protection (bsc#1216571). Update to version 2.6.4+git.1702030539.5fb7d91b: * Fix mime type issue in MS windows (bsc#1215438) * Parametrize CORS Access-Control-Allow-Origin header (bsc#1213454) * Tests: upgrate tests for ruby3.2 (tumbleweed) (bsc#1215976) * Upgrade for ruby3.2 (tumbleweed) (bsc#1215976) * Forbid special symbols in the category (bsc#1206217) * Fix the sass-rails version on ~5.0 (bsc#1208533) * Don't delete the private key if the public key is missing (bsc#1207930) * make-sle155-compatible.patch . No bsc, it's for backwards compatibility. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-76=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP1 zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-76=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-76=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debugsource-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 * hawk2-debuginfo-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206217 * https://bugzilla.suse.com/show_bug.cgi?id=1207930 * https://bugzilla.suse.com/show_bug.cgi?id=1208533 * https://bugzilla.suse.com/show_bug.cgi?id=1213454 * https://bugzilla.suse.com/show_bug.cgi?id=1215438 * https://bugzilla.suse.com/show_bug.cgi?id=1215976 * https://bugzilla.suse.com/show_bug.cgi?id=1216508 * https://bugzilla.suse.com/show_bug.cgi?id=1216571 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 12:30:08 -0000 Subject: SUSE-SU-2024:0075-1: important: Security update for LibreOffice Message-ID: <170488980879.13849.3001308551733447591@smelt2.prg2.suse.org> # Security update for LibreOffice Announcement ID: SUSE-SU-2024:0075-1 Rating: important References: * bsc#1198666 * bsc#1200085 * bsc#1204040 * bsc#1209242 * bsc#1210687 * bsc#1211746 * jsc#PED-1785 * jsc#PED-3550 * jsc#PED-3561 Cross-References: * CVE-2023-0950 * CVE-2023-2255 CVSS scores: * CVE-2023-0950 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H * CVE-2023-0950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-2255 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2023-2255 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 * SUSE OpenStack Cloud 9 * SUSE OpenStack Cloud Crowbar 9 An update that solves two vulnerabilities, contains three features and has four security fixes can now be installed. ## Description: This update for LibreOffice fixes the following issues: libreoffice: * Version update from 7.3.6.2 to 7.5.4.1 (jsc#PED-3561, jsc#PED-3550, jsc#PED-1785): * For the highlights of changes of version 7.5 please consult the official release notes: https://wiki.documentfoundation.org/ReleaseNotes/7.5 * For the highlights of changes of version 7.4 please consult the official release notes: https://wiki.documentfoundation.org/ReleaseNotes/7.4 * Security issues fixed: * CVE-2023-0950: Fixed stack underflow in ScInterpreter (bsc#1209242) * CVE-2023-2255: Fixed vulnerability where remote documents could be loaded without prompt via IFrame (bsc#1211746) * Bug fixes: * Fix PPTX shadow effect for table offset (bsc#1204040) * Fix ability to set the default tab size for each text object (bsc#1198666) * Fix PPTX extra vertical space between different text formats (bsc#1200085) * Do not use binutils-gold as the package is unmaintainedd and will be removed in the future (bsc#1210687) * Updated bundled dependencies: * boost version update from 1_77_0 to 1_80_0 * curl version update from 7.83.1 to 8.0.1 * icu4c-data version update from 70_1 to 72_1 * icu4c version update from 70_1 to 72_1 * pdfium version update from 4699 to 5408 * poppler version update from 21.11.0 to 22.12.0 * poppler-data version update from 0.4.10 to 0.4.11 * skia version from m97-a7230803d64ae9d44f4e128244480111a3ae967 to m103-b301ff025004c9cd82816c86c547588e6c24b466 * New build dependencies: * fixmath-devel * libwebp-devel * zlib-devel * dragonbox-devel * at-spi2-core-devel * libtiff-devel dragonbox: * New package at version 1.1.3 (jsc#PED-1785) * New dependency for LibreOffice 7.4 fixmath: * New package at version 2022.07.20 (jsc#PED-1785) * New dependency for LibreOffice 7.4 libmwaw: * Version update from 0.3.20 to 0.3.21 (jsc#PED-1785): * Add debug code to read some private rsrc data * Allow to read some MacWrite which does not have printer informations * Add a parser for Scoop files * Add a parser for ScriptWriter files * Add a parser for ReadySetGo 1-4 files xmlsec1: * Version update from 1.2.28 to 1.2.37 required by LibreOffice 7.5.2.2 (jsc#PED-3561, jsc#PED-3550): * Retired the XMLSec mailing list "xmlsec at aleksey.com" and the XMLSec Online Signature Verifier. * Migration to OpenSSL 3.0 API Note that OpenSSL engines are disabled by default when XMLSec library is compiled against OpenSSL 3.0. To re-enable OpenSSL engines, use `--enable-openssl3-engines` configure flag (there will be a lot of deprecation warnings). * The OpenSSL before 1.1.0 and LibreSSL before 2.7.0 are now deprecated and will be removed in the future versions of XMLSec Library. * Refactored all the integer casts to ensure cast-safety. Fixed all warnings and enabled `-Werror` and `-pedantic` flags on CI builds. * Added configure flag to use size_t for xmlSecSize (currently disabled by default for backward compatibility). * Support for OpenSSL compiled with OPENSSL_NO_ERR. * Full support for LibreSSL 3.5.0 and above * Several other small fixes * Fix decrypting session key for two recipients * Added `--privkey-openssl-engine` option to enhance openssl engine support * Remove MD5 for NSS 3.59 and above * Fix PKCS12_parse return code handling * Fix OpenSSL lookup * xmlSecX509DataGetNodeContent(): don't return 0 for non-empty elements - fix for LibreOffice * Unload error strings in OpenSSL shutdown. * Make userData available when executing preExecCallback function * Add an option to use secure memset. * Enabled XML_PARSE_HUGE for all xml parsers. * Various build and tests fixes and improvements. * Move remaining private header files away from xmlsec/include/`` folder * Other packaging changes: * Relax the crypto policies for the test-suite. It allows the tests using certificates with small key lengths to pass. * Pass `--disable-md5` to configure: The cryptographic strength of the MD5 algorithm is sufficiently doubtful that its use is discouraged at this time. It is not listed as an algorithm in [XMLDSIG-CORE1] https://www.w3.org/TR/xmlsec-algorithms/#bib-XMLDSIG-CORE1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE OpenStack Cloud 9 zypper in -t patch SUSE-OpenStack-Cloud-9-2024-75=1 * SUSE OpenStack Cloud Crowbar 9 zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2024-75=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-75=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-75=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-75=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-75=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-75=1 ## Package List: * SUSE OpenStack Cloud 9 (x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE OpenStack Cloud 9 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE OpenStack Cloud Crowbar 9 (x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE OpenStack Cloud Crowbar 9 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * xmlsec1-openssl-devel-1.2.37-8.6.21 * xmlsec1-devel-1.2.37-8.6.21 * xmlsec1-gnutls-devel-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * xmlsec1-gcrypt-devel-1.2.37-8.6.21 * atk-devel-2.28.1-6.5.23 * xmlsec1-nss-devel-1.2.37-8.6.21 * libmwaw-0_3-3-0.3.21-7.24.14 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libmwaw-debugsource-0.3.21-7.24.14 * xmlsec1-1.2.37-8.6.21 * libmwaw-devel-0.3.21-7.24.14 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * libmwaw-devel-doc-0.3.21-7.24.14 * SUSE Linux Enterprise Software Development Kit 12 SP5 (x86_64) * libreoffice-sdk-debuginfo-7.5.4.1-48.44.2 * libreoffice-debugsource-7.5.4.1-48.44.2 * libreoffice-debuginfo-7.5.4.1-48.44.2 * libreoffice-sdk-7.5.4.1-48.44.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE Linux Enterprise Server 12 SP5 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libatk-1_0-0-2.28.1-6.5.23 * libxmlsec1-gcrypt1-debuginfo-1.2.37-8.6.21 * typelib-1_0-Atk-1_0-2.28.1-6.5.23 * libatk-1_0-0-debuginfo-2.28.1-6.5.23 * libxmlsec1-1-debuginfo-1.2.37-8.6.21 * atk-debugsource-2.28.1-6.5.23 * libxmlsec1-gcrypt1-1.2.37-8.6.21 * libxmlsec1-openssl1-1.2.37-8.6.21 * libxmlsec1-1-1.2.37-8.6.21 * libxmlsec1-gnutls1-1.2.37-8.6.21 * libxmlsec1-openssl1-debuginfo-1.2.37-8.6.21 * libxmlsec1-gnutls1-debuginfo-1.2.37-8.6.21 * xmlsec1-debuginfo-1.2.37-8.6.21 * xmlsec1-debugsource-1.2.37-8.6.21 * libxmlsec1-nss1-1.2.37-8.6.21 * libxmlsec1-nss1-debuginfo-1.2.37-8.6.21 * xmlsec1-1.2.37-8.6.21 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * atk-doc-2.28.1-6.5.23 * atk-lang-2.28.1-6.5.23 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libatk-1_0-0-debuginfo-32bit-2.28.1-6.5.23 * libatk-1_0-0-32bit-2.28.1-6.5.23 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libreoffice-7.5.4.1-48.44.2 * libreoffice-impress-debuginfo-7.5.4.1-48.44.2 * libreoffice-debuginfo-7.5.4.1-48.44.2 * libreoffice-calc-debuginfo-7.5.4.1-48.44.2 * libreoffice-gnome-debuginfo-7.5.4.1-48.44.2 * libreoffice-mailmerge-7.5.4.1-48.44.2 * libreoffice-writer-debuginfo-7.5.4.1-48.44.2 * libreoffice-base-debuginfo-7.5.4.1-48.44.2 * libreoffice-writer-extensions-7.5.4.1-48.44.2 * libreoffice-base-7.5.4.1-48.44.2 * libreoffice-math-debuginfo-7.5.4.1-48.44.2 * libreoffice-writer-7.5.4.1-48.44.2 * libreoffice-calc-extensions-7.5.4.1-48.44.2 * dragonbox-devel-1.1.3-8.3.48 * libreoffice-librelogo-7.5.4.1-48.44.2 * libmwaw-0_3-3-debuginfo-0.3.21-7.24.14 * libreoffice-gtk3-debuginfo-7.5.4.1-48.44.2 * libreoffice-gnome-7.5.4.1-48.44.2 * libreoffice-pyuno-7.5.4.1-48.44.2 * libreoffice-gtk3-7.5.4.1-48.44.2 * libreoffice-debugsource-7.5.4.1-48.44.2 * libreoffice-pyuno-debuginfo-7.5.4.1-48.44.2 * libreoffice-officebean-debuginfo-7.5.4.1-48.44.2 * libreoffice-filters-optional-7.5.4.1-48.44.2 * libreoffice-base-drivers-postgresql-debuginfo-7.5.4.1-48.44.2 * libreoffice-draw-7.5.4.1-48.44.2 * libreoffice-math-7.5.4.1-48.44.2 * libmwaw-0_3-3-0.3.21-7.24.14 * libreoffice-impress-7.5.4.1-48.44.2 * libreoffice-base-drivers-postgresql-7.5.4.1-48.44.2 * libreoffice-officebean-7.5.4.1-48.44.2 * libreoffice-draw-debuginfo-7.5.4.1-48.44.2 * fixmath-devel-2022.07.20-8.3.48 * libmwaw-debugsource-0.3.21-7.24.14 * libreoffice-calc-7.5.4.1-48.44.2 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (noarch) * libreoffice-l10n-zh_CN-7.5.4.1-48.44.2 * libreoffice-l10n-lt-7.5.4.1-48.44.2 * libreoffice-l10n-de-7.5.4.1-48.44.2 * libreoffice-l10n-it-7.5.4.1-48.44.2 * libreoffice-l10n-sk-7.5.4.1-48.44.2 * libreoffice-l10n-zh_TW-7.5.4.1-48.44.2 * libreoffice-l10n-bg-7.5.4.1-48.44.2 * libreoffice-l10n-uk-7.5.4.1-48.44.2 * libreoffice-l10n-ar-7.5.4.1-48.44.2 * libreoffice-l10n-cs-7.5.4.1-48.44.2 * libreoffice-l10n-fr-7.5.4.1-48.44.2 * libreoffice-l10n-gu-7.5.4.1-48.44.2 * libreoffice-icon-themes-7.5.4.1-48.44.2 * libreoffice-l10n-ru-7.5.4.1-48.44.2 * libreoffice-l10n-hr-7.5.4.1-48.44.2 * libreoffice-l10n-xh-7.5.4.1-48.44.2 * libreoffice-l10n-ko-7.5.4.1-48.44.2 * libreoffice-l10n-pt_PT-7.5.4.1-48.44.2 * libreoffice-l10n-nb-7.5.4.1-48.44.2 * libreoffice-l10n-nl-7.5.4.1-48.44.2 * libreoffice-l10n-da-7.5.4.1-48.44.2 * libreoffice-l10n-zu-7.5.4.1-48.44.2 * libreoffice-l10n-af-7.5.4.1-48.44.2 * libreoffice-branding-upstream-7.5.4.1-48.44.2 * libreoffice-l10n-hu-7.5.4.1-48.44.2 * libreoffice-l10n-hi-7.5.4.1-48.44.2 * libreoffice-l10n-fi-7.5.4.1-48.44.2 * libreoffice-l10n-nn-7.5.4.1-48.44.2 * libreoffice-l10n-ja-7.5.4.1-48.44.2 * libreoffice-l10n-ro-7.5.4.1-48.44.2 * libreoffice-l10n-pl-7.5.4.1-48.44.2 * libreoffice-l10n-ca-7.5.4.1-48.44.2 * libreoffice-l10n-sv-7.5.4.1-48.44.2 * libreoffice-l10n-pt_BR-7.5.4.1-48.44.2 * libreoffice-l10n-es-7.5.4.1-48.44.2 * libreoffice-l10n-en-7.5.4.1-48.44.2 ## References: * https://www.suse.com/security/cve/CVE-2023-0950.html * https://www.suse.com/security/cve/CVE-2023-2255.html * https://bugzilla.suse.com/show_bug.cgi?id=1198666 * https://bugzilla.suse.com/show_bug.cgi?id=1200085 * https://bugzilla.suse.com/show_bug.cgi?id=1204040 * https://bugzilla.suse.com/show_bug.cgi?id=1209242 * https://bugzilla.suse.com/show_bug.cgi?id=1210687 * https://bugzilla.suse.com/show_bug.cgi?id=1211746 * https://jira.suse.com/browse/PED-1785 * https://jira.suse.com/browse/PED-3550 * https://jira.suse.com/browse/PED-3561 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 12:30:15 -0000 Subject: SUSE-SU-2024:0071-1: low: Security update for tar Message-ID: <170488981521.13849.15181154492400503581@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0071-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Incorrectly handled extension attributes in PAX archives can lead to a crash (bsc#1217969) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-71=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-71=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-71=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * tar-1.27.1-15.24.1 * tar-debuginfo-1.27.1-15.24.1 * tar-debugsource-1.27.1-15.24.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * tar-lang-1.27.1-15.24.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * tar-1.27.1-15.24.1 * tar-debuginfo-1.27.1-15.24.1 * tar-debugsource-1.27.1-15.24.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * tar-lang-1.27.1-15.24.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * tar-1.27.1-15.24.1 * tar-debuginfo-1.27.1-15.24.1 * tar-debugsource-1.27.1-15.24.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * tar-lang-1.27.1-15.24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:30:16 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 12:30:16 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170488981618.13849.10801854326328232333@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:33:18 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 12:33:18 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170488999895.15566.13102812679982645559@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-tests-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-doc-1.34-150000.3.34.1 * tar-backup-scripts-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 10 12:36:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 10 Jan 2024 12:36:22 -0000 Subject: SUSE-SU-2024:0070-1: low: Security update for tar Message-ID: <170489018234.15032.5937291849481826721@smelt2.prg2.suse.org> # Security update for tar Announcement ID: SUSE-SU-2024:0070-1 Rating: low References: * bsc#1217969 Cross-References: * CVE-2023-39804 CVSS scores: * CVE-2023-39804 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for tar fixes the following issues: * CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-70=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-70=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-70=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-70=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-70=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-70=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-70=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-70=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-70=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP5 (noarch) * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.4 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tar-tests-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-tests-debuginfo-1.34-150000.3.34.1 * openSUSE Leap 15.5 (noarch) * tar-backup-scripts-1.34-150000.3.34.1 * tar-doc-1.34-150000.3.34.1 * tar-lang-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tar-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * tar-debugsource-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * tar-debugsource-1.34-150000.3.34.1 * tar-rmt-1.34-150000.3.34.1 * tar-debuginfo-1.34-150000.3.34.1 * tar-rmt-debuginfo-1.34-150000.3.34.1 * tar-1.34-150000.3.34.1 * Basesystem Module 15-SP4 (noarch) * tar-lang-1.34-150000.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39804.html * https://bugzilla.suse.com/show_bug.cgi?id=1217969 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Wed Jan 10 13:40:19 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:19 +0100 (CET) Subject: SUSE-CU-2024:102-1: Security update of bci/golang Message-ID: <20240110134019.0E81CFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:102-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.5.6 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.5.6 Container Release : 5.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:40:30 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:30 +0100 (CET) Subject: SUSE-CU-2024:104-1: Security update of bci/golang Message-ID: <20240110134030.92A00FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:104-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-9.6 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:40:52 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:40:52 +0100 (CET) Subject: SUSE-CU-2024:106-1: Security update of bci/bci-init Message-ID: <20240110134052.43416FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:106-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.11.6 , bci/bci-init:latest Container Release : 11.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:41:17 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:17 +0100 (CET) Subject: SUSE-CU-2024:109-1: Security update of suse/nginx Message-ID: <20240110134117.242C7FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:109-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-6.6 , suse/nginx:latest Container Release : 6.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:41:38 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:38 +0100 (CET) Subject: SUSE-CU-2024:111-1: Security update of bci/nodejs Message-ID: <20240110134138.0529AFBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:111-1 Container Tags : bci/node:18 , bci/node:18-13.6 , bci/nodejs:18 , bci/nodejs:18-13.6 Container Release : 13.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:41:44 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:41:44 +0100 (CET) Subject: SUSE-CU-2024:113-1: Security update of bci/nodejs Message-ID: <20240110134144.758A7FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:113-1 Container Tags : bci/node:20 , bci/node:20-3.6 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-3.6 , bci/nodejs:latest Container Release : 3.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:42:12 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:12 +0100 (CET) Subject: SUSE-CU-2024:115-1: Security update of bci/openjdk-devel Message-ID: <20240110134212.13961FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:115-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-11.14 Container Release : 11.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-11-15.5.11-12.7 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:42:35 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:42:35 +0100 (CET) Subject: SUSE-CU-2024:117-1: Security update of bci/openjdk Message-ID: <20240110134235.36B19FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:117-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-12.7 Container Release : 12.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 13:43:01 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 14:43:01 +0100 (CET) Subject: SUSE-CU-2024:119-1: Security update of bci/openjdk-devel Message-ID: <20240110134301.8A1A3FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:119-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.14 , bci/openjdk-devel:latest Container Release : 13.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-17-15.5.17-13.7 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:03:35 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:35 +0100 (CET) Subject: SUSE-CU-2024:119-1: Security update of bci/openjdk-devel Message-ID: <20240110140335.87EA0FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:119-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-13.14 , bci/openjdk-devel:latest Container Release : 13.14 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-openjdk-17-15.5.17-13.7 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:03:51 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:03:51 +0100 (CET) Subject: SUSE-CU-2024:121-1: Security update of bci/openjdk Message-ID: <20240110140351.5E3DDFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:121-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-13.7 , bci/openjdk:latest Container Release : 13.7 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:04:11 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:11 +0100 (CET) Subject: SUSE-CU-2024:123-1: Security update of suse/pcp Message-ID: <20240110140411.B7C15FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:123-1 Container Tags : suse/pcp:5 , suse/pcp:5-19.12 , suse/pcp:5.2 , suse/pcp:5.2-19.12 , suse/pcp:5.2.5 , suse/pcp:5.2.5-19.12 , suse/pcp:latest Container Release : 19.12 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:bci-bci-init-15.5-15.5-11.6 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:04:28 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:28 +0100 (CET) Subject: SUSE-CU-2024:125-1: Security update of bci/php-apache Message-ID: <20240110140428.63DDAFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:125-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:04:44 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:04:44 +0100 (CET) Subject: SUSE-CU-2024:127-1: Security update of bci/php-fpm Message-ID: <20240110140444.94913FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:127-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:05:00 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:00 +0100 (CET) Subject: SUSE-CU-2024:129-1: Security update of bci/php Message-ID: <20240110140500.A8BABFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:129-1 Container Tags : bci/php:8 , bci/php:8-9.6 Container Release : 9.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:05:21 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:21 +0100 (CET) Subject: SUSE-CU-2024:133-1: Security update of suse/postgres Message-ID: <20240110140521.304DEFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:133-1 Container Tags : suse/postgres:16 , suse/postgres:16-3.5 , suse/postgres:16.1 , suse/postgres:16.1-3.5 , suse/postgres:latest Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:05:17 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:17 +0100 (CET) Subject: SUSE-CU-2024:131-1: Security update of suse/postgres Message-ID: <20240110140517.76838FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:131-1 Container Tags : suse/postgres:15 , suse/postgres:15-14.5 , suse/postgres:15.5 , suse/postgres:15.5-14.5 Container Release : 14.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:05:38 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:38 +0100 (CET) Subject: SUSE-CU-2024:135-1: Security update of bci/python Message-ID: <20240110140538.B10C4FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:135-1 Container Tags : bci/python:3 , bci/python:3-14.3 , bci/python:3.11 , bci/python:3.11-14.3 , bci/python:latest Container Release : 14.3 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:05:56 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:05:56 +0100 (CET) Subject: SUSE-CU-2024:137-1: Security update of bci/python Message-ID: <20240110140556.8150DFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:137-1 Container Tags : bci/python:3 , bci/python:3-15.5 , bci/python:3.6 , bci/python:3.6-15.5 Container Release : 15.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:06:04 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:06:04 +0100 (CET) Subject: SUSE-CU-2024:138-1: Security update of suse/rmt-server Message-ID: <20240110140604.CCE49FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-server ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:138-1 Container Tags : suse/rmt-server:2.14 , suse/rmt-server:2.14-12.5 , suse/rmt-server:latest Container Release : 12.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/rmt-server was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:12:12 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:12 +0100 (CET) Subject: SUSE-CU-2024:140-1: Security update of bci/ruby Message-ID: <20240110141212.7D0E6FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:140-1 Container Tags : bci/ruby:2 , bci/ruby:2-13.5 , bci/ruby:2.5 , bci/ruby:2.5-13.5 , bci/ruby:latest Container Release : 13.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:12:31 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:31 +0100 (CET) Subject: SUSE-CU-2024:142-1: Security update of bci/rust Message-ID: <20240110141231.59632FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:142-1 Container Tags : bci/rust:1.73 , bci/rust:1.73-2.3.5 , bci/rust:oldstable , bci/rust:oldstable-2.3.5 Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:12:51 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:51 +0100 (CET) Subject: SUSE-CU-2024:144-1: Security update of bci/rust Message-ID: <20240110141251.CC4B6FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:144-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-1.3.5 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.5 Container Release : 3.5 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:12:54 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:12:54 +0100 (CET) Subject: SUSE-CU-2024:146-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240110141254.30393FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:146-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.3.6 , bci/bci-sle15-kernel-module-devel:latest Container Release : 3.6 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:13:11 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:11 +0100 (CET) Subject: SUSE-CU-2024:148-1: Security update of suse/sle15 Message-ID: <20240110141311.EB3B0FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:148-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.71 , suse/sle15:15.5 , suse/sle15:15.5.36.5.71 Container Release : 36.5.71 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:13:53 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:13:53 +0100 (CET) Subject: SUSE-CU-2024:149-1: Security update of suse/sle-micro/5.1/toolbox Message-ID: <20240110141353.51A3CFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.1/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:149-1 Container Tags : suse/sle-micro/5.1/toolbox:12.1 , suse/sle-micro/5.1/toolbox:12.1-2.2.527 , suse/sle-micro/5.1/toolbox:latest Container Release : 2.2.527 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.1/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-security-updates at lists.suse.com Wed Jan 10 14:15:45 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Wed, 10 Jan 2024 15:15:45 +0100 (CET) Subject: SUSE-CU-2024:151-1: Security update of suse/sle-micro/5.2/toolbox Message-ID: <20240110141545.6F762FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:151-1 Container Tags : suse/sle-micro/5.2/toolbox:12.1 , suse/sle-micro/5.2/toolbox:12.1-6.2.349 , suse/sle-micro/5.2/toolbox:latest Container Release : 6.2.349 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated From sle-security-updates at lists.suse.com Thu Jan 11 08:01:47 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 11 Jan 2024 09:01:47 +0100 (CET) Subject: SUSE-CU-2024:152-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240111080147.29FB0FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:152-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.133 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.133 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.71 updated From null at suse.de Thu Jan 11 12:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0089-1: important: Security update for gstreamer-plugins-bad Message-ID: <170497620363.14648.10452387568196083723@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2024:0089-1 Rating: important References: * bsc#1218534 Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one security fix can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * ZDI-CAN-22300: Fixed a buffer overflow in the AV1 video plugin (bsc#1218534). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-89=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-89=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-89=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-89=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libgstcodecparsers-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstVulkanXCB-1_0-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-devel-1.22.0-150500.3.20.1 * typelib-1_0-GstVulkan-1_0-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstCuda-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-CudaGst-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstPlayer-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-1.22.0-150500.3.20.1 * libgstva-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstWebRTC-1_0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstVa-1_0-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstTranscoder-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstInsertBin-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-transcoder-1.22.0-150500.3.20.1 * typelib-1_0-GstBadAudio-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstMpegts-1_0-1.22.0-150500.3.20.1 * gstreamer-transcoder-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-1.22.0-150500.3.20.1 * libgstplay-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstva-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstVulkanWayland-1_0-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstPlay-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstCodecs-1_0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-transcoder-devel-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-debuginfo-1.22.0-150500.3.20.1 * openSUSE Leap 15.5 (x86_64) * libgstsctp-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstplay-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-32bit-1.22.0-150500.3.20.1 * libgstva-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-32bit-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-32bit-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-32bit-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstva-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-32bit-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-32bit-1.22.0-150500.3.20.1 * openSUSE Leap 15.5 (noarch) * gstreamer-plugins-bad-lang-1.22.0-150500.3.20.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libgstva-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstplay-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-64bit-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-64bit-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstva-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-64bit-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-64bit-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-64bit-1.22.0-150500.3.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * libgstplay-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgstphotography-1_0-0-1.22.0-150500.3.20.1 * libgstplayer-1_0-0-1.22.0-150500.3.20.1 * libgstplay-1_0-0-debuginfo-1.22.0-150500.3.20.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libgstcodecparsers-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-devel-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstCuda-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * libgstcodecparsers-1_0-0-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-CudaGst-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-1.22.0-150500.3.20.1 * libgstwayland-1_0-0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstPlayer-1_0-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-1.22.0-150500.3.20.1 * libgstcuda-1_0-0-1.22.0-150500.3.20.1 * libgstva-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstWebRTC-1_0-1.22.0-150500.3.20.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.22.0-150500.3.20.1 * libgstwebrtc-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstVa-1_0-1.22.0-150500.3.20.1 * libgstadaptivedemux-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-1.22.0-150500.3.20.1 * libgstinsertbin-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstvulkan-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstisoff-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstbadaudio-1_0-0-1.22.0-150500.3.20.1 * typelib-1_0-GstInsertBin-1_0-1.22.0-150500.3.20.1 * libgstwebrtcnice-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstBadAudio-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstMpegts-1_0-1.22.0-150500.3.20.1 * libgstva-1_0-0-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-chromaprint-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-1.22.0-150500.3.20.1 * libgsturidownloader-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstmpegts-1_0-0-debuginfo-1.22.0-150500.3.20.1 * typelib-1_0-GstPlay-1_0-1.22.0-150500.3.20.1 * typelib-1_0-GstCodecs-1_0-1.22.0-150500.3.20.1 * libgstcodecs-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgstsctp-1_0-0-debuginfo-1.22.0-150500.3.20.1 * Desktop Applications Module 15-SP5 (noarch) * gstreamer-plugins-bad-lang-1.22.0-150500.3.20.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.22.0-150500.3.20.1 * gstreamer-plugins-bad-debugsource-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-debuginfo-1.22.0-150500.3.20.1 * libgsttranscoder-1_0-0-1.22.0-150500.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 11 16:30:02 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 11 Jan 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0090-1: moderate: Security update for gstreamer-plugins-rs Message-ID: <170499060226.6523.15145710116297666817@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-rs Announcement ID: SUSE-SU-2024:0090-1 Rating: moderate References: * bsc#1208556 Cross-References: * CVE-2022-31394 CVSS scores: * CVE-2022-31394 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-31394 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer-plugins-rs fixes the following issues: * CVE-2022-31394: Fixed a potential denial of service in the HTTP/2 implementation (bsc#1208556). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-90=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-90=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-90=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-0.8.2-150400.3.3.1 * Desktop Applications Module 15-SP5 (ppc64le) * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-0.8.2-150400.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.3.1 * gstreamer-plugins-rs-0.8.2-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-31394.html * https://bugzilla.suse.com/show_bug.cgi?id=1208556 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Fri Jan 12 08:01:34 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:01:34 +0100 (CET) Subject: SUSE-CU-2024:154-1: Security update of ses/7.1/ceph/ceph Message-ID: <20240112080134.EB744FD1F@maintenance.suse.de> SUSE Container Update Advisory: ses/7.1/ceph/ceph ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:154-1 Container Tags : ses/7.1/ceph/ceph:16.2.13.66 , ses/7.1/ceph/ceph:16.2.13.66.4.9.1 , ses/7.1/ceph/ceph:latest , ses/7.1/ceph/ceph:sle15.3.pacific Container Release : 4.9.1 Severity : important Type : security References : 1029961 1041742 1107342 1111622 1158830 1170175 1176785 1184753 1196647 1199282 1200962 1201384 1203760 1205767 1206080 1206480 1206480 1206556 1206684 1206684 1206798 1207853 1208037 1208038 1208040 1208409 1209122 1209275 1209642 1210297 1210335 1210557 1210557 1210660 1210733 1211427 1211427 1211829 1212101 1212101 1212422 1212819 1212910 1213458 1213854 1213915 1213915 1214052 1214052 1214292 1214395 1214460 1214460 1214565 1214567 1214579 1214580 1214604 1214611 1214619 1214620 1214623 1214624 1214625 1214692 1214788 1214806 1215007 1215215 1215286 1215314 1215427 1215434 1215496 1215713 1215889 1215891 1215968 1215979 1216091 1216123 1216129 1216174 1216377 1216378 1216664 1216862 1216922 1216987 1217212 1217472 1217573 1217592 1217695 1217696 1217950 1218014 CVE-2020-19726 CVE-2021-32256 CVE-2022-35205 CVE-2022-35206 CVE-2022-4285 CVE-2022-44840 CVE-2022-45703 CVE-2022-47673 CVE-2022-47695 CVE-2022-47696 CVE-2022-48063 CVE-2022-48064 CVE-2022-48065 CVE-2023-0687 CVE-2023-1579 CVE-2023-1829 CVE-2023-1972 CVE-2023-2137 CVE-2023-2222 CVE-2023-23559 CVE-2023-25585 CVE-2023-25587 CVE-2023-25588 CVE-2023-35945 CVE-2023-38546 CVE-2023-40217 CVE-2023-4039 CVE-2023-4039 CVE-2023-43804 CVE-2023-44487 CVE-2023-45322 CVE-2023-45803 CVE-2023-45853 CVE-2023-46218 CVE-2023-4641 CVE-2023-4813 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5678 ----------------------------------------------------------------- The container ses/7.1/ceph/ceph was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:3814-1 Released: Wed Sep 27 18:08:17 2023 Summary: Recommended update for glibc Type: recommended Severity: moderate References: 1211829,1212819,1212910 This update for glibc fixes the following issues: - nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415) - Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457) - elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688) - elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676) - ld.so: Always use MAP_COPY to map the first segment (BZ #30452) - add GB18030-2022 charmap (jsc#PED-4908, BZ #30243) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3825-1 Released: Wed Sep 27 18:48:53 2023 Summary: Security update for binutils Type: security Severity: important References: 1200962,1206080,1206556,1208037,1208038,1208040,1208409,1209642,1210297,1210733,1213458,1214565,1214567,1214579,1214580,1214604,1214611,1214619,1214620,1214623,1214624,1214625,CVE-2020-19726,CVE-2021-32256,CVE-2022-35205,CVE-2022-35206,CVE-2022-4285,CVE-2022-44840,CVE-2022-45703,CVE-2022-47673,CVE-2022-47695,CVE-2022-47696,CVE-2022-48063,CVE-2022-48064,CVE-2022-48065,CVE-2023-0687,CVE-2023-1579,CVE-2023-1972,CVE-2023-2222,CVE-2023-25585,CVE-2023-25587,CVE-2023-25588 This update for binutils fixes the following issues: Update to version 2.41 [jsc#PED-5778]: * The MIPS port now supports the Sony Interactive Entertainment Allegrex processor, used with the PlayStation Portable, which implements the MIPS II ISA along with a single-precision FPU and a few implementation-specific integer instructions. * Objdump's --private option can now be used on PE format files to display the fields in the file header and section headers. * New versioned release of libsframe: libsframe.so.1. This release introduces versioned symbols with version node name LIBSFRAME_1.0. This release also updates the ABI in an incompatible way: this includes removal of sframe_get_funcdesc_with_addr API, change in the behavior of sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs. * SFrame Version 2 is now the default (and only) format version supported by gas, ld, readelf and objdump. * Add command-line option, --strip-section-headers, to objcopy and strip to remove ELF section header from ELF file. * The RISC-V port now supports the following new standard extensions: - Zicond (conditional zero instructions) - Zfa (additional floating-point instructions) - Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng, Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions) * The RISC-V port now supports the following vendor-defined extensions: - XVentanaCondOps * Add support for Intel FRED, LKGS and AMX-COMPLEX instructions. * A new .insn directive is recognized by x86 gas. * Add SME2 support to the AArch64 port. * The linker now accepts a command line option of --remap-inputs = to relace any input file that matches with . In addition the option --remap-inputs-file= can be used to specify a file containing any number of these remapping directives. * The linker command line option --print-map-locals can be used to include local symbols in a linker map. (ELF targets only). * For most ELF based targets, if the --enable-linker-version option is used then the version of the linker will be inserted as a string into the .comment section. * The linker script syntax has a new command for output sections: ASCIZ 'string' This will insert a zero-terminated string at the current location. * Add command-line option, -z nosectionheader, to omit ELF section header. - Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1209642 aka CVE-2023-1579 aka PR29988 * bsc#1210297 aka CVE-2023-1972 aka PR30285 * bsc#1210733 aka CVE-2023-2222 aka PR29936 * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc) * bsc#1214565 aka CVE-2020-19726 aka PR26240 * bsc#1214567 aka CVE-2022-35206 aka PR29290 * bsc#1214579 aka CVE-2022-35205 aka PR29289 * bsc#1214580 aka CVE-2022-44840 aka PR29732 * bsc#1214604 aka CVE-2022-45703 aka PR29799 * bsc#1214611 aka CVE-2022-48065 aka PR29925 * bsc#1214619 aka CVE-2022-48064 aka PR29922 * bsc#1214620 aka CVE-2022-48063 aka PR29924 * bsc#1214623 aka CVE-2022-47696 aka PR29677 * bsc#1214624 aka CVE-2022-47695 aka PR29846 * bsc#1214625 aka CVE-2022-47673 aka PR29876 - This only existed only for a very short while in SLE-15, as the main variant in devel:gcc subsumed this in binutils-revert-rela.diff. Hence: - Document fixed CVEs: * bsc#1208037 aka CVE-2023-25588 aka PR29677 * bsc#1208038 aka CVE-2023-25587 aka PR29846 * bsc#1208040 aka CVE-2023-25585 aka PR29892 * bsc#1208409 aka CVE-2023-0687 aka PR29444 - Enable bpf-none cross target and add bpf-none to the multitarget set of supported targets. - Disable packed-relative-relocs for old codestreams. They generate buggy relocations when binutils-revert-rela.diff is active. [bsc#1206556] - Disable ZSTD debug section compress by default. - Enable zstd compression algorithm (instead of zlib) for debug info sections by default. - Pack libgprofng only for supported platforms. - Move libgprofng-related libraries to the proper locations (packages). - Add --without=bootstrap for skipping of bootstrap (faster testing of the package). - Remove broken arm32-avoid-copyreloc.patch to fix [gcc#108515] Update to version 2.40: * Objdump has a new command line option --show-all-symbols which will make it display all symbols that match a given address when disassembling. (Normally only the first symbol that matches an address is shown). * Add --enable-colored-disassembly configure time option to enable colored disassembly output by default, if the output device is a terminal. Note, this configure option is disabled by default. * DCO signed contributions are now accepted. * objcopy --decompress-debug-sections now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * addr2line and objdump --dwarf now support zstd compressed debug sections. * The dlltool program now accepts --deterministic-libraries and --non-deterministic-libraries as command line options to control whether or not it generates deterministic output libraries. If neither of these options are used the default is whatever was set when the binutils were configured. * readelf and objdump now have a newly added option --sframe which dumps the SFrame section. * Add support for Intel RAO-INT instructions. * Add support for Intel AVX-NE-CONVERT instructions. * Add support for Intel MSRLIST instructions. * Add support for Intel WRMSRNS instructions. * Add support for Intel CMPccXADD instructions. * Add support for Intel AVX-VNNI-INT8 instructions. * Add support for Intel AVX-IFMA instructions. * Add support for Intel PREFETCHI instructions. * Add support for Intel AMX-FP16 instructions. * gas now supports --compress-debug-sections=zstd to compress debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug-sections. * Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs, XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx, XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head ISA manual, which are implemented in the Allwinner D1. * Add support for the RISC-V Zawrs extension, version 1.0-rc4. * Add support for Cortex-X1C for Arm. * New command line option --gsframe to generate SFrame unwind information on x86_64 and aarch64 targets. * The linker has a new command line option to suppress the generation of any warning or error messages. This can be useful when there is a need to create a known non-working binary. The option is -w or --no-warnings. * ld now supports zstd compressed debug sections. The new option --compress-debug-sections=zstd compresses debug sections with zstd. * Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd} that selects the default compression algorithm for --enable-compressed-debug-sections. * Remove support for -z bndplt (MPX prefix instructions). - Includes fixes for these CVEs: * bsc#1206080 aka CVE-2022-4285 aka PR29699 - Enable by default: --enable-colored-disassembly. - fix build on x86_64_vX platforms ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3828-1 Released: Wed Sep 27 19:07:38 2023 Summary: Security update for python3 Type: security Severity: important References: 1214692,CVE-2023-40217 This update for python3 fixes the following issues: - CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:3997-1 Released: Fri Oct 6 14:13:56 2023 Summary: Security update for nghttp2 Type: security Severity: important References: 1215713,CVE-2023-35945 This update for nghttp2 fixes the following issues: - CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4006-1 Released: Mon Oct 9 08:35:50 2023 Summary: Recommended update for zypper Type: recommended Severity: moderate References: 1213854,1214292,1214395,1215007 This update for zypper fixes the following issues: - Fix name of the bash completion script (bsc#1215007) - Update notes about failing signature checks (bsc#1214395) - Improve the SIGINT handler to be signal safe (bsc#1214292) - Update to version 1.14.64 - Changed location of bash completion script (bsc#1213854). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4027-1 Released: Tue Oct 10 13:59:02 2023 Summary: Security update for shadow Type: security Severity: low References: 1214806,CVE-2023-4641 This update for shadow fixes the following issues: - CVE-2023-4641: Fixed potential password leak (bsc#1214806). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4045-1 Released: Wed Oct 11 09:10:43 2023 Summary: Security update for curl Type: security Severity: moderate References: 1215889,CVE-2023-38546 This update for curl fixes the following issues: - CVE-2023-38546: Fixed a cookie injection with none file (bsc#1215889). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4052-1 Released: Wed Oct 11 14:11:55 2023 Summary: Recommended update for babeltrace Type: recommended Severity: moderate References: 1209275 This update ships missing babeltrace-devel to the Basesystem module to allow building gdb source rpms. (bsc#1209275) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4108-1 Released: Wed Oct 18 11:51:12 2023 Summary: Security update for python-urllib3 Type: security Severity: moderate References: 1215968,CVE-2023-43804 This update for python-urllib3 fixes the following issues: - CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if the user manually set the corresponding header (bsc#1215968). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4110-1 Released: Wed Oct 18 12:35:26 2023 Summary: Security update for glibc Type: security Severity: important References: 1215286,1215891,CVE-2023-4813 This update for glibc fixes the following issues: Security issue fixed: - CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Also a regression from a previous update was fixed: - elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4154-1 Released: Fri Oct 20 19:33:25 2023 Summary: Recommended update for aaa_base Type: recommended Severity: moderate References: 1107342,1215434 This update for aaa_base fixes the following issues: - Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4158-1 Released: Mon Oct 23 09:52:06 2023 Summary: Security update for suse-module-tools Type: security Severity: important References: 1205767,1207853,1210335,CVE-2023-1829,CVE-2023-23559 This update for suse-module-tools fixes the following issues: - Updated to version 15.3.17: - CVE-2023-1829: Blacklisted the Linux kernel tcindex classifier module (bsc#1210335). - CVE-2023-23559: Blacklisted the Linux kernel RNDIS modules (bsc#1205767, jsc#PED-5731). - Updated to version 15.3.16: - Fixed a build issue for s390x (bsc#1207853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4162-1 Released: Mon Oct 23 15:33:03 2023 Summary: Security update for gcc13 Type: security Severity: important References: 1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,CVE-2023-4039 This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: - install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages. - override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) - Turn cross compiler to s390x to a glibc cross. [bsc#1214460] - Also handle -static-pie in the default-PIE specs - Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] - Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] - Add new x86-related intrinsics (amxcomplexintrin.h). - RISC-V: Add support for inlining subword atomic operations - Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. - Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. - Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. - Bump included newlib to version 4.3.0. - Also package libhwasan_preinit.o on aarch64. - Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. - Package libhwasan_preinit.o on x86_64. - Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] - Enable PRU flavour for gcc13 - update floatn fixinclude pickup to check each header separately (bsc#1206480) - Redo floatn fixinclude pick-up to simply keep what is there. - Bump libgo SONAME to libgo22. - Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. - Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. - Depend on at least LLVM 13 for GCN cross compiler. - Update embedded newlib to version 4.2.0 - Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4200-1 Released: Wed Oct 25 12:04:29 2023 Summary: Security update for nghttp2 Type: security Severity: important References: 1216123,1216174,CVE-2023-44487 This update for nghttp2 fixes the following issues: - CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4217-1 Released: Thu Oct 26 12:20:27 2023 Summary: Security update for zlib Type: security Severity: moderate References: 1216378,CVE-2023-45853 This update for zlib fixes the following issues: - CVE-2023-45853: Fixed an integer overflow that would lead to a buffer overflow in the minizip subcomponent (bsc#1216378). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4226-1 Released: Fri Oct 27 11:14:10 2023 Summary: Recommended update for openssl-1_1 Type: recommended Severity: moderate References: 1215215 This update for openssl-1_1 fixes the following issues: - Displays 'fips' in the version string (bsc#1215215) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4310-1 Released: Tue Oct 31 14:10:47 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1196647 This Update for libtirpc to 1.3.4, fixing the following issues: Update to 1.3.4 (bsc#1199467) * binddynport.c honor ip_local_reserved_ports - replaces: binddynport-honor-ip_local_reserved_ports.patch * gss-api: expose gss major/minor error in authgss_refresh() * rpcb_clnt.c: Eliminate double frees in delete_cache() * rpcb_clnt.c: memory leak in destroy_addr * portmapper: allow TCP-only portmapper * getnetconfigent: avoid potential DoS issue by removing unnecessary sleep * clnt_raw.c: fix a possible null pointer dereference * bindresvport.c: fix a potential resource leakage Update to 1.3.3: * Fix DoS vulnerability in libtirpc - replaces: 0001-Fix-DoS-vulnerability-in-libtirpc.patch * _rpc_dtablesize: use portable system call * libtirpc: Fix use-after-free accessing the error number * Fix potential memory leak of parms.r_addr - replaces 0001-fix-parms.r_addr-memory-leak.patch * rpcb_clnt.c add mechanism to try v2 protocol first - preplaces: 0001-rpcb_clnt.c-config-to-try-protocolversion-2-first.patch * Eliminate deadlocks in connects with an MT environment * clnt_dg_freeres() uncleared set active state may deadlock * thread safe clnt destruction * SUNRPC: mutexed access blacklist_read state variable * SUNRPC: MT-safe overhaul of address cache management in rpcb_clnt.c Update to 1.3.2: * Replace the final SunRPC licenses with BSD licenses * blacklist: Add a few more well known ports * libtirpc: disallow calling auth_refresh from clnt_call with RPCSEC_GSS Update to 1.3.1: * Remove AUTH_DES interfaces from auth_des.h The unsupported AUTH_DES authentication has be compiled out since commit d918e41d889 (Wed Oct 9 2019) replaced by API routines that return errors. * svc_dg: Free xp_netid during destroy * Fix memory management issues of fd locks * libtirpc: replace array with list for per-fd locks * __svc_vc_dodestroy: fix double free of xp_ltaddr.buf * __rpc_dtbsize: rlim_cur instead of rlim_max * pkg-config: use the correct replacements for libdir/includedir ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4458-1 Released: Thu Nov 16 14:38:48 2023 Summary: Security update for gcc13 Type: security Severity: important References: 1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,1215427,1216664,CVE-2023-4039 This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: - install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages. - override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) - Work around third party app crash during C++ standard library initialization. [bsc#1216664] - Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427) - Bump included newlib to version 4.3.0. - Update to GCC trunk head (r13-5254-g05b9868b182bb9) - Redo floatn fixinclude pick-up to simply keep what is there. - Turn cross compiler to s390x to a glibc cross. [bsc#1214460] - Also handle -static-pie in the default-PIE specs - Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] - Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] - Add new x86-related intrinsics (amxcomplexintrin.h). - RISC-V: Add support for inlining subword atomic operations - Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. - Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. - Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. - Bump included newlib to version 4.3.0. - Also package libhwasan_preinit.o on aarch64. - Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. - Package libhwasan_preinit.o on x86_64. - Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] - Enable PRU flavour for gcc13 - update floatn fixinclude pickup to check each header separately (bsc#1206480) - Redo floatn fixinclude pick-up to simply keep what is there. - Bump libgo SONAME to libgo22. - Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. - Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. - Depend on at least LLVM 13 for GCN cross compiler. - Update embedded newlib to version 4.2.0 - Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4464-1 Released: Thu Nov 16 17:56:12 2023 Summary: Security update for libxml2 Type: security Severity: moderate References: 1216129,CVE-2023-45322 This update for libxml2 fixes the following issues: - CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4467-1 Released: Thu Nov 16 17:57:51 2023 Summary: Security update for python-urllib3 Type: security Severity: moderate References: 1216377,CVE-2023-45803 This update for python-urllib3 fixes the following issues: - CVE-2023-45803: Fix a request body leak that could occur when receiving a 303 HTTP response (bsc#1216377). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4519-1 Released: Tue Nov 21 17:39:58 2023 Summary: Security update for openssl-1_1 Type: security Severity: important References: 1216922,CVE-2023-5678 This update for openssl-1_1 fixes the following issues: - CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4535-1 Released: Thu Nov 23 08:17:40 2023 Summary: Recommended update for libzypp, zypper Type: recommended Severity: moderate References: 1041742,1203760,1212422,1215979,1216091 This update for libzypp, zypper fixes the following issues: - Preliminary disable 'rpm --runposttrans' usage for chrooted systems (bsc#1216091) - Fix comment typo on zypp.conf (bsc#1215979) - Attempt to delay %transfiletrigger(postun|in) execution if rpm supports it (bsc#1041742) - Make sure the old target is deleted before a new one is created (bsc#1203760) - Return 104 also if info suggests near matches - Rephrase upgrade message for openSUSE Tumbleweed (bsc#1212422) - commit: Insert a headline to separate output of different rpm scripts (bsc#1041742) ----------------------------------------------------------------- Advisory ID: SUSE-feature-2023:4583-1 Released: Mon Nov 27 10:16:11 2023 Summary: Feature update for python-psutil Type: feature Severity: moderate References: 1111622,1170175,1176785,1184753,1199282 This update for python-psutil, python-requests fixes the following issues: - update python-psutil to 5.9.1 (bsc#1199282, bsc#1184753, jsc#SLE-24629, jsc#PM-3243, gh#giampaolo/psutil#2043) - Fix tests: setuptools changed the builddir library path and does not find the module from it. Use the installed platlib instead and exclude psutil.tests only later. - remove the dependency on net-tools, since it conflicts with busybox-hostnmame which is default on MicroOS - Update python-requests to 2.25.1 (bsc#1176785, bsc#1170175, jsc#ECO-3105, jsc#PM-2352, jsc#PED-7192) - Fixed bug with unintended Authorization header stripping for redirects using default ports (bsc#1111622). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4615-1 Released: Wed Nov 29 20:33:38 2023 Summary: Recommended update for icu Type: recommended Severity: moderate References: 1217472 This update of icu fixes the following issue: - missing 32bit libraries in SLES 15 SP3 were added, required by xerces-c 32bit. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4619-1 Released: Thu Nov 30 10:13:52 2023 Summary: Security update for sqlite3 Type: security Severity: important References: 1210660,CVE-2023-2137 This update for sqlite3 fixes the following issues: - CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4644-1 Released: Tue Dec 5 13:46:14 2023 Summary: Recommended update for psmisc Type: recommended Severity: moderate References: This update for psmisc fixes the following issues: - Fix version number when building the package ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4699-1 Released: Mon Dec 11 07:02:10 2023 Summary: Recommended update for gpg2 Type: recommended Severity: moderate References: 1217212 This update for gpg2 fixes the following issues: - `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4713-1 Released: Mon Dec 11 13:23:12 2023 Summary: Security update for curl Type: security Severity: moderate References: 1217573,CVE-2023-46218 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4723-1 Released: Tue Dec 12 09:57:51 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1216862 This update for libtirpc fixes the following issue: - fix sed parsing in specfile (bsc#1216862) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4890-1 Released: Mon Dec 18 13:00:52 2023 Summary: Recommended update for python-websocket-client Type: recommended Severity: moderate References: 1215314 This update for python-websocket-client fixes the following issues: - Re-enable Python 3.6 to fix pip3 install (bsc#1215314) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4921-1 Released: Wed Dec 20 09:51:31 2023 Summary: Security update for python-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4963-1 Released: Fri Dec 22 14:37:08 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:82-1 Released: Thu Jan 11 09:21:29 2024 Summary: Recommended update for ceph Type: recommended Severity: moderate References: This update for ceph fixes the following issues: - Fix build versioning to resolve installation conflicts (no source code changes) The following package changes have been done: - aaa_base-84.87+git20180409.04c9dae-150300.10.6.2 updated - babeltrace-1.5.8-150300.3.2.1 updated - binutils-2.41-150100.7.46.1 updated - ceph-base-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-common-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-grafana-dashboards-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mds-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-cephadm-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-dashboard-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-modules-core-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-rook-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mgr-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-mon-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-osd-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-prometheus-alerts-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-radosgw-16.2.13.66+g54799ee0666-150300.9.1 updated - cephadm-16.2.13.66+g54799ee0666-150300.9.1 updated - ceph-16.2.13.66+g54799ee0666-150300.9.1 updated - glibc-locale-base-2.31-150300.63.1 updated - glibc-2.31-150300.63.1 updated - gpg2-2.2.27-150300.3.8.1 updated - libcephfs2-16.2.13.66+g54799ee0666-150300.9.1 updated - libcephsqlite-16.2.13.66+g54799ee0666-150300.9.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libctf-nobfd0-2.41-150100.7.46.1 updated - libctf0-2.41-150100.7.46.1 updated - libcurl4-7.66.0-150200.4.66.1 updated - libgcc_s1-13.2.1+git7813-150000.1.6.1 updated - libicu-suse65_1-65.1-150200.4.10.1 updated - libicu65_1-ledata-65.1-150200.4.10.1 updated - libncurses6-6.1-150000.5.20.1 updated - libnghttp2-14-1.40.0-150200.12.1 updated - libopenssl1_1-hmac-1.1.1d-150200.11.82.1 updated - libopenssl1_1-1.1.1d-150200.11.82.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libpython3_6m1_0-3.6.15-150300.10.51.1 updated - librados2-16.2.13.66+g54799ee0666-150300.9.1 updated - librbd1-16.2.13.66+g54799ee0666-150300.9.1 updated - librgw2-16.2.13.66+g54799ee0666-150300.9.1 updated - libsolv-tools-0.7.27-150200.23.2 updated - libsqlite3-0-3.44.0-150000.3.23.1 updated - libstdc++6-13.2.1+git7813-150000.1.6.1 updated - libtirpc-netconfig-1.3.4-150300.3.23.1 updated - libtirpc3-1.3.4-150300.3.23.1 updated - libxml2-2-2.9.7-150000.3.63.1 updated - libz1-1.2.11-150000.3.48.1 updated - libzypp-17.31.27-150200.84.1 updated - login_defs-4.8.1-150300.4.12.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-fips-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - openssl-1_1-1.1.1d-150200.11.82.1 updated - procps-3.3.17-150000.7.37.1 updated - psmisc-23.0-150000.6.25.1 updated - python3-base-3.6.15-150300.10.51.1 updated - python3-ceph-argparse-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-ceph-common-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-cephfs-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-cryptography-3.3.2-150200.22.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - python3-curses-3.6.15-150300.10.51.1 updated - python3-lxml-4.7.1-150200.3.12.1 updated - python3-rados-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-rbd-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-requests-2.25.1-150300.3.6.1 updated - python3-rgw-16.2.13.66+g54799ee0666-150300.9.1 updated - python3-urllib3-1.25.10-150300.4.9.1 updated - python3-websocket-client-1.3.2-150100.6.10.5 updated - python3-3.6.15-150300.10.51.1 updated - rbd-mirror-16.2.13.66+g54799ee0666-150300.9.1 updated - shadow-4.8.1-150300.4.12.1 updated - suse-module-tools-15.3.17-150300.3.22.1 updated - terminfo-base-6.1-150000.5.20.1 updated - zypper-1.14.68-150200.70.2 updated - container:sles15-image-15.0.0-17.20.236 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-security-updates at lists.suse.com Fri Jan 12 08:06:13 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:06:13 +0100 (CET) Subject: SUSE-CU-2024:168-1: Security update of bci/golang Message-ID: <20240112080613.085C8FD95@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:168-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.6.1 , bci/golang:oldstable , bci/golang:oldstable-2.6.1 Container Release : 6.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.72 updated From sle-security-updates at lists.suse.com Fri Jan 12 08:06:21 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 12 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:169-1: Security update of bci/golang Message-ID: <20240112080621.C5AE9FD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:169-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-10.1 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-10.1 Container Release : 10.1 Severity : low Type : security References : 1217969 CVE-2023-39804 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). The following package changes have been done: - tar-1.34-150000.3.34.1 updated - container:sles15-image-15.0.0-36.5.72 updated From null at suse.de Fri Jan 12 16:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 12 Jan 2024 16:30:03 -0000 Subject: SUSE-SU-2024:0100-1: important: Security update for gstreamer-plugins-bad Message-ID: <170507700389.9476.6707830211859878036@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-bad Announcement ID: SUSE-SU-2024:0100-1 Rating: important References: * bsc#1218534 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for gstreamer-plugins-bad fixes the following issues: * ZDI-CAN-22300: Fixed a buffer overflow in the AV1 video plugin (bsc#1218534). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-100=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-100=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-100=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-100=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-100=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-100=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-100=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-100=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-100=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-100=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-transcoder-devel-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstVulkan-1_0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-transcoder-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgsttranscoder-1_0-0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * typelib-1_0-GstVulkanXCB-1_0-1.20.1-150400.3.18.1 * libgsttranscoder-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * gstreamer-transcoder-debuginfo-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstTranscoder-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstVulkanWayland-1_0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * openSUSE Leap 15.4 (x86_64) * gstreamer-plugins-bad-chromaprint-32bit-1.20.1-150400.3.18.1 * libgstplay-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-32bit-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstplay-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-32bit-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-32bit-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-32bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-32bit-debuginfo-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-32bit-debuginfo-1.20.1-150400.3.18.1 * openSUSE Leap 15.4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgstwayland-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-64bit-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-64bit-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstva-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-64bit-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-64bit-debuginfo-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-64bit-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-64bit-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.18.1 * libgstcodecs-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.18.1 * libgstinsertbin-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-devel-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-1.20.1-150400.3.18.1 * libgstmpegts-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgsturidownloader-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstadaptivedemux-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbasecamerabinsrc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstwayland-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstva-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.18.1 * libgstvulkan-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstsctp-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-debuginfo-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstisoff-1_0-0-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.18.1 * libgstcodecparsers-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstPlay-1_0-1.20.1-150400.3.18.1 * typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-1.20.1-150400.3.18.1 * libgstwebrtc-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstbadaudio-1_0-0-1.20.1-150400.3.18.1 * typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gstreamer-plugins-bad-lang-1.20.1-150400.3.18.1 * SUSE Manager Proxy 4.3 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gstreamer-plugins-bad-debuginfo-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-1.20.1-150400.3.18.1 * libgstphotography-1_0-0-debuginfo-1.20.1-150400.3.18.1 * gstreamer-plugins-bad-debugsource-1.20.1-150400.3.18.1 * libgstplay-1_0-0-1.20.1-150400.3.18.1 * libgstplayer-1_0-0-debuginfo-1.20.1-150400.3.18.1 * libgstplay-1_0-0-debuginfo-1.20.1-150400.3.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Mon Jan 15 08:01:03 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:03 +0100 (CET) Subject: SUSE-IU-2024:18-1: Security update of suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 Message-ID: <20240115080103.9DB60FD1F@maintenance.suse.de> SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:18-1 Image Tags : suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container suse-sles-15-sp5-chost-byos-v20240111-x86_64-gen2 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-security-updates at lists.suse.com Mon Jan 15 08:01:06 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:06 +0100 (CET) Subject: SUSE-IU-2024:19-1: Security update of suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 Message-ID: <20240115080106.EA702FBA9@maintenance.suse.de> SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:19-1 Image Tags : suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container suse-sles-15-sp5-chost-byos-v20240111-hvm-ssd-x86_64 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - xen-tools-domU-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From sle-security-updates at lists.suse.com Mon Jan 15 08:01:12 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Mon, 15 Jan 2024 09:01:12 +0100 (CET) Subject: SUSE-IU-2024:20-1: Security update of sles-15-sp5-chost-byos-v20240111-arm64 Message-ID: <20240115080112.B90F0FBA4@maintenance.suse.de> SUSE Image Update Advisory: sles-15-sp5-chost-byos-v20240111-arm64 ----------------------------------------------------------------- Image Advisory ID : SUSE-IU-2024:20-1 Image Tags : sles-15-sp5-chost-byos-v20240111-arm64:20240111 Image Release : Severity : important Type : security References : 1029961 1158830 1170415 1170446 1178760 1201384 1206798 1209122 1210141 1212160 1213229 1213500 1214788 1215294 1215323 1215496 1216412 1216546 1216547 1216548 1216750 1216751 1216853 1216987 1217277 1217292 1217513 1217592 1217593 1217695 1217696 1217873 1217950 1217969 1218014 1218291 CVE-2020-12912 CVE-2020-8694 CVE-2020-8695 CVE-2023-38472 CVE-2023-39804 CVE-2023-48795 CVE-2023-49083 CVE-2023-50495 CVE-2023-5981 ----------------------------------------------------------------- The container sles-15-sp5-chost-byos-v20240111-arm64 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4843-1 Released: Thu Dec 14 12:22:44 2023 Summary: Security update for python3-cryptography Type: security Severity: moderate References: 1217592,CVE-2023-49083 This update for python3-cryptography fixes the following issues: - CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4886-1 Released: Mon Dec 18 09:38:37 2023 Summary: Recommended update for google-guest-agent, google-guest-oslogin Type: recommended Severity: moderate References: 1216546,1216547,1216548,1216750,1216751 This update for google-guest-agent, google-guest-oslogin fixes the following issues: - Update to version 20231031.01 (bsc#1216547, bsc#1216751) - Bump the golang compiler version to 1.21 (bsc#1216546) - Update to version 20231101.00 (bsc#1216548, bsc#1216750) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4901-1 Released: Tue Dec 19 11:25:47 2023 Summary: Security update for avahi Type: security Severity: moderate References: 1216853,CVE-2023-38472 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4902-1 Released: Tue Dec 19 13:09:42 2023 Summary: Security update for openssh Type: security Severity: important References: 1214788,1217950,CVE-2023-48795 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4936-1 Released: Wed Dec 20 17:18:21 2023 Summary: Security update for docker, rootlesskit Type: security Severity: important References: 1170415,1170446,1178760,1210141,1213229,1213500,1215323,1217513,CVE-2020-12912,CVE-2020-8694,CVE-2020-8695 This update for docker, rootlesskit fixes the following issues: docker: - Update to Docker 24.0.7-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2407>. bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Update to Docker 24.0.6-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323 - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141 - Update to Docker 24.0.5-ce. See upstream changelong online at https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229 This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180) rootlesskit: - new package, for docker rootless support. (jsc#PED-6180) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4962-1 Released: Fri Dec 22 13:45:06 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) This update also ships curl to the INSTALLER channel. ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4983-1 Released: Thu Dec 28 14:21:40 2023 Summary: Security update for gnutls Type: security Severity: moderate References: 1217277,CVE-2023-5981 This update for gnutls fixes the following issues: - CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:50-1 Released: Mon Jan 8 03:18:56 2024 Summary: Recommended update for python-instance-billing-flavor-check Type: recommended Severity: moderate References: 1217695,1217696 This update for python-instance-billing-flavor-check fixes the following issues: - Run the command as sudo only (bsc#1217696, bsc#1217695) - Handle exception for Python 3.4 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:68-1 Released: Tue Jan 9 15:26:08 2024 Summary: Recommended update for rsyslog Type: recommended Severity: moderate References: 1217292 This update for rsyslog fixes the following issues: - Restart daemon after modules packages have been updated (bsc#1217292) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:70-1 Released: Tue Jan 9 18:29:39 2024 Summary: Security update for tar Type: security Severity: low References: 1217969,CVE-2023-39804 This update for tar fixes the following issues: - CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:88-1 Released: Thu Jan 11 10:08:20 2024 Summary: Recommended update for libsolv, zypper, libzypp Type: recommended Severity: moderate References: 1212160,1215294,1216412,1217593,1217873,1218291 This update for libsolv, zypper, libzypp fixes the following issues: - Expand RepoVars in URLs downloading a .repo file (bsc#1212160) - Fix search/info commands ignoring --ignore-unknown (bsc#1217593) - CheckAccessDeleted: fix 'running in container' filter (bsc#1218291) - Open rpmdb just once during execution of %posttrans scripts (bsc#1216412) - Make sure reboot-needed is remembered until next boot (bsc#1217873) - Stop using boost version 1 timer library (bsc#1215294) - Updated to version 0.7.27 - Add zstd support for the installcheck tool - Add putinowndirpool cache to make file list handling in repo_write much faster - Do not use deprecated headerUnload with newer rpm versions - Support complex deps in SOLVABLE_PREREQ_IGNOREINST - Fix minimization not prefering installed packages in some cases - Reduce memory usage in repo_updateinfoxml - Fix lock-step interfering with architecture selection - Fix choice rule handing for package downgrades - Fix complex dependencies with an 'else' part sometimes leading to unsolved dependencies The following package changes have been done: - curl-8.0.1-150400.5.41.1 updated - docker-24.0.7_ce-150000.190.4 updated - google-guest-agent-20231031.01-150000.1.40.1 updated - google-guest-oslogin-20231101.00-150000.1.35.1 updated - libavahi-client3-0.8-150400.7.13.1 updated - libavahi-common3-0.8-150400.7.13.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-8.0.1-150400.5.41.1 updated - libgnutls30-3.7.3-150400.4.38.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150400.3.11.2 updated - libzypp-17.31.27-150400.3.49.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - openssh-clients-8.4p1-150300.3.27.1 updated - openssh-common-8.4p1-150300.3.27.1 updated - openssh-server-8.4p1-150300.3.27.1 updated - openssh-8.4p1-150300.3.27.1 updated - procps-3.3.17-150000.7.37.1 updated - python-instance-billing-flavor-check-0.0.4-150000.1.6.1 updated - python3-cryptography-3.3.2-150400.23.1 updated - python3-cssselect-1.0.3-150000.3.5.1 updated - rsyslog-module-relp-8.2306.0-150400.5.24.1 updated - rsyslog-8.2306.0-150400.5.24.1 updated - samba-client-libs-4.17.12+git.455.b299ac1e60-150500.3.20.1 updated - tar-1.34-150000.3.34.1 updated - terminfo-base-6.1-150000.5.20.1 updated - terminfo-6.1-150000.5.20.1 updated - xen-libs-4.17.3_02-150500.3.18.1 updated - zypper-1.14.68-150400.3.40.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From null at suse.de Mon Jan 15 16:30:07 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Jan 2024 16:30:07 -0000 Subject: SUSE-SU-2024:0103-1: low: Security update for rubygem-actionpack-5_1 Message-ID: <170533620711.16893.11631391376309194292@smelt2.prg2.suse.org> # Security update for rubygem-actionpack-5_1 Announcement ID: SUSE-SU-2024:0103-1 Rating: low References: * bsc#1172182 * bsc#1215707 Cross-References: * CVE-2020-8166 CVSS scores: * CVE-2020-8166 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2020-8166 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP1 * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for rubygem-actionpack-5_1 fixes the following issues: * CVE-2020-8166: Fixed ability to forge per-form CSRF tokens given a global CSRF (bsc#1172182). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-103=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP1 zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-103=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-103=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.29.1 * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.29.1 * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2020-8166.html * https://bugzilla.suse.com/show_bug.cgi?id=1172182 * https://bugzilla.suse.com/show_bug.cgi?id=1215707 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 15 20:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 15 Jan 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0106-1: important: Security update for postgresql, postgresql15, postgresql16 Message-ID: <170535060397.27839.13380596392714446221@smelt2.prg2.suse.org> # Security update for postgresql, postgresql15, postgresql16 Announcement ID: SUSE-SU-2024:0106-1 Rating: important References: * bsc#1122892 * bsc#1179231 * bsc#1206796 * bsc#1209208 * bsc#1216022 * bsc#1216734 * bsc#1216960 * bsc#1216961 * bsc#1216962 * jsc#PED-5586 Cross-References: * CVE-2023-5868 * CVE-2023-5869 * CVE-2023-5870 CVSS scores: * CVE-2023-5868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-5868 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-5869 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5869 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5870 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5870 ( NVD ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Legacy Module 15-SP4 * Legacy Module 15-SP5 * Server Applications Module 15-SP4 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 An update that solves three vulnerabilities, contains one feature and has six security fixes can now be installed. ## Description: This update for postgresql, postgresql15, postgresql16 fixes the following issues: This update ships postgresql 16. Security issues fixed: * CVE-2023-5868: Fix handling of unknown-type arguments in DISTINCT "any" aggregate functions. This error led to a text-type value being interpreted as an unknown-type value (that is, a zero-terminated string) at runtime. This could result in disclosure of server memory following the text value. (bsc#1216962) * CVE-2023-5869: Detect integer overflow while computing new array dimensions. When assigning new elements to array subscripts that are outside the current array bounds, an undetected integer overflow could occur in edge cases. Memory stomps that are potentially exploitable for arbitrary code execution are possible, and so is disclosure of server memory. (bsc#1216961) * CVE-2023-5870: Prevent the pg_signal_backend role from signalling background workers and autovacuum processes. The documentation says that pg_signal_backend cannot issue signals to superuser-owned processes. It was able to signal these background processes, though, because they advertise a role OID of zero. Treat that as indicating superuser ownership. The security implications of cancelling one of these process types are fairly small so far as the core code goes (we'll just start another one), but extensions might add background workers that are more vulnerable. Also ensure that the is_superuser parameter is set correctly in such processes. No specific security consequences are known for that oversight, but it might be significant for some extensions. (bsc#1216960) Changes in postgresql16: * Upgrade to 16.1: * https://www.postgresql.org/about/news/2715 * https://www.postgresql.org/docs/16/release-16.html * https://www.postgresql.org/docs/16/release-16-1.html * Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package. * Change the unix domain socket location from /var/run to /run. Changes in postgresql15: * Update to 15.5 https://www.postgresql.org/docs/15/release-15-5.html * The libs and mini package are now provided by postgresql16. * Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package. * Change the unix domain socket location from /var/run to /run. Changes in postgresql: * Interlock version and release of all noarch packages except for the postgresql-docs. * bsc#1122892: Add a sysconfig variable for initdb. * Overhaul postgresql-README.SUSE and move it from the binary package to the noarch wrapper package. * bsc#1179231: Add an explanation for the /tmp -> /run/postgresql move and permission change. * Add postgresql-README as a separate source file. * bsc#1209208: Drop hard dependency on systemd * bsc#1206796: Refine the distinction of where to use sysusers and use bcond to have the expression only in one place. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2024-106=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-106=1 * Legacy Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2024-106=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-106=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-106=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2024-106=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-106=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-106=1 ## Package List: * Basesystem Module 15-SP4 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-debugsource-15.5-150200.5.19.1 * libpq5-16.1-150200.5.7.1 * libpq5-32bit-debuginfo-16.1-150200.5.7.1 * postgresql16-16.1-150200.5.7.1 * libpq5-32bit-16.1-150200.5.7.1 * libpq5-debuginfo-16.1-150200.5.7.1 * postgresql15-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * Basesystem Module 15-SP4 (noarch) * postgresql-16-150400.4.9.2 * Basesystem Module 15-SP5 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-debugsource-15.5-150200.5.19.1 * libpq5-16.1-150200.5.7.1 * libpq5-32bit-debuginfo-16.1-150200.5.7.1 * postgresql16-16.1-150200.5.7.1 * libpq5-32bit-16.1-150200.5.7.1 * libpq5-debuginfo-16.1-150200.5.7.1 * postgresql15-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * Basesystem Module 15-SP5 (noarch) * postgresql-16-150500.10.3.2 * Legacy Module 15-SP4 (noarch) * postgresql-llvmjit-16-150400.4.9.2 * postgresql-llvmjit-devel-16-150400.4.9.2 * Legacy Module 15-SP5 (noarch) * postgresql-llvmjit-devel-16-150500.10.3.2 * postgresql-llvmjit-16-150500.10.3.2 * SUSE Package Hub 15 15-SP4 (noarch) * postgresql-16-150400.4.9.2 * postgresql-docs-16-150400.4.9.2 * postgresql-pltcl-16-150400.4.9.2 * postgresql-plperl-16-150400.4.9.2 * postgresql-plpython-16-150400.4.9.2 * postgresql-server-16-150400.4.9.2 * postgresql-test-16-150400.4.9.2 * postgresql-llvmjit-devel-16-150400.4.9.2 * postgresql-llvmjit-16-150400.4.9.2 * postgresql-contrib-16-150400.4.9.2 * postgresql-devel-16-150400.4.9.2 * postgresql-server-devel-16-150400.4.9.2 * SUSE Package Hub 15 15-SP4 (x86_64) * postgresql15-llvmjit-debuginfo-15.5-150200.5.19.1 * postgresql16-llvmjit-debuginfo-16.1-150200.5.7.1 * postgresql16-llvmjit-16.1-150200.5.7.1 * postgresql15-llvmjit-15.5-150200.5.19.1 * postgresql15-llvmjit-devel-15.5-150200.5.19.1 * postgresql16-llvmjit-devel-16.1-150200.5.7.1 * postgresql16-test-16.1-150200.5.7.1 * postgresql15-test-15.5-150200.5.19.1 * Server Applications Module 15-SP4 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-devel-15.5-150200.5.19.1 * postgresql15-pltcl-debuginfo-15.5-150200.5.19.1 * postgresql15-debugsource-15.5-150200.5.19.1 * postgresql16-plpython-debuginfo-16.1-150200.5.7.1 * postgresql16-pltcl-16.1-150200.5.7.1 * postgresql16-devel-16.1-150200.5.7.1 * postgresql16-pltcl-debuginfo-16.1-150200.5.7.1 * postgresql16-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-devel-debuginfo-15.5-150200.5.19.1 * libecpg6-debuginfo-16.1-150200.5.7.1 * postgresql16-plperl-16.1-150200.5.7.1 * postgresql16-contrib-debuginfo-16.1-150200.5.7.1 * postgresql16-server-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-contrib-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * postgresql16-plpython-16.1-150200.5.7.1 * postgresql16-server-16.1-150200.5.7.1 * postgresql16-server-devel-16.1-150200.5.7.1 * postgresql15-plpython-debuginfo-15.5-150200.5.19.1 * libecpg6-16.1-150200.5.7.1 * postgresql15-contrib-debuginfo-15.5-150200.5.19.1 * postgresql15-server-debuginfo-15.5-150200.5.19.1 * postgresql16-contrib-16.1-150200.5.7.1 * postgresql15-plperl-debuginfo-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-plperl-debuginfo-16.1-150200.5.7.1 * postgresql16-server-debuginfo-16.1-150200.5.7.1 * postgresql15-plpython-15.5-150200.5.19.1 * postgresql15-server-devel-15.5-150200.5.19.1 * postgresql15-server-devel-debuginfo-15.5-150200.5.19.1 * postgresql15-pltcl-15.5-150200.5.19.1 * postgresql15-plperl-15.5-150200.5.19.1 * postgresql15-server-15.5-150200.5.19.1 * Server Applications Module 15-SP4 (noarch) * postgresql-docs-16-150400.4.9.2 * postgresql-pltcl-16-150400.4.9.2 * postgresql-plperl-16-150400.4.9.2 * postgresql15-docs-15.5-150200.5.19.1 * postgresql16-docs-16.1-150200.5.7.1 * postgresql-plpython-16-150400.4.9.2 * postgresql-server-16-150400.4.9.2 * postgresql-contrib-16-150400.4.9.2 * postgresql-devel-16-150400.4.9.2 * postgresql-server-devel-16-150400.4.9.2 * Server Applications Module 15-SP5 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-devel-15.5-150200.5.19.1 * postgresql15-pltcl-debuginfo-15.5-150200.5.19.1 * postgresql15-debugsource-15.5-150200.5.19.1 * postgresql16-plpython-debuginfo-16.1-150200.5.7.1 * postgresql16-pltcl-16.1-150200.5.7.1 * postgresql16-devel-16.1-150200.5.7.1 * postgresql16-pltcl-debuginfo-16.1-150200.5.7.1 * postgresql16-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-devel-debuginfo-15.5-150200.5.19.1 * libecpg6-debuginfo-16.1-150200.5.7.1 * postgresql16-plperl-16.1-150200.5.7.1 * postgresql16-contrib-debuginfo-16.1-150200.5.7.1 * postgresql16-server-devel-debuginfo-16.1-150200.5.7.1 * postgresql15-contrib-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * postgresql16-plpython-16.1-150200.5.7.1 * postgresql16-server-16.1-150200.5.7.1 * postgresql16-server-devel-16.1-150200.5.7.1 * postgresql15-plpython-debuginfo-15.5-150200.5.19.1 * libecpg6-16.1-150200.5.7.1 * postgresql15-contrib-debuginfo-15.5-150200.5.19.1 * postgresql15-server-debuginfo-15.5-150200.5.19.1 * postgresql16-contrib-16.1-150200.5.7.1 * postgresql15-plperl-debuginfo-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * postgresql16-plperl-debuginfo-16.1-150200.5.7.1 * postgresql16-server-debuginfo-16.1-150200.5.7.1 * postgresql15-plpython-15.5-150200.5.19.1 * postgresql15-server-devel-15.5-150200.5.19.1 * postgresql15-server-devel-debuginfo-15.5-150200.5.19.1 * postgresql15-pltcl-15.5-150200.5.19.1 * postgresql15-plperl-15.5-150200.5.19.1 * postgresql15-server-15.5-150200.5.19.1 * Server Applications Module 15-SP5 (noarch) * postgresql-contrib-16-150500.10.3.2 * postgresql-pltcl-16-150500.10.3.2 * postgresql15-docs-15.5-150200.5.19.1 * postgresql16-docs-16.1-150200.5.7.1 * postgresql-docs-16-150500.10.3.2 * postgresql-server-devel-16-150500.10.3.2 * postgresql-server-16-150500.10.3.2 * postgresql-plpython-16-150500.10.3.2 * postgresql-plperl-16-150500.10.3.2 * postgresql-devel-16-150500.10.3.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * postgresql16-debugsource-16.1-150200.5.7.1 * postgresql15-devel-15.5-150200.5.19.1 * postgresql15-pltcl-debuginfo-15.5-150200.5.19.1 * postgresql15-debugsource-15.5-150200.5.19.1 * postgresql15-devel-debuginfo-15.5-150200.5.19.1 * libecpg6-debuginfo-16.1-150200.5.7.1 * postgresql15-contrib-15.5-150200.5.19.1 * postgresql16-debuginfo-16.1-150200.5.7.1 * postgresql15-plpython-debuginfo-15.5-150200.5.19.1 * libecpg6-16.1-150200.5.7.1 * postgresql15-contrib-debuginfo-15.5-150200.5.19.1 * libpq5-16.1-150200.5.7.1 * postgresql15-server-debuginfo-15.5-150200.5.19.1 * postgresql15-plperl-debuginfo-15.5-150200.5.19.1 * postgresql15-debuginfo-15.5-150200.5.19.1 * libpq5-debuginfo-16.1-150200.5.7.1 * postgresql15-15.5-150200.5.19.1 * postgresql15-plpython-15.5-150200.5.19.1 * postgresql15-server-devel-15.5-150200.5.19.1 * postgresql15-server-devel-debuginfo-15.5-150200.5.19.1 * postgresql15-pltcl-15.5-150200.5.19.1 * postgresql15-plperl-15.5-150200.5.19.1 * postgresql15-server-15.5-150200.5.19.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql-contrib-16-150300.10.18.3 * postgresql-plpython-16-150300.10.18.3 * postgresql-server-16-150300.10.18.3 * postgresql-docs-16-150300.10.18.3 * postgresql-plperl-16-150300.10.18.3 * postgresql15-docs-15.5-150200.5.19.1 * postgresql-pltcl-16-150300.10.18.3 * postgresql-server-devel-16-150300.10.18.3 * postgresql-16-150300.10.18.3 * postgresql-devel-16-150300.10.18.3 ## References: * https://www.suse.com/security/cve/CVE-2023-5868.html * https://www.suse.com/security/cve/CVE-2023-5869.html * https://www.suse.com/security/cve/CVE-2023-5870.html * https://bugzilla.suse.com/show_bug.cgi?id=1122892 * https://bugzilla.suse.com/show_bug.cgi?id=1179231 * https://bugzilla.suse.com/show_bug.cgi?id=1206796 * https://bugzilla.suse.com/show_bug.cgi?id=1209208 * https://bugzilla.suse.com/show_bug.cgi?id=1216022 * https://bugzilla.suse.com/show_bug.cgi?id=1216734 * https://bugzilla.suse.com/show_bug.cgi?id=1216960 * https://bugzilla.suse.com/show_bug.cgi?id=1216961 * https://bugzilla.suse.com/show_bug.cgi?id=1216962 * https://jira.suse.com/browse/PED-5586 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:11 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Jan 2024 16:30:11 -0000 Subject: SUSE-SU-2024:0129-1: important: Security update for the Linux Kernel Message-ID: <170542261165.7395.10326300333459142431@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0129-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1193285 * bsc#1211162 * bsc#1211226 * bsc#1212584 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218139 * bsc#1218184 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218447 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218659 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7322 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Real Time Module 15-SP4 An update that solves 10 vulnerabilities, contains three features and has 31 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). The following non-security bugs were fixed: * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Build in the correct KOTD repository with multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184) With multibuild setting repository flags is no longer supported for individual spec files - see https://github.com/openSUSE/open-build-service/issues/3574 Add ExclusiveArch conditional that depends on a macro set up by bs-upload-kernel instead. With that each package should build only in one repository - either standard or QA. Note: bs-upload-kernel does not interpret rpm conditionals, and only uses the first ExclusiveArch line to determine the architectures to enable. * KVM: s390/mm: Properly reset no-dat (bsc#1218056). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * NFS: Fix O_DIRECT locking issues (bsc#1211162). * NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * NFS: Fix a potential data corruption (bsc#1211162). * NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162). * NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * Updated SPI patches for NVIDIA Grace enablement (bsc#1212584, jsc#PED-3459). * block: fix revalidate performance regression (bsc#1216057). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * libceph: use kernel_connect() (bsc#1217981). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * s390/vx: fix save/restore of fpu kernel context (bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP4 zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2024-129=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-129=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-129=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-129=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-129=1 ## Package List: * SUSE Real Time Module 15-SP4 (x86_64) * kernel-rt-devel-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt_debug-debuginfo-5.14.21-150400.15.65.1 * gfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt_debug-devel-5.14.21-150400.15.65.1 * cluster-md-kmp-rt-5.14.21-150400.15.65.1 * dlm-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-devel-5.14.21-150400.15.65.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-syms-rt-5.14.21-150400.15.65.1 * ocfs2-kmp-rt-5.14.21-150400.15.65.1 * dlm-kmp-rt-5.14.21-150400.15.65.1 * kernel-rt_debug-debugsource-5.14.21-150400.15.65.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * gfs2-kmp-rt-5.14.21-150400.15.65.1 * SUSE Real Time Module 15-SP4 (noarch) * kernel-devel-rt-5.14.21-150400.15.65.1 * kernel-source-rt-5.14.21-150400.15.65.1 * SUSE Real Time Module 15-SP4 (nosrc x86_64) * kernel-rt_debug-5.14.21-150400.15.65.1 * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * openSUSE Leap Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.65.1 * kernel-rt-debugsource-5.14.21-150400.15.65.1 * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-SLE15-SP4-RT_Update_17-debugsource-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_65-rt-debuginfo-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_65-rt-1-150400.1.3.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Jan 2024 16:30:15 -0000 Subject: SUSE-SU-2024:0120-1: important: Security update for the Linux Kernel Message-ID: <170542261531.7395.12601661928576339959@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0120-1 Rating: important References: * bsc#1179610 * bsc#1202095 * bsc#1215237 * bsc#1217250 * bsc#1217946 * bsc#1217947 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Availability Extension 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Manager Proxy 4.0 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Server 4.0 An update that solves eight vulnerabilities, contains one feature and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out-of-bounds read vulnerability in smbCalcSize in fs/smb/client/netmisc.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217947). * CVE-2023-6610: Fixed an out-of-bounds read vulnerability in smb2_dump_detail in fs/smb/client/smb2ops.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217946). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-120=1 * SUSE Linux Enterprise High Availability Extension 15 SP1 zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2024-120=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-120=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-120=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-120=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise Live Patching 15-SP1 (nosrc) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_168-default-1-150100.3.3.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * kernel-default-livepatch-4.12.14-150100.197.168.1 * kernel-default-livepatch-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * cluster-md-kmp-default-debuginfo-4.12.14-150100.197.168.1 * cluster-md-kmp-default-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * ocfs2-kmp-default-4.12.14-150100.197.168.1 * dlm-kmp-default-debuginfo-4.12.14-150100.197.168.1 * gfs2-kmp-default-4.12.14-150100.197.168.1 * gfs2-kmp-default-debuginfo-4.12.14-150100.197.168.1 * ocfs2-kmp-default-debuginfo-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Availability Extension 15 SP1 (nosrc) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 nosrc x86_64) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * reiserfs-kmp-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * reiserfs-kmp-default-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x) * kernel-zfcpdump-debuginfo-4.12.14-150100.197.168.1 * kernel-zfcpdump-debugsource-4.12.14-150100.197.168.1 * kernel-default-man-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (nosrc) * kernel-zfcpdump-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (nosrc ppc64le x86_64) * kernel-default-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * reiserfs-kmp-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * reiserfs-kmp-default-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (nosrc x86_64) * kernel-default-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (x86_64) * kernel-obs-build-4.12.14-150100.197.168.1 * kernel-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-debuginfo-4.12.14-150100.197.168.1 * kernel-default-debugsource-4.12.14-150100.197.168.1 * reiserfs-kmp-default-debuginfo-4.12.14-150100.197.168.1 * kernel-default-devel-4.12.14-150100.197.168.1 * reiserfs-kmp-default-4.12.14-150100.197.168.1 * kernel-default-base-4.12.14-150100.197.168.1 * kernel-default-base-debuginfo-4.12.14-150100.197.168.1 * kernel-obs-build-debugsource-4.12.14-150100.197.168.1 * kernel-syms-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (noarch) * kernel-source-4.12.14-150100.197.168.1 * kernel-macros-4.12.14-150100.197.168.1 * kernel-devel-4.12.14-150100.197.168.1 * SUSE CaaS Platform 4.0 (noarch nosrc) * kernel-docs-4.12.14-150100.197.168.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:20 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Jan 2024 16:30:20 -0000 Subject: SUSE-SU-2024:0117-1: important: Security update for the Linux Kernel Message-ID: <170542262069.7395.6741326494705040019@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0117-1 Rating: important References: * bsc#1109837 * bsc#1179610 * bsc#1202095 * bsc#1211226 * bsc#1211439 * bsc#1214158 * bsc#1214479 * bsc#1215237 * bsc#1217036 * bsc#1217250 * bsc#1217801 * bsc#1217936 * bsc#1217946 * bsc#1217947 * bsc#1218057 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218362 * bsc#1218559 * bsc#1218622 * jsc#PED-5021 * jsc#PED-5023 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves eight vulnerabilities, contains two features and has 13 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1214158 bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free issue due to a race condition during Bluetooth message reception (bsc#1218559). The following non-security bugs were fixed: * Enabled the LLC counters for ?perf? (perf stat) on the Ice-Lake and Rocket- Lake CPUs (jsc#PED-5023 bsc#1211439). * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * Fix termination state for idr_for_each_entry_ul() (bsc#1109837). * KVM: s390/mm: Properly reset no-dat (bsc#1218057). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217936). * PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622). * gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). * gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). * gve: Changes to add new TX queues (bsc#1214479). * gve: Control path for DQO-QPL (bsc#1214479). * gve: Do not fully free QPL pages on prefill errors (bsc#1214479). * gve: Fix gve interrupt names (bsc#1214479). * gve: Fixes for napi_poll when budget is 0 (bsc#1214479). * gve: RX path for DQO-QPL (bsc#1214479). * gve: Set default duplex configuration to full (bsc#1214479). * gve: Tx path for DQO-QPL (bsc#1214479). * gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). * gve: XDP support GQI-QPL: helper function changes (bsc#1214479). * gve: fix frag_list chaining (bsc#1214479). * gve: trivial spell fix Recive to Receive (bsc#1214479). * gve: unify driver name usage (bsc#1214479). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801). * s390/vx: fix save/restore of fpu kernel context (bsc#1218362). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-117=1 SUSE-SLE- SERVER-12-SP5-2024-117=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-117=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-117=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-117=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-117=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-117=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-117=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * cluster-md-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.189.1 * kernel-default-debugsource-4.12.14-122.189.1 * kernel-syms-4.12.14-122.189.1 * kernel-default-base-debuginfo-4.12.14-122.189.1 * gfs2-kmp-default-4.12.14-122.189.1 * dlm-kmp-default-4.12.14-122.189.1 * gfs2-kmp-default-debuginfo-4.12.14-122.189.1 * kernel-default-devel-4.12.14-122.189.1 * dlm-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-4.12.14-122.189.1 * kernel-default-base-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * cluster-md-kmp-default-4.12.14-122.189.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-devel-4.12.14-122.189.1 * kernel-source-4.12.14-122.189.1 * kernel-macros-4.12.14-122.189.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.189.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.189.1 * kernel-default-debugsource-4.12.14-122.189.1 * gfs2-kmp-default-4.12.14-122.189.1 * dlm-kmp-default-4.12.14-122.189.1 * gfs2-kmp-default-debuginfo-4.12.14-122.189.1 * dlm-kmp-default-debuginfo-4.12.14-122.189.1 * ocfs2-kmp-default-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * cluster-md-kmp-default-4.12.14-122.189.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-kgraft-devel-4.12.14-122.189.1 * kgraft-patch-4_12_14-122_189-default-1-8.3.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-default-kgraft-4.12.14-122.189.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) * kernel-docs-4.12.14-122.189.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-4.12.14-122.189.1 * kernel-obs-build-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-base-debuginfo-4.12.14-122.189.1 * kernel-default-devel-4.12.14-122.189.1 * kernel-default-base-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-syms-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-devel-4.12.14-122.189.1 * kernel-source-4.12.14-122.189.1 * kernel-macros-4.12.14-122.189.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-base-debuginfo-4.12.14-122.189.1 * kernel-default-devel-4.12.14-122.189.1 * kernel-default-base-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-syms-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-devel-4.12.14-122.189.1 * kernel-source-4.12.14-122.189.1 * kernel-macros-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * kernel-default-man-4.12.14-122.189.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.189.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) * kernel-default-4.12.14-122.189.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * kernel-default-extra-4.12.14-122.189.1 * kernel-default-debuginfo-4.12.14-122.189.1 * kernel-default-debugsource-4.12.14-122.189.1 * kernel-default-extra-debuginfo-4.12.14-122.189.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1109837 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1211439 * https://bugzilla.suse.com/show_bug.cgi?id=1214158 * https://bugzilla.suse.com/show_bug.cgi?id=1214479 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217936 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218057 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218362 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218622 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-5023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 16 16:30:31 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 16 Jan 2024 16:30:31 -0000 Subject: SUSE-SU-2024:0115-1: important: Security update for the Linux Kernel Message-ID: <170542263173.7395.8585689332773030877@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0115-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1211162 * bsc#1211226 * bsc#1212139 * bsc#1212584 * bsc#1214117 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1215952 * bsc#1216032 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217822 * bsc#1217927 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218092 * bsc#1218139 * bsc#1218184 * bsc#1218229 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218397 * bsc#1218447 * bsc#1218461 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218643 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7167 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that solves 10 vulnerabilities, contains three features and has 40 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). The following non-security bugs were fixed: * Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167). * Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167). * Documentation: KVM: update msr.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167). * Documentation: drop more IDE boot options and ide-cd.rst (git-fixes). * Documentation: qat: Use code block for qat sysfs example (git-fixes). * Drop Documentation/ide/ (git-fixes). * Fix crash on screen resize (bsc#1218229) * Fix drm gem object underflow (bsc#1218092) * KVM: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167). * KVM: s390/mm: Properly reset no-dat (git-fixes bsc#1218056). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933). * Revert "PCI/ASPM: Remove pcie_aspm_pm_state_change()" (git-fixes). * Revert "PCI: acpiphp: Reassign resources on bridge if necessary" (git- fixes). * Revert "md: unlock mddev before reap sync_thread in action_store" (git- fixes). * Revert "swiotlb: panic if nslabs is too small" (git-fixes). * Revert "xhci: Loosen RPM as default policy to cover for AMD xHC 1.1" (git- fixes). * USB: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes). * USB: serial: option: add Foxconn T99W265 with new baseline (git-fixes). * USB: serial: option: add Quectel EG912Y module support (git-fixes). * USB: serial: option: add Quectel RM500Q R13 firmware support (git-fixes). * Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces * acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git- fixes). * acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes). * acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes). * afs: Fix afs_server_list to be cleaned up with RCU (git-fixes). * afs: Fix dynamic root lookup DNS check (git-fixes). * afs: Fix file locking on R/O volumes to operate in local mode (git-fixes). * afs: Fix overwriting of result of DNS query (git-fixes). * afs: Fix refcount underflow from error handling race (git-fixes). * afs: Fix the dynamic root's d_delete to always delete unused dentries (git- fixes). * afs: Fix use-after-free due to get/remove race in volume tree (git-fixes). * afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes). * afs: Return ENOENT if no cell DNS record can be found (git-fixes). * alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes). * alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes). * alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git- fixes). * alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes). * alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes). * alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes). * alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes). * alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes). * alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git- fixes). * alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes). * alsa: hda/realtek: add new Framework laptop to quirks (git-fixes). * alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes). * alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes). * alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes). * alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes). * alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes). * alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes). * alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes). * apparmor: Free up __cleanup() name (jsc#PED-7167). * arm64: dts: arm: add missing cache properties (git-fixes) * arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes) * arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167). * arm64: mm: Fix "rodata=on" when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git- fixes) * arm: oMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes). * arm: pL011: Fix DMA support (git-fixes). * asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes). * asoc: hdmi-codec: fix missing report for jack initial status (git-fixes). * asoc: meson: g12a-toacodec: Fix event generation (git-fixes). * asoc: meson: g12a-toacodec: Validate written enum values (git-fixes). * asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes). * asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes). * asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes). * bitmap: unify find_bit operations (jsc#PED-7167). * block: fix revalidate performance regression (bsc#1216057). * bluetooth: Fix deadlock in vhci_send_frame (git-fixes). * bluetooth: L2CAP: Send reject on command corrupted request (git-fixes). * bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git- fixes). * bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461). * bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git- fixes). * bluetooth: hci_event: shut up a false-positive warning (git-fixes). * bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * bnxt: do not handle XDP in netpoll (jsc#PED-1495). * bnxt_en: Clear resource reservation during resume (jsc#PED-1495). * bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495). * bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495). * bnxt_en: Fix page pool logic for page size >= 64K (jsc#PED-1495). * bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495). * bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes). * bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * cleanup: Make no_free_ptr() __must_check (jsc#PED-7167). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167). * crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167). * crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167). * crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167). * crypto: ccp - Add a quirk to firmware update (jsc#PED-7167). * crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167). * crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167). * crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167). * crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167). * crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167). * crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167). * crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167). * crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167). * crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167). * crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167). * crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167). * crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167). * crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167). * crypto: ccp - remove unneeded semicolon (jsc#PED-7167). * crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167). * dm verity: initialize fec io before freeing it (git-fixes). * dm-verity: do not use blocking calls from tasklets (git-fixes). * dm: add cond_resched() to dm_wq_requeue_work() (git-fixes). * dm: do not attempt to queue IO under RCU protection (git-fixes). * dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952). * dm: fix improper splitting for abnormal bios (bsc#1215952). * dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes). * drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139). * drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes). * drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes). * drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes). * drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes). * drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes). * drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes). * drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes). * drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes). * drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git- fixes). * drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes). * drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes). * drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes). * drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes). * drm/bridge: parade-ps8640: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes). * drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes). * drm/bridge: ti-sn65dsi86: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes). * drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes). * drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes). * drm/i915/lvds: Use REG_BIT() & co (git-fixes). * drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 (git-fixes). * drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git- fixes). * drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes). * drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes). * drm/i915: Reject async flips with bigjoiner (git-fixes). * drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes). * drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167). * drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git- fixes). * drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git- fixes). * efi/libstub: Implement support for unaccepted memory (jsc#PED-7167). * efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167). * efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167). * efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167). * efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167). * efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167). * efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167). * efi: Add unaccepted memory support (jsc#PED-7167). * efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167). * efi: libstub: install boot-time memory map as config table (jsc#PED-7167). * efi: libstub: remove DT dependency from generic stub (jsc#PED-7167). * efi: libstub: remove pointless goto kludge (jsc#PED-7167). * efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167). * efi: libstub: unify initrd loading between architectures (jsc#PED-7167). * floppy: fix MAX_ORDER usage (jsc#PED-7167). * fprobe: Fix to ensure the number of active retprobes is not zero (git- fixes). * fs/jfs: Add check for negative db_l2nbperpage (git-fixes). * fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes). * fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git- fixes). * fs/remap: constrain dedupe of EOF blocks (git-fixes). * fs: avoid empty option when generating legacy mount string (git-fixes). * fs: fix an infinite loop in iomap_fiemap (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * genwqe: fix MAX_ORDER usage (jsc#PED-7167). * gfs2: Add wrapper for iomap_file_buffered_write (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Clean up function may_grant (git-fixes). * gfs2: Fix filesystem block deallocation for short writes (git-fixes). * gfs2: Fix gfs2_release for non-writers regression (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix length of holes reported at end-of-file (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Improve gfs2_make_fs_rw error handling (git-fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Silence "suspicious RCU usage in gfs2_permission" warning (git-fixes). * gfs2: Switch from strlcpy to strscpy (git-fixes). * gfs2: fix an oops in gfs2_permission (git-fixes). * gfs2: gfs2_setattr_size error path fix (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: jdata writepage fix (git-fixes). * gfs2: use i_lock spin_lock for inode qadata (git-fixes). * gpiolib: sysfs: Fix error handling on failed export (git-fixes). * gve: Fixes for napi_poll when budget is 0 (git-fixes). * gve: Use size_add() in call to struct_size() (git-fixes). * hid: add ALWAYS_POLL quirk for Apple kb (git-fixes). * hid: glorious: fix Glorious Model I HID report (git-fixes). * hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes). * hid: hid-asus: reset the backlight brightness level on resume (git-fixes). * hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git- fixes). * hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes). * hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes). * hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git- fixes). * i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes). * i2c: core: Fix atomic xfer check for non-preempt config (git-fixes). * i2c: designware: Fix corrupted memory seen in the ISR (git-fixes). * i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372). * i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372). * i40e: Fix unexpected MFS warning message (jsc#PED-372). * i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372). * i40e: fix misleading debug logs (jsc#PED-372). * i40e: fix potential NULL pointer dereferencing of pf->vf i40e_sync_vsi_filters() (jsc#PED-372). * i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372). * i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372). * ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes) * ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes) * igb: Avoid starting unnecessary workqueues (jsc#PED-370). * igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370). * igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370). * igb: disable virtualization features on 82580 (jsc#PED-370). * igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375). * igc: Expose tx-usecs coalesce setting to user (jsc#PED-375). * igc: Fix ambiguity in the ethtool advertising (jsc#PED-375). * igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375). * igc: Fix the typo in the PTM Control macro (jsc#PED-375). * iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git- fixes). * iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes). * iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes). * iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes). * input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes). * input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes). * input: soc_button_array - add mapping for airplane mode button (git-fixes). * input: xpad - add HyperX Clutch Gladiate Support (git-fixes). * interconnect: Treat xlate() returning NULL node as an error (git-fixes). * iomap: Fix iomap_dio_rw return value for user copies (git-fixes). * iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167). * iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git- fixes). * jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes). * jfs: fix array-index-out-of-bounds in diAlloc (git-fixes). * jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount (git-fixes). * jfs: validate max amount of blocks before allocation (git-fixes). * kABI: Preserve the type of rethook::handler (git-fixes). * kABI: restore void return to typec_altmode_attention (git-fixes). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167) * kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167). * kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167). * kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167). * kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167). * kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167). * kconfig: fix memory leak from range properties (git-fixes). * kernel-source: Remove config-options.changes (jsc#PED-5021) * kprobes: consistent rcu api usage for kretprobe holder (git-fixes). * lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes). * libceph: use kernel_connect() (bsc#1217981). * locking: Introduce __cleanup() based infrastructure (jsc#PED-7167). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes). * md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes). * md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes). * md/md-bitmap: remove unnecessary local variable in backlog_store() (git- fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes). * md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes). * md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes). * md/raid10: fix io loss while replacement replace rdev (git-fixes). * md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes). * md/raid10: fix memleak for 'conf->bio_split' (git-fixes). * md/raid10: fix memleak of md thread (git-fixes). * md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes). * md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git- fixes). * md/raid10: fix overflow of md/safe_mode_delay (git-fixes). * md/raid10: fix task hung in raid10d (git-fixes). * md/raid10: fix the condition to call bio_end_io_acct() (git-fixes). * md/raid10: fix wrong setting of max_corr_read_errors (git-fixes). * md/raid10: prevent soft lockup while flush writes (git-fixes). * md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes). * md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git- fixes). * md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git- fixes). * md: Put the right device in md_seq_next (bsc#1217822). * md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes). * md: avoid signed overflow in slot_store() (git-fixes). * md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes). * md: drop queue limitation for RAID1 and RAID10 (git-fixes). * md: raid0: account for split bio in iostat accounting (git-fixes). * md: raid10 add nowait support (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * md: select BLOCK_LEGACY_AUTOLOAD (git-fixes). * memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167). * memblock: make memblock_find_in_range method private (jsc#PED-7167). * misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes). * misc: mei: client.c: return negative error code in mei_cl_write (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167). * mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167). * mm/slab: Add __free() support for kvfree (jsc#PED-7167). * mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167). * mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167). * mm: Add support for unaccepted memory (jsc#PED-7167). * mm: add pageblock_align() macro (jsc#PED-7167). * mm: add pageblock_aligned() macro (jsc#PED-7167). * mm: avoid passing 0 to __ffs() (jsc#PED-7167). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * mm: move kvmalloc-related functions to slab.h (jsc#PED-7167). * mm: new primitive kvmemdup() (jsc#PED-7167). * mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167). * mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes). * mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes). * mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes). * neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes). * net/rose: Fix Use-After-Free in rose_ioctl (git-fixes). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495). * net: ena: Destroy correct number of xdp queues upon failure (git-fixes). * net: ena: Fix XDP redirection error (git-fixes). * net: ena: Fix xdp drops handling due to multibuf packets (git-fixes). * net: ena: Flush XDP packets on error (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net: rfkill: gpio: set GPIO direction (git-fixes). * net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes). * net: usb: ax88179_178a: clean up pm calls (git-fixes). * net: usb: ax88179_178a: wol optimizations (git-fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local (git-fixes). * nfs: Fix O_DIRECT locking issues (bsc#1211162). * nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * nfs: Fix a potential data corruption (bsc#1211162). * nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162). * nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * nilfs2: fix missing error check for sb_set_blocksize call (git-fixes). * nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes). * nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * null_blk: fix poll request timeout handling (git-fixes). * nvme-core: check for too small lba shift (bsc#1214117). * nvme-pci: Add sleep quirk for Kingston drives (git-fixes). * nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes). * nvme-pci: do not set the NUMA node of device if it has none (git-fixes). * nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes). * nvme-rdma: do not try to stop unallocated queues (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * nvmet-auth: complete a request only after freeing the dhchap pointers (git- fixes). * of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes). * padata: Fix refcnt handling in padata_free_shell() (git-fixes). * parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes). * pci: loongson: Limit MRRS to 256 (git-fixes). * perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167). * pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes). * platform/surface: aggregator: fix recv_buf() return value (git-fixes). * platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes). * platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git- fixes). * platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git- fixes). * platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes). * platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes). * platform/x86: wmi: Skip blocks with zero instances (git-fixes). * powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523). * qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526). * qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526). * qed: fix LL2 RX buffer allocation (jsc#PED-1526). * qede: fix firmware halt over suspend and resume (jsc#PED-1526). * qla2xxx: add debug log for deprecated hw detected (bsc#1216032). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8169: Fix PCI error on system resume (git-fixes). * rdma/bnxt_re: Correct module description string (jsc#PED-1495). * rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes) * rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes) * rdma/hfi1: Workaround truncation compilation error (git-fixes) * rdma/hns: Add check for SL (git-fixes) * rdma/hns: Fix printing level of asynchronous events (git-fixes) * rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes) * rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes) * rdma/hns: The UD mode can only be configured with DCQCN (git-fixes) * regmap: fix bogus error on regcache_sync success (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * reset: Fix crash when freeing non-existent optional resets (git-fixes). * restore renamed device IDs for USB HID devices (git-fixes). * rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes). * rethook: Use __rcu pointer for rethook::handler (git-fixes). * ring-buffer: Do not try to put back write_stamp (git-fixes). * ring-buffer: Do not update before stamp when switching sub-buffers (git- fixes). * ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * ring-buffer: Fix slowpath of interrupted event (git-fixes). * ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes). * ring-buffer: Fix writing to the buffer with max_data_size (git-fixes). * ring-buffer: Force absolute timestamp on discard of event (git-fixes). * ring-buffer: Have saved event hold the entire event (git-fixes). * ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes). * serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes). * serial: sc16is7xx: address RX timeout interrupt errata (git-fixes). * soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes). * spi: atmel: Fix clock issue when using devices with different polarities (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167) * swiotlb: always set the number of areas before allocating the pool (git- fixes). * swiotlb: do not panic! (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix debugfs reporting of reserved memory pools (git-fixes). * swiotlb: fix slot alignment checks (bsc#1216559). * swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes). * swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes). * swiotlb: reduce the number of areas to match actual memory pool size (git- fixes). * swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes). * swiotlb: use the calculated number of areas (git-fixes). * tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes). * tracing/kprobes: Fix the description of variable length arguments (git- fixes). * tracing/kprobes: Fix the order of argument descriptions (git-fixes). * tracing/perf: Add interrupt_context_level() helper (git-fixes). * tracing/synthetic: fix kernel-doc warnings (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Have the user copy of synthetic event address use correct context (git-fixes). * tracing: Reuse logic from perf's get_recursion_context() (git-fixes). * tracing: Set actual size after ring buffer resize (git-fixes). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * ubifs: Fix memory leak of bud->log_hash (git-fixes). * ubifs: fix possible dereference after free (git-fixes). * usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git- fixes). * usb: aqc111: check packet for fixup for true limit (git-fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes). * usb: hub: Guard against accesses to uninitialized BOS descriptors (git- fixes). * usb: typec: bus: verify partner exists in typec_altmode_attention (git- fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes). * virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167). * virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167). * virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167). * virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167). * virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167). * virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * wifi: cfg80211: Add my certificate (git-fixes). * wifi: cfg80211: fix certs build to not depend on file order (git-fixes). * wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock (git- fixes). * wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes). * wifi: mac80211: mesh: check element parsing succeeded (git-fixes). * wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes). * x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167). * x86/boot/compressed: Reserve more memory for page tables (git-fixes). * x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167). * x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167). * x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes). * x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes). * x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167). * x86/cpu: Fix amd_check_microcode() declaration (git-fixes). * x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167). * x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927). * x86/entry: Do not allow external 0x80 interrupts (bsc#1217927). * x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes). * x86/fpu: Invalidate FPU state correctly on exec() (git-fixes). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/purgatory: Remove LTO flags (git-fixes). * x86/resctrl: Fix kernel-doc warnings (git-fixes). * x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167). * x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167). * x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167). * x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167). * x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167). * x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167). * x86/sev: Fix address space sparse warning (jsc#PED-7167). * x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167). * x86/sev: Mark snp_abort() noreturn (jsc#PED-7167). * x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167). * x86/sev: Use large PSC requests if applicable (jsc#PED-7167). * x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes). * x86/srso: Add SRSO mitigation for Hygon processors (git-fixes). * x86/srso: Fix SBPB enablement for (possible) future fixed HW (git-fixes). * x86/srso: Fix vulnerability reporting for missing microcode (git-fixes). * x86/tdx: Add unaccepted memory support (jsc#PED-7167). * x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167). * x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167). * x86/tdx: Refactor try_accept_one() (jsc#PED-7167). * x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167). * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * xfs: Rename __xfs_attr_rmtval_remove (git-fixes). * xfs: Use kvcalloc() instead of kvzalloc() (git-fixes). * xfs: aborting inodes on shutdown may need buffer lock (git-fixes). * xfs: add selinux labels to whiteout inodes (git-fixes). * xfs: clean up "%Ld/%Lu" which does not meet C standard (git-fixes). * xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes). * xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes). * xfs: convert flex-array declarations in xfs attr shortform objects (git- fixes). * xfs: decode scrub flags in ftrace output (git-fixes). * xfs: dump log intent items that cannot be recovered due to corruption (git- fixes). * xfs: fix a bug in the online fsck directory leaf1 bestcount check (git- fixes). * xfs: fix agf_fllast when repairing an empty AGFL (git-fixes). * xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes). * xfs: fix silly whitespace problems with kernel libxfs (git-fixes). * xfs: fix uninit warning in xfs_growfs_data (git-fixes). * xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes). * xfs: make sure maxlen is still congruent with prod when rounding down (git- fixes). * xfs: remove kmem_alloc_io() (git-fixes). * xfs: remove the xfs_dinode_t typedef (git-fixes). * xfs: remove the xfs_dqblk_t typedef (git-fixes). * xfs: remove the xfs_dsb_t typedef (git-fixes). * xfs: rename xfs_has_attr() (git-fixes). * xfs: replace snprintf in show functions with sysfs_emit (git-fixes). * xfs: return EINTR when a fatal signal terminates scrub (git-fixes). * xfs: sb verifier does not handle uncached sb buffer (git-fixes). * xfs: simplify two-level sysctl registration for xfs_table (git-fixes). * xfs: sysfs: use default_groups in kobj_type (git-fixes). * xfs: use swap() to make dabtree code cleaner (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-115=1 openSUSE-SLE-15.5-2024-115=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-115=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-115=1 * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-115=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-source-rt-5.14.21-150500.13.30.1 * kernel-devel-rt-5.14.21-150500.13.30.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-extra-5.14.21-150500.13.30.1 * gfs2-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-optional-5.14.21-150500.13.30.1 * kernel-rt-vdso-5.14.21-150500.13.30.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.30.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.30.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-5.14.21-150500.13.30.1 * reiserfs-kmp-rt-5.14.21-150500.13.30.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-1-150500.11.3.1 * cluster-md-kmp-rt-5.14.21-150500.13.30.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-1-150500.11.3.1 * kernel-rt-debugsource-5.14.21-150500.13.30.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-5.14.21-150500.13.30.1 * kselftests-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-livepatch-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-livepatch-5_14_21-150500_13_30-rt-1-150500.11.3.1 * kernel-rt_debug-vdso-5.14.21-150500.13.30.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.30.1 * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-5.14.21-150500.13.30.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-5.14.21-150500.13.30.1 * kernel-syms-rt-5.14.21-150500.13.30.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.30.1 * kernel-rt_debug-5.14.21-150500.13.30.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.30.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-debugsource-5.14.21-150500.13.30.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_13_30-rt-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-1-150500.11.3.1 * SUSE Real Time Module 15-SP5 (x86_64) * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.30.1 * gfs2-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-vdso-5.14.21-150500.13.30.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.30.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-5.14.21-150500.13.30.1 * cluster-md-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-debugsource-5.14.21-150500.13.30.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-5.14.21-150500.13.30.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.30.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt_debug-vdso-5.14.21-150500.13.30.1 * kernel-rt_debug-devel-5.14.21-150500.13.30.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.30.1 * kernel-rt-devel-5.14.21-150500.13.30.1 * kernel-syms-rt-5.14.21-150500.13.30.1 * SUSE Real Time Module 15-SP5 (noarch) * kernel-source-rt-5.14.21-150500.13.30.1 * kernel-devel-rt-5.14.21-150500.13.30.1 * SUSE Real Time Module 15-SP5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.30.1 * kernel-rt_debug-5.14.21-150500.13.30.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212139 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214117 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1215952 * https://bugzilla.suse.com/show_bug.cgi?id=1216032 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217822 * https://bugzilla.suse.com/show_bug.cgi?id=1217927 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218092 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218229 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218397 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218461 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218643 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:30:01 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 08:30:01 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548020133.10898.14608072694885734843@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:33:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 08:33:03 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548038357.12145.4321493069294779729@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:36:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 08:36:05 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548056579.11913.94349545294747257@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 08:39:08 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 08:39:08 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170548074804.12145.9664667887945525002@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-doc-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-23.3-150100.8.71.1 * cloud-init-config-suse-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0128-1: moderate: Security update for cloud-init Message-ID: <170549460330.25570.6002266118748594093@smelt2.prg2.suse.org> # Security update for cloud-init Announcement ID: SUSE-SU-2024:0128-1 Rating: moderate References: * bsc#1198269 * bsc#1201010 * bsc#1214169 * bsc#1215740 * bsc#1215794 * bsc#1216007 * bsc#1216011 Cross-References: * CVE-2023-1786 CVSS scores: * CVE-2023-1786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has six security fixes can now be installed. ## Description: This update for cloud-init contains the following fixes: * Move fdupes call back to %install.(bsc#1214169) * Update to version 23.3. (bsc#1216011) * (bsc#1215794) * (bsc#1215740) * (bsc#1216007) * Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390) * Fix cc_keyboard in mantic (LP: #2030788) * ec2: initialize get_instance_userdata return value to bytes (#4387) [Noah Meyerhans] * cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley] * Fix pip-managed ansible * status: treat SubState=running and MainPID=0 as service exited * azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson] * collect-logs fix memory usage (SC-1590) (#4289) [Alec Warren] (LP: #1980150) * cc_mounts: Use fallocate to create swapfile on btrfs (#4369) * Undocument nocloud-net (#4318) * feat(akamai): add akamai to settings.py and apport.py (#4370) * read-version: fallback to get_version when git describe fails (#4366) * apt: fix cloud-init status --wait blocking on systemd v 253 (#4364) * integration tests: Pass username to pycloudlib (#4324) * Bump pycloudlib to 1!5.1.0 (#4353) * cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272) [dermotbradley] * analyze: fix (unexpected) timestamp parsing (#4347) [Mina Gali?] * cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Gali?] * subp: Fix spurious test failure on FreeBSD (#4355) [Mina Gali?] * cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Gali?] * util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Gali?] * cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Gali?] * unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource (#4328) [Ani Sinha] * Fix test_tools.py collection (#4315) * cc_keyboard: add Alpine support (#4278) [dermotbradley] * Flake8 fixes (#4340) [Robert Schweikert] * cc_mounts: Fix swapfile not working on btrfs (#4319) [???] (LP: #1884127) * ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281) [Wei Zhou] * ec2: Support double encoded userdata (#4275) [Noah Meyerhans] * cc_mounts: xfs is a Linux only FS (#4334) [Mina Gali?] * tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336) [Chris Patterson] * change openEuler to openeuler and fix some bugs in openEuler (#4317) [sxt1001] * Replace flake8 with ruff (#4314) * NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64 (#4291) [Ani Sinha] * cc_ssh_import_id: add Alpine support and add doas support (#4277) [dermotbradley] * sudoers not idempotent (SC-1589) (#4296) [Alec Warren] (LP: #1998539) * Added support for Akamai Connected Cloud (formerly Linode) (#4167) [Will Smith] * Fix reference before assignment (#4292) * Overhaul module reference page (#4237) [Sally] * replaced spaces with commas for setting passenv (#4269) [Alec Warren] * DS VMware: modify a few log level (#4284) [PengpengSun] * tools/read-version refactors and unit tests (#4268) * Ensure get_features() grabs all features (#4285) * Don't always require passlib dependency (#4274) * tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275) * Fix NoCloud kernel commandline key parsing (#4273) * testing: Clear all LRU caches after each test (#4249) * Remove the crypt dependency (#2139) [Gon?ri Le Bouder] * logging: keep current file mode of log file if its stricter than the new mode (#4250) [Ani Sinha] * Remove default membership in redundant groups (#4258) [Dave Jones] (LP: #1923363) * doc: improve datasource_creation.rst (#4262) * Remove duplicate Integration testing button (#4261) [Rishita Shaw] * tools/read-version: fix the tool so that it can handle version parsing errors (#4234) [Ani Sinha] * net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche] * DS VMware: add i386 arch dir to deployPkg plugin search path [PengpengSun] * LXD moved from linuxcontainers.org to Canonical [Simon Deziel] * cc_mounts.py: Add note about issue with creating mounts inside mounts (#4232) [dermotbradley] * lxd: install lxd from snap, not deb if absent in image * landscape: use landscape-config to write configuration * Add deprecation log during init of DataSourceDigitalOcean (#4194) [tyb- truth] * doc: fix typo on apt.primary.arches (#4238) [Dan Bungert] * Inspect systemd state for cloud-init status (#4230) * instance-data: add system-info and features to combined-cloud-config (#4224) * systemd: Block login until config stage completes (#2111) (LP: #2013403) * tests: proposed should invoke apt-get install -t=-proposed (#4235) * cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley] * Remove feature flag override ability (#4228) * tests: drop stray unrelated file presence test (#4227) * Update LXD URL (#4223) [Sally] * schema: add network v1 schema definition and validation functions * tests: daily PPA for devel series is version 99.daily update tests to match (#4225) * instance-data: write /run/cloud-init/combined-cloud-config.json * mount parse: Fix matching non-existent directories (#4222) [Mina Gali?] * Specify build-system for pep517 (#4218) * Fix network v2 metric rendering (#4220) * Migrate content out of FAQ page (SD-1187) (#4205) [Sally] * setup: fix generation of init templates (#4209) [Mina Gali?] * docs: Correct some bootcmd example wording * fix changelog * tests: reboot client to assert x-shellscript-per-boot is triggered * nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204) (LP: 4203, #2025180) * Add docstring and typing to mergemanydict (#4200) * BSD: add dsidentify to early startup scripts (#4182) [Mina Gali?] * handler: report errors on skipped merged cloud-config.txt parts (LP: #1999952) * Add cloud-init summit writeups (#4179) [Sally] * tests: Update test_clean_log for oci (#4187) * gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163) * tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184) * Ephemeral Networking for FreeBSD (#2165) [Mina Gali?] * Clarify directory syntax for nocloud local filesystem. (#4178) * Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha] * Test static routes and netplan 0.106 * FreeBSD fix parsing of mount and mount options (#2146) [Mina Gali?] * test: add tracking bug id (#4164) * tests: can't match MAC for LXD container veth due to netplan 0.106 (#4162) * Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar] * BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Gali?] * launching salt-minion in masterless mode (#4110) [Denis Halturin] * tools: fix run-container builds for rockylinux/8 git hash mismatch (#4161) * fix doc lint: spellchecker tripped up (#4160) [Mina Gali?] * Support Ephemeral Networking for BSD (#2127) * Added / fixed support for static routes on OpenBSD and FreeBSD (#2157) [Kadir Mueller] * cc_rsyslog: Refactor for better multi-platform support (#4119) [Mina Gali?] (LP: #1798055) * tests: fix test_lp1835584 (#4154) * cloud.cfg mod names: docs and rename salt_minion and set_password (#4153) * vultr: remove check_route check (#2151) [Jonas Chevalier] * Update SECURITY.md (#4150) [Indrranil Pawar] * Update CONTRIBUTING.rst (#4149) [Indrranil Pawar] * Update .github-cla-signers (#4151) [Indrranil Pawar] * Standardise module names in cloud.cfg.tmpl to only use underscore (#4128) [dermotbradley] * Modify PR template so autoclose works From 23.2.2 * Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271) (LP: #2028562) * Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784) From 23.2.1 * nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204) (Fixes: 4203) (LP: #2025180) From 23.2 * BSD: simplify finding MBR partitions by removing duplicate code [Mina Gali?] * tests: bump pycloudlib version for mantic builds * network-manager: Set higher autoconnect priority for nm keyfiles (#3671) [Ani Sinha] * alpine.py: change the locale file used (#4139) [dermotbradley] * cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Gali?] * config: drop refresh_rmc_and_interface as RHEL 7 no longer supported [Robert Schweikert] * docs: Add feedback button to docs * net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh plugin (#4132) [Ani Sinha] * For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley] * network_manager: add a method for ipv6 static IP configuration (#4127) [Ani Sinha] * correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley] * nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115) [Ani Sinha] * Add templates for GitHub Issues * Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela] * FreeBSD: Fix user account locking (#4114) [Mina Gali?] (GH: #1854594) * FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Gali?] * Update tests in Azure TestCanDevBeReformatted class (#2771) [Ksenija Stanojevic] * Replace Launchpad references with GitHub Issues * Fix KeyError in iproute pformat (#3287) [Dmitry Zykov] * schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance * azure/errors: introduce reportable errors for imds (#3647) [Chris Patterson] * FreeBSD (and friends): better identify MBR slices (#2168) [Mina Gali?] (LP: #2016350) * azure/errors: add host reporting for dhcp errors (#2167) [Chris Patterson] * net: purge blacklist_drivers across net and azure (#2160) [Chris Patterson] * net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153) [Chris Patterson] * tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d (#2251) * net: refactor find_candidate_nics_on_linux() to use get_interfaces() (#2159) [Chris Patterson] * resolv_conf: Allow > 3 nameservers (#2152) [Major Hayden] * Remove mount NTFS error message (#2134) [Ksenija Stanojevic] * integration tests: fix image specification parsing (#2166) * ci: add hypothesis scheduled GH check (#2149) * Move supported distros list to docs (#2162) * Fix logger, use instance rather than module function (#2163) * README: Point to Github Actions build status (#2158) * Revert "fix linux-specific code on bsd (#2143)" (#2161) * Do not generate dsa and ed25519 key types when crypto FIPS mode is enabled (#2142) [Ani Sinha] (LP: 2017761) * Add documentation label automatically (#2156) * sources/azure: report success to host and introduce kvp module (#2141) [Chris Patterson] * setup.py: use pkg-config for udev/rules path (#2137) [dankm] * openstack/static: honor the DNS servers associated with a network (#2138) [Gon?ri Le Bouder] * fix linux-specific code on bsd (#2143) * cli: schema validation of jinja template user-data (SC-1385) (#2132) (LP: #1881925) * gce: activate network discovery on every boot (#2128) * tests: update integration test to assert 640 across reboots (#2145) * Make user/vendor data sensitive and remove log permissions (#2144) (LP: #2013967) * Update kernel command line docs (SC-1457) (#2133) * docs: update network configuration path links (#2140) [d1r3ct0r] * sources/azure: report failures to host via kvp (#2136) [Chris Patterson] * net: Document use of `ip route append` to add routes (#2130) * dhcp: Add missing mocks (#2135) * azure/imds: retry fetching metadata up to 300 seconds (#2121) [Chris Patterson] * [1/2] DHCP: Refactor dhcp client code (#2122) * azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson] * azure/errors: introduce reportable errors (#2129) [Chris Patterson] * users: schema permit empty list to indicate create no users * azure: introduce identity module (#2116) [Chris Patterson] * Standardize disabling cloud-init on non-systemd (#2112) * Update .github-cla-signers (#2126) [Rob Tongue] * NoCloud: Use seedfrom protocol to determine mode (#2107) * rhel: Remove sysvinit files. (#2114) * tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson] * Fix NoCloud kernel commandline semi-colon args * run-container: make the container/VM timeout configurable (#2118) [Paride Legovini] * suse: Remove sysvinit files. (#2115) * test: Backport assert_call_count for old requests (#2119) * Add "licebmi" as contributor (#2113) [Mark Martinez] * Adapt DataSourceScaleway to upcoming IPv6 support (#2033) [Louis Bouchard] * rhel: make sure previous-hostname file ends with a new line (#2108) [Ani Sinha] * Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai] * Cleanup ephemeral IP routes on exception (#2100) [sxt1001] * commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291) * Standardize kernel commandline user interface (#2093) * config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson] * Fix test_dhclient_exits_with_error (#2105) * net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083) [Chris Patterson] * sources/azure: move pps handling out of _poll_imds() (#2075) [Chris Patterson] * tests: bump pycloudlib version (#2102) * schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098) * sources/azure/imds: don't count timeout errors as connection errors (#2074) [Chris Patterson] * Fix Python 3.12 unit test failures (#2099) * integration tests: Refactor instance checking (#1989) * ci: migrate remaining jobs from travis to gh (#2085) * missing ending quote in instancedata docs(#2094) [Hong L] * refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r] * tests/vmware: fix test_no_data_access_method failure (#2092) [Chris Patterson] * Don't change permissions of netrules target (#2076) (LP: #2011783) * tests/sources: patch util.get_cmdline() for datasource tests (#2091) [Chris Patterson] * macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090) (LP: #2008888) * Fedora: Enable CA handling (#2086) [Franti?ek Zatloukal] * Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa] * cc_ansible: complete the examples and doc (#2082) [Yves] * bddeb: for dev package, derive debhelper-compat from host system * apport: only prompt for cloud_name when instance-data.json is absent * datasource: Optimize datasource detection, fix bugs (#2060) * Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi] * sources/azure: add networking check for all source PPS (#2061) [Chris Patterson] * do not attempt dns resolution on ip addresses (#2040) * chore: fix style tip (#2071) * Fix metadata IP in instancedata.rst (#2063) [Brian Haley] * util: Pass deprecation schedule in deprecate_call() (#2064) * config: Update grub-dpkg docs (#2058) * docs: Cosmetic improvements and styling (#2057) [s-makin] * cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner] * tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059) * oracle-ds: prefer system_cfg over ds network config source (#1998) (LP: #1956788) * Remove dead code (#2038) * source: Force OpenStack when it is only option (#2045) (LP: #2008727) * cc_ubuntu_advantage: improve UA logs discovery * sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson] * tests: fix test_schema (#2042) * dhcp: Cleanup unused kwarg (#2037) * sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027) [PengpengSun] * dhclient_hook: remove vestigal dhclient_hook command (#2015) * log: Add standardized deprecation tooling (SC-1312) (#2026) * Enable SUSE based distros for ca handling (#2036) [Robert Schweikert] From 23.1.2 * Make user/vendor data sensitive and remove log permissions (LP: #2013967) (CVE-2023-1786) * Remove six dependency (bsc#1198269) * Update to version 22.4 (bsc#1201010) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2024-128=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-128=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-128=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-128=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-128=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-128=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * cloud-init-doc-23.3-150100.8.71.1 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cloud-init-config-suse-23.3-150100.8.71.1 * cloud-init-23.3-150100.8.71.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1786.html * https://bugzilla.suse.com/show_bug.cgi?id=1198269 * https://bugzilla.suse.com/show_bug.cgi?id=1201010 * https://bugzilla.suse.com/show_bug.cgi?id=1214169 * https://bugzilla.suse.com/show_bug.cgi?id=1215740 * https://bugzilla.suse.com/show_bug.cgi?id=1215794 * https://bugzilla.suse.com/show_bug.cgi?id=1216007 * https://bugzilla.suse.com/show_bug.cgi?id=1216011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:24 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:24 -0000 Subject: SUSE-SU-2024:0121-1: important: Security update for xorg-x11-server Message-ID: <170549498466.26918.12402089587514380971@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0121-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-121=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-121=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-121=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-121=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-121=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-121=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-121=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-121=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-121=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-121=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-wayland-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-wayland-1.20.3-150200.22.5.88.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * xorg-x11-server-1.20.3-150200.22.5.88.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.88.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-1.20.3-150200.22.5.88.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.88.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.88.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:29 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:29 -0000 Subject: SUSE-SU-2024:0118-1: important: Security update for the Linux Kernel Message-ID: <170549498964.26918.5967574862184871195@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0118-1 Rating: important References: * bsc#1109837 * bsc#1179610 * bsc#1202095 * bsc#1211226 * bsc#1211439 * bsc#1214479 * bsc#1215237 * bsc#1217036 * bsc#1217250 * bsc#1217801 * bsc#1217936 * bsc#1217946 * bsc#1217947 * bsc#1218057 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218362 * bsc#1218559 * bsc#1218622 * jsc#PED-5021 * jsc#PED-5023 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Real Time 12 SP5 * SUSE Linux Enterprise Server 12 SP5 An update that solves eight vulnerabilities, contains two features and has 12 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). The following non-security bugs were fixed: * Enabled the LLC counters for ?perf? (perf stat) on the Ice-Lake and Rocket- Lake CPUs (jsc#PED-5023 bsc#1211439). * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * Fix termination state for idr_for_each_entry_ul() (bsc#1109837). * KVM: s390/mm: Properly reset no-dat (bsc#1218057). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217936). * PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622). * Previous perf cve-4.12->SLE12-SP5 manual merge was incorrect. Fix. * gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). * gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). * gve: Changes to add new TX queues (bsc#1214479). * gve: Control path for DQO-QPL (bsc#1214479). * gve: Do not fully free QPL pages on prefill errors (bsc#1214479). * gve: Fix gve interrupt names (bsc#1214479). * gve: Fixes for napi_poll when budget is 0 (bsc#1214479). * gve: RX path for DQO-QPL (bsc#1214479). * gve: Set default duplex configuration to full (bsc#1214479). * gve: Tx path for DQO-QPL (bsc#1214479). * gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). * gve: XDP support GQI-QPL: helper function changes (bsc#1214479). * gve: fix frag_list chaining (bsc#1214479). * gve: trivial spell fix Recive to Receive (bsc#1214479). * gve: unify driver name usage (bsc#1214479). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801). * s390/vx: fix save/restore of fpu kernel context (bsc#1218362). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Real Time 12 SP5 zypper in -t patch SUSE-SLE-RT-12-SP5-2024-118=1 ## Package List: * SUSE Linux Enterprise Real Time 12 SP5 (x86_64) * kernel-rt-devel-4.12.14-10.157.1 * kernel-rt_debug-devel-debuginfo-4.12.14-10.157.1 * kernel-rt-base-debuginfo-4.12.14-10.157.1 * kernel-rt-debugsource-4.12.14-10.157.1 * kernel-rt-debuginfo-4.12.14-10.157.1 * kernel-rt_debug-debugsource-4.12.14-10.157.1 * ocfs2-kmp-rt-4.12.14-10.157.1 * kernel-rt_debug-debuginfo-4.12.14-10.157.1 * dlm-kmp-rt-4.12.14-10.157.1 * kernel-rt_debug-devel-4.12.14-10.157.1 * cluster-md-kmp-rt-4.12.14-10.157.1 * ocfs2-kmp-rt-debuginfo-4.12.14-10.157.1 * gfs2-kmp-rt-debuginfo-4.12.14-10.157.1 * gfs2-kmp-rt-4.12.14-10.157.1 * kernel-rt-base-4.12.14-10.157.1 * kernel-syms-rt-4.12.14-10.157.1 * cluster-md-kmp-rt-debuginfo-4.12.14-10.157.1 * kernel-rt-devel-debuginfo-4.12.14-10.157.1 * dlm-kmp-rt-debuginfo-4.12.14-10.157.1 * SUSE Linux Enterprise Real Time 12 SP5 (noarch) * kernel-source-rt-4.12.14-10.157.1 * kernel-devel-rt-4.12.14-10.157.1 * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64) * kernel-rt_debug-4.12.14-10.157.1 * kernel-rt-4.12.14-10.157.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1109837 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1211439 * https://bugzilla.suse.com/show_bug.cgi?id=1214479 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217936 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218057 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218362 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218622 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-5023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:31 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:31 -0000 Subject: SUSE-SU-2024:0116-1: important: Security update for xorg-x11-server Message-ID: <170549499156.26918.4133535390369223330@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0116-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-116=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-116=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-116=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-116=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * xorg-x11-server-extra-1.19.6-10.65.1 * xorg-x11-server-extra-debuginfo-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-1.19.6-10.65.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-1.19.6-10.65.1 * xorg-x11-server-extra-debuginfo-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-1.19.6-10.65.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * xorg-x11-server-extra-1.19.6-10.65.1 * xorg-x11-server-extra-debuginfo-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-1.19.6-10.65.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debuginfo-1.19.6-10.65.1 * xorg-x11-server-sdk-1.19.6-10.65.1 * xorg-x11-server-debugsource-1.19.6-10.65.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:33 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:33 -0000 Subject: SUSE-SU-2024:0114-1: important: Security update for xwayland Message-ID: <170549499340.26918.2593691844000032157@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2024:0114-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-114=1 openSUSE-SLE-15.5-2024-114=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-114=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * xwayland-22.1.5-150500.7.14.1 * xwayland-debugsource-22.1.5-150500.7.14.1 * xwayland-devel-22.1.5-150500.7.14.1 * xwayland-debuginfo-22.1.5-150500.7.14.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * xwayland-22.1.5-150500.7.14.1 * xwayland-debugsource-22.1.5-150500.7.14.1 * xwayland-debuginfo-22.1.5-150500.7.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:41 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:41 -0000 Subject: SUSE-SU-2024:0113-1: important: Security update for the Linux Kernel Message-ID: <170549500118.26918.913716772401086485@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0113-1 Rating: important References: * bsc#1108281 * bsc#1109837 * bsc#1179610 * bsc#1202095 * bsc#1211226 * bsc#1211439 * bsc#1214479 * bsc#1215237 * bsc#1217036 * bsc#1217250 * bsc#1217801 * bsc#1217936 * bsc#1217946 * bsc#1217947 * bsc#1218057 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218362 * bsc#1218559 * bsc#1218622 * jsc#PED-5021 * jsc#PED-5023 Cross-References: * CVE-2020-26555 * CVE-2022-2586 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves eight vulnerabilities, contains two features and has 13 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2022-2586: Fixed a use-after-free which can be triggered when a nft table is deleted (bsc#1202095). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). The following non-security bugs were fixed: * Fix termination state for idr_for_each_entry_ul() (bsc#1109837). * Input: powermate - fix use-after-free in powermate_config_complete (git- fixes). * KVM: s390/mm: Properly reset no-dat (git-fixes bsc#1218057). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217936). * Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1218622). * Resolve build warnings from previous series due to missing commit for Ice Lake freerunning counters perf/x86/intel/uncore: Add box_offsets for free- running counters (jsc#PED-5023 bsc#1211439). * Revert "Limit kernel-source-azure build to architectures for which we build binaries (bsc#1108281)." * bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes). * bcache: Remove unnecessary NULL point check in node allocations (git-fixes). * bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes). * bcache: check return value from btree_node_alloc_replacement() (git-fixes). * bcache: prevent potential division by zero error (git-fixes). * bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes). * bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes). * dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes). * dm cache: add cond_resched() to various workqueue loops (git-fixes). * dm crypt: add cond_resched() to dmcrypt_write() (git-fixes). * dm flakey: do not corrupt the zero page (git-fixes). * dm flakey: fix a crash with invalid table line (git-fixes). * dm flakey: fix logic when corrupting a bio (git-fixes). * dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes). * dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git- fixes). * dm stats: check for and propagate alloc_percpu failure (git-fixes). * dm thin: add cond_resched() to various workqueue loops (git-fixes). * dm verity: do not perform FEC for failed readahead IO (git-fixes). * dm verity: fix error handling for check_at_most_once on FEC (git-fixes). * dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes). * dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes). * dm-verity: align struct dm_verity_fec_io properly (git-fixes). * dm: remove flush_scheduled_work() during local_exit() (git-fixes). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479). * gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479). * gve: Changes to add new TX queues (bsc#1214479). * gve: Control path for DQO-QPL (bsc#1214479). * gve: Do not fully free QPL pages on prefill errors (bsc#1214479). * gve: Fix gve interrupt names (bsc#1214479). * gve: Fixes for napi_poll when budget is 0 (bsc#1214479). * gve: RX path for DQO-QPL (bsc#1214479). * gve: Set default duplex configuration to full (bsc#1214479). * gve: Tx path for DQO-QPL (bsc#1214479). * gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479). * gve: XDP support GQI-QPL: helper function changes (bsc#1214479). * gve: fix frag_list chaining (bsc#1214479). * gve: trivial spell fix Recive to Receive (bsc#1214479). * gve: unify driver name usage (bsc#1214479). * ip6_gre: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * ip6_tunnel: sit: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * ip6_vti: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes). * ipv6: remove extra dev_hold() for fallback tunnels (git-fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md: do not leave 'MD_RECOVERY_FROZEN' in error path of md_set_readonly() (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * nbd: Add the maximum limit of allocated index in nbd_dev_add (git-fixes). * nbd: Fix debugfs_create_dir error checking (git-fixes). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1217801). * net: dsa: mv88e6xxx: Fix 88E6141/6341 2500mbps SERDES speed (git-fixes). * net: ethernet: ti: cpsw: unsync mcast entries while switch promisc mode (git-fixes). * net: macb: disable scatter-gather for macb on sama5d3 (git-fixes). * net: stmmac: Move debugfs init/exit to ->probe()/->remove() (git-fixes). * net: usb: ax88179_178a: fix failed operations during ax88179_reset (git- fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes). * net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git- fixes). * netfilter: compat: prepare xt_compat_init_offsets to return errors (git- fixes). * netfilter: compat: reject huge allocation requests (git-fixes). * netfilter: ebtables: also count base chain policies (git-fixes). * netfilter: ebtables: compat: un-break 32bit setsockopt when no rules are present (git-fixes). * netfilter: ebtables: do not attempt to allocate 0-sized compat array (git- fixes). * netfilter: nf_tables: fix use-after-free when deleting compat expressions (git-fixes). * netfilter: nft_compat: use-after-free when deleting targets (git-fixes). * netfilter: preserve KABI for xt_compat_init_offsets (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * perf/x86/cstate: Add Rocket Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/cstate: Add Tiger Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/cstate: Update C-state counters for Ice Lake (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add Comet Lake support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add IMC uncore support for Snow Ridge (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add Ice Lake server uncore support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add Rocket Lake support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add new IMC PCI IDs for KabyLake, AmberLake and WhiskeyLake CPUs (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add tabs to Uncore IMC PCI IDs (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Add uncore support for Snow Ridge server (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Clean up client IMC (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Factor out __snr_uncore_mmio_init_box (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Factor out box ref/unref functions (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Fix CAS_COUNT_WRITE issue for ICX (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix IIO event constraints for Snowridge (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix integer overflow on 23 bit left shift of a u32 (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix missing marker for snr_uncore_imc_freerunning_events (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix oops when counting IMC uncore events on some TGL (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Fix the scale of the IMC free-running events (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Split the Ice Lake and Tiger Lake MSR uncore support (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Support MMIO type uncore blocks (jsc#PED-5023 bsc#1211439). * perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (jsc#PED-5023 bsc#1211439 (git-fixes)). * perf/x86/intel/uncore: Update Ice Lake uncore units (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add Icelake desktop CPUID (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add Rocket Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add Tiger Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Add more Icelake CPUIDs (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Fix Ice Lake event constraint table (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Fix invalid Bit 13 for Icelake MSR_OFFCORE_RSP_x register (jsc#PED-5023 bsc#1211439). * perf/x86/intel: Mark expected switch fall-throughs (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add Comet Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add Rocket Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add Tiger Lake CPU support (jsc#PED-5023 bsc#1211439). * perf/x86/msr: Add new CPU model numbers for Ice Lake (jsc#PED-5023 bsc#1211439). * perf/x86/rapl: Add Ice Lake RAPL support (jsc#PED-5023 bsc#1211439). * perf/x86: Add Intel Ice Lake NNPI uncore support (jsc#PED-5023 bsc#1211439). * perf/x86: Add Intel Tiger Lake uncore support (jsc#PED-5023 bsc#1211439). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Cancel hw_phy_work if we have an error in probe (git-fixes). * r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8152: Run the unload routine if we have errors during probe (git-fixes). * rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git- fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218362). * sit: proper dev_{hold|put} in ndo_[un]init methods (git-fixes). * tcp: fix under-evaluated ssthresh in TCP Vegas (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * x86/cpu: Add Comet Lake to the Intel CPU models header (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Ice Lake NNPI to Intel family (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Lakefield, Alder Lake and Rocket Lake models to the to Intel CPU family (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Sapphire Rapids CPU model number (jsc#PED-5023 bsc#1211439). * x86/cpu: Add Tiger Lake to Intel family (jsc#PED-5023 bsc#1211439). * xfrm6: fix inet6_dev refcount underflow problem (git-fixes). * xfrm: reuse uncached_list to track xdsts (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). * xsk: Fix incorrect netdev reference count (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-113=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-113=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-113=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.163.1 * kernel-azure-devel-4.12.14-16.163.1 * kernel-azure-debuginfo-4.12.14-16.163.1 * kernel-azure-base-debuginfo-4.12.14-16.163.1 * kernel-azure-debugsource-4.12.14-16.163.1 * kernel-syms-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.163.1 * kernel-devel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.163.1 * kernel-azure-devel-4.12.14-16.163.1 * kernel-azure-debuginfo-4.12.14-16.163.1 * kernel-azure-base-debuginfo-4.12.14-16.163.1 * kernel-azure-debugsource-4.12.14-16.163.1 * kernel-syms-azure-4.12.14-16.163.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.163.1 * kernel-devel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-base-4.12.14-16.163.1 * kernel-azure-devel-4.12.14-16.163.1 * kernel-azure-debuginfo-4.12.14-16.163.1 * kernel-azure-base-debuginfo-4.12.14-16.163.1 * kernel-azure-debugsource-4.12.14-16.163.1 * kernel-syms-azure-4.12.14-16.163.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.163.1 * kernel-devel-azure-4.12.14-16.163.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1109837 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1211439 * https://bugzilla.suse.com/show_bug.cgi?id=1214479 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217936 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218057 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218362 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218622 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-5023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:45 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:45 -0000 Subject: SUSE-SU-2024:0112-1: important: Security update for the Linux Kernel Message-ID: <170549500516.26918.17352750411586790731@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0112-1 Rating: important References: * bsc#1179610 * bsc#1205762 * bsc#1210778 * bsc#1212051 * bsc#1212703 * bsc#1215237 * bsc#1215858 * bsc#1215860 * bsc#1216046 * bsc#1216058 * bsc#1216976 * bsc#1217947 * bsc#1218253 * bsc#1218559 Cross-References: * CVE-2020-26555 * CVE-2022-45887 * CVE-2023-1206 * CVE-2023-31085 * CVE-2023-3111 * CVE-2023-39189 * CVE-2023-39192 * CVE-2023-39193 * CVE-2023-39197 * CVE-2023-45863 * CVE-2023-51779 * CVE-2023-6606 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2022-45887 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45887 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1206 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1206 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3111 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-39189 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2023-39189 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39192 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39192 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39193 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2023-39193 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-45863 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45863 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 An update that solves 13 vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762). * CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703). * CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd->erasesize) that could cause a local DoS (bsc#1210778). * CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051). * CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure (bsc#1216046). * CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858). * CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860). * CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976). * CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-112=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-112=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (nosrc x86_64) * kernel-ec2-3.0.101-108.150.1 * kernel-default-3.0.101-108.150.1 * kernel-trace-3.0.101-108.150.1 * kernel-xen-3.0.101-108.150.1 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 (x86_64) * kernel-xen-base-3.0.101-108.150.1 * kernel-source-3.0.101-108.150.1 * kernel-ec2-devel-3.0.101-108.150.1 * kernel-default-devel-3.0.101-108.150.1 * kernel-ec2-base-3.0.101-108.150.1 * kernel-xen-devel-3.0.101-108.150.1 * kernel-default-base-3.0.101-108.150.1 * kernel-trace-devel-3.0.101-108.150.1 * kernel-syms-3.0.101-108.150.1 * kernel-trace-base-3.0.101-108.150.1 * SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64) * kernel-ec2-3.0.101-108.150.1 * kernel-default-3.0.101-108.150.1 * kernel-trace-3.0.101-108.150.1 * kernel-xen-3.0.101-108.150.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * kernel-xen-base-3.0.101-108.150.1 * kernel-source-3.0.101-108.150.1 * kernel-ec2-devel-3.0.101-108.150.1 * kernel-default-devel-3.0.101-108.150.1 * kernel-ec2-base-3.0.101-108.150.1 * kernel-xen-devel-3.0.101-108.150.1 * kernel-default-base-3.0.101-108.150.1 * kernel-trace-devel-3.0.101-108.150.1 * kernel-syms-3.0.101-108.150.1 * kernel-trace-base-3.0.101-108.150.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2022-45887.html * https://www.suse.com/security/cve/CVE-2023-1206.html * https://www.suse.com/security/cve/CVE-2023-31085.html * https://www.suse.com/security/cve/CVE-2023-3111.html * https://www.suse.com/security/cve/CVE-2023-39189.html * https://www.suse.com/security/cve/CVE-2023-39192.html * https://www.suse.com/security/cve/CVE-2023-39193.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-45863.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1205762 * https://bugzilla.suse.com/show_bug.cgi?id=1210778 * https://bugzilla.suse.com/show_bug.cgi?id=1212051 * https://bugzilla.suse.com/show_bug.cgi?id=1212703 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215858 * https://bugzilla.suse.com/show_bug.cgi?id=1215860 * https://bugzilla.suse.com/show_bug.cgi?id=1216046 * https://bugzilla.suse.com/show_bug.cgi?id=1216058 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:47 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:47 -0000 Subject: SUSE-SU-2024:0111-1: important: Security update for xorg-x11-server Message-ID: <170549500757.26918.3514284829407797546@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0111-1 Rating: important References: * bsc#1218176 * bsc#1218240 * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities and has two security fixes can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: Security fixes: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) Other: * Fix vmware graphics driver crash (bsc#1218176) * Fix xserver crash when Xinerama is enabled (bsc#1218240) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-111=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-111=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-111=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-111=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-111=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-111=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-111=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-111=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-111=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-111=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-source-1.20.3-150400.38.40.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-sdk-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Manager Proxy 4.3 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.40.1 * xorg-x11-server-1.20.3-150400.38.40.1 * xorg-x11-server-debugsource-1.20.3-150400.38.40.1 * xorg-x11-server-extra-1.20.3-150400.38.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218176 * https://bugzilla.suse.com/show_bug.cgi?id=1218240 * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:51 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:51 -0000 Subject: SUSE-SU-2024:0110-1: important: Security update for the Linux Kernel Message-ID: <170549501189.26918.5584302904565881138@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0110-1 Rating: important References: * bsc#1179610 * bsc#1211226 * bsc#1215237 * bsc#1215375 * bsc#1217250 * bsc#1217709 * bsc#1217946 * bsc#1217947 * bsc#1218105 * bsc#1218184 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves seven vulnerabilities, contains one feature and has six security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). The following non-security bugs were fixed: * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * clocksource: Avoid accidental unstable marking of clocksources (bsc#1218105). * clocksource: Suspend the watchdog temporarily when high read latency detected (bsc#1218105). * efi/mokvar: Reserve the table only if it is in boot services data (bsc#1215375). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-110=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-110=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-110=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debugsource-5.3.18-150300.155.1 * kernel-rt-debuginfo-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.155.1 * kernel-rt-debuginfo-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.155.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.155.1 * kernel-rt-debuginfo-5.3.18-150300.155.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215375 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217709 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218105 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 17 12:36:54 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 17 Jan 2024 12:36:54 -0000 Subject: SUSE-SU-2024:0109-1: important: Security update for xorg-x11-server Message-ID: <170549501404.26918.13194673885387679670@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2024:0109-1 Rating: important References: * bsc#1218176 * bsc#1218240 * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities and has two security fixes can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: Security fixes: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) Other: * Fix vmware graphics driver crash (bsc#1218176) * Fix xserver crash when Xinerama is enabled (bsc#1218240) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-109=1 openSUSE-SLE-15.5-2024-109=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-109=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-109=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 * xorg-x11-server-extra-21.1.4-150500.7.18.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-sdk-21.1.4-150500.7.18.1 * xorg-x11-server-source-21.1.4-150500.7.18.1 * xorg-x11-server-debugsource-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-21.1.4-150500.7.18.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 * xorg-x11-server-extra-21.1.4-150500.7.18.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-debugsource-21.1.4-150500.7.18.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-21.1.4-150500.7.18.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debuginfo-21.1.4-150500.7.18.1 * xorg-x11-server-debugsource-21.1.4-150500.7.18.1 * xorg-x11-server-sdk-21.1.4-150500.7.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218176 * https://bugzilla.suse.com/show_bug.cgi?id=1218240 * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Thu Jan 18 08:01:57 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Thu, 18 Jan 2024 09:01:57 +0100 (CET) Subject: SUSE-CU-2024:223-1: Security update of suse/ltss/sle15.3/sle15 Message-ID: <20240118080157.43E0CFD1F@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:223-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.40 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.40 Container Release : 3.40 Severity : important Type : security References : 1029961 1158830 1201384 1206798 1209122 1212475 1215496 1216862 1216987 1217212 1217573 1218014 CVE-2023-46218 CVE-2023-50495 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4699-1 Released: Mon Dec 11 07:02:10 2023 Summary: Recommended update for gpg2 Type: recommended Severity: moderate References: 1217212 This update for gpg2 fixes the following issues: - `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4713-1 Released: Mon Dec 11 13:23:12 2023 Summary: Security update for curl Type: security Severity: moderate References: 1217573,CVE-2023-46218 This update for curl fixes the following issues: - CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573). ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4723-1 Released: Tue Dec 12 09:57:51 2023 Summary: Recommended update for libtirpc Type: recommended Severity: moderate References: 1216862 This update for libtirpc fixes the following issue: - fix sed parsing in specfile (bsc#1216862) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4807-1 Released: Wed Dec 13 18:07:37 2023 Summary: Security update for container-suseconnect Type: security Severity: important References: 1212475 This update of container-suseconnect fixes the following issues: - rebuild the package with the go 1.21 security release (bsc#1212475). ----------------------------------------------------------------- Advisory ID: SUSE-SU-2023:4891-1 Released: Mon Dec 18 16:31:49 2023 Summary: Security update for ncurses Type: security Severity: moderate References: 1201384,1218014,CVE-2023-50495 This update for ncurses fixes the following issues: - CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014) - Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2023:4963-1 Released: Fri Dec 22 14:37:08 2023 Summary: Recommended update for curl Type: recommended Severity: important References: 1216987 This update for curl fixes the following issues: - libssh: Implement SFTP packet size limit (bsc#1216987) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:11-1 Released: Tue Jan 2 13:24:52 2024 Summary: Recommended update for procps Type: recommended Severity: moderate References: 1029961,1158830,1206798,1209122 This update for procps fixes the following issues: - Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369) - For support up to 2048 CPU as well (bsc#1185417) - Allow `-? as leading character to ignore possible errors on systctl entries (bsc#1209122) - Get the first CPU summary correct (bsc#1121753) - Enable pidof for SLE-15 as this is provided by sysvinit-tools - Use a check on syscall __NR_pidfd_open to decide if the pwait tool and its manual page will be build - Do not truncate output of w with option -n - Prefer logind over utmp (jsc#PED-3144) - Don't install translated man pages for non-installed binaries (uptime, kill). - Fix directory for Ukrainian man pages translations. - Move localized man pages to lang package. - Update to procps-ng-3.3.17 * library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops - Package translations in procps-lang. - Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited. - Enable pidof by default - Update to procps-ng-3.3.16 * library: Increment to 8:2:0 No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1 * docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:62-1 Released: Mon Jan 8 11:44:47 2024 Summary: Recommended update for libxcrypt Type: recommended Severity: moderate References: 1215496 This update for libxcrypt fixes the following issues: - fix variable name for datamember [bsc#1215496] - added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2 The following package changes have been done: - container-suseconnect-2.4.0-150000.4.46.1 updated - curl-7.66.0-150200.4.66.1 updated - gpg2-2.2.27-150300.3.8.1 updated - libcrypt1-4.4.15-150300.4.7.1 updated - libcurl4-7.66.0-150200.4.66.1 updated - libncurses6-6.1-150000.5.20.1 updated - libprocps8-3.3.17-150000.7.37.1 added - libsolv-tools-0.7.27-150200.23.2 updated - libtirpc-netconfig-1.3.4-150300.3.23.1 updated - libtirpc3-1.3.4-150300.3.23.1 updated - libzypp-17.31.27-150200.84.1 updated - ncurses-utils-6.1-150000.5.20.1 updated - procps-3.3.17-150000.7.37.1 updated - terminfo-base-6.1-150000.5.20.1 updated - zypper-1.14.68-150200.70.2 updated - libprocps7-3.3.15-150000.7.34.1 removed From null at suse.de Thu Jan 18 12:30:24 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 12:30:24 -0000 Subject: SUSE-SU-2024:0141-1: important: Security update for the Linux Kernel Message-ID: <170558102432.4190.5952944718333062493@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0141-1 Rating: important References: * bsc#1108281 * bsc#1179610 * bsc#1183045 * bsc#1211162 * bsc#1211226 * bsc#1212139 * bsc#1212584 * bsc#1214117 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1215952 * bsc#1216032 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217822 * bsc#1217927 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218092 * bsc#1218139 * bsc#1218184 * bsc#1218229 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218397 * bsc#1218447 * bsc#1218461 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218643 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7167 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 10 vulnerabilities, contains three features and has 41 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). The following non-security bugs were fixed: * Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167). * Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167). * Documentation: KVM: update msr.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167). * Documentation: drop more IDE boot options and ide-cd.rst (git-fixes). * Documentation: qat: Use code block for qat sysfs example (git-fixes). * Drop Documentation/ide/ (git-fixes). * Fix crash on screen resize (bsc#1218229) * Fix drm gem object underflow (bsc#1218092) * Revert "Limit kernel-source-azure build to architectures for which we build binaries (bsc#1108281)." * Revert "PCI/ASPM: Remove pcie_aspm_pm_state_change()" (git-fixes). * Revert "PCI: acpiphp: Reassign resources on bridge if necessary" (git- fixes). * Revert "md: unlock mddev before reap sync_thread in action_store" (git- fixes). * Revert "swiotlb: panic if nslabs is too small" (git-fixes). * Revert "xhci: Loosen RPM as default policy to cover for AMD xHC 1.1" (git- fixes). * Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces * acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git- fixes). * acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes). * acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes). * afs: Fix afs_server_list to be cleaned up with RCU (git-fixes). * afs: Fix dynamic root lookup DNS check (git-fixes). * afs: Fix file locking on R/O volumes to operate in local mode (git-fixes). * afs: Fix overwriting of result of DNS query (git-fixes). * afs: Fix refcount underflow from error handling race (git-fixes). * afs: Fix the dynamic root's d_delete to always delete unused dentries (git- fixes). * afs: Fix use-after-free due to get/remove race in volume tree (git-fixes). * afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes). * afs: Return ENOENT if no cell DNS record can be found (git-fixes). * alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes). * alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes). * alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git- fixes). * alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes). * alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes). * alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes). * alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes). * alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes). * alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git- fixes). * alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes). * alsa: hda/realtek: add new Framework laptop to quirks (git-fixes). * alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes). * alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes). * alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes). * alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes). * alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes). * alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes). * alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes). * apparmor: Free up __cleanup() name (jsc#PED-7167). * arm64: dts: arm: add missing cache properties (git-fixes) * arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes) * arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167). * arm64: mm: Fix "rodata=on" when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git- fixes) * arm: oMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes). * arm: pL011: Fix DMA support (git-fixes). * asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes). * asoc: hdmi-codec: fix missing report for jack initial status (git-fixes). * asoc: meson: g12a-toacodec: Fix event generation (git-fixes). * asoc: meson: g12a-toacodec: Validate written enum values (git-fixes). * asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes). * asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes). * asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes). * bitmap: unify find_bit operations (jsc#PED-7167). * block: fix revalidate performance regression (bsc#1216057). * bluetooth: Fix deadlock in vhci_send_frame (git-fixes). * bluetooth: L2CAP: Send reject on command corrupted request (git-fixes). * bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git- fixes). * bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461). * bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git- fixes). * bluetooth: hci_event: shut up a false-positive warning (git-fixes). * bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * bnxt: do not handle XDP in netpoll (jsc#PED-1495). * bnxt_en: Clear resource reservation during resume (jsc#PED-1495). * bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495). * bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495). * bnxt_en: Fix page pool logic for page size >= 64K (jsc#PED-1495). * bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495). * bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes). * bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * cleanup: Make no_free_ptr() __must_check (jsc#PED-7167). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167). * crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167). * crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167). * crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167). * crypto: ccp - Add a quirk to firmware update (jsc#PED-7167). * crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167). * crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167). * crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167). * crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167). * crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167). * crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167). * crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167). * crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167). * crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167). * crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167). * crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167). * crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167). * crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167). * crypto: ccp - remove unneeded semicolon (jsc#PED-7167). * crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167). * dm verity: initialize fec io before freeing it (git-fixes). * dm-verity: do not use blocking calls from tasklets (git-fixes). * dm: add cond_resched() to dm_wq_requeue_work() (git-fixes). * dm: do not attempt to queue IO under RCU protection (git-fixes). * dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952). * dm: fix improper splitting for abnormal bios (bsc#1215952). * dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes). * drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139). * drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes). * drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes). * drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes). * drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes). * drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes). * drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes). * drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes). * drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes). * drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git- fixes). * drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes). * drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes). * drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes). * drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes). * drm/bridge: parade-ps8640: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes). * drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes). * drm/bridge: ti-sn65dsi86: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes). * drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes). * drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes). * drm/i915/lvds: Use REG_BIT() & co (git-fixes). * drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 (git-fixes). * drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git- fixes). * drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes). * drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes). * drm/i915: Reject async flips with bigjoiner (git-fixes). * drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes). * drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167). * drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git- fixes). * drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git- fixes). * efi/libstub: Implement support for unaccepted memory (jsc#PED-7167). * efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167). * efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167). * efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167). * efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167). * efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167). * efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167). * efi: Add unaccepted memory support (jsc#PED-7167). * efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167). * efi: libstub: install boot-time memory map as config table (jsc#PED-7167). * efi: libstub: remove DT dependency from generic stub (jsc#PED-7167). * efi: libstub: remove pointless goto kludge (jsc#PED-7167). * efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167). * efi: libstub: unify initrd loading between architectures (jsc#PED-7167). * floppy: fix MAX_ORDER usage (jsc#PED-7167). * fprobe: Fix to ensure the number of active retprobes is not zero (git- fixes). * fs/jfs: Add check for negative db_l2nbperpage (git-fixes). * fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes). * fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git- fixes). * fs/remap: constrain dedupe of EOF blocks (git-fixes). * fs: avoid empty option when generating legacy mount string (git-fixes). * fs: fix an infinite loop in iomap_fiemap (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * genwqe: fix MAX_ORDER usage (jsc#PED-7167). * gfs2: Add wrapper for iomap_file_buffered_write (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Clean up function may_grant (git-fixes). * gfs2: Fix filesystem block deallocation for short writes (git-fixes). * gfs2: Fix gfs2_release for non-writers regression (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix length of holes reported at end-of-file (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Improve gfs2_make_fs_rw error handling (git-fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Silence "suspicious RCU usage in gfs2_permission" warning (git-fixes). * gfs2: Switch from strlcpy to strscpy (git-fixes). * gfs2: fix an oops in gfs2_permission (git-fixes). * gfs2: gfs2_setattr_size error path fix (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: jdata writepage fix (git-fixes). * gfs2: use i_lock spin_lock for inode qadata (git-fixes). * gpiolib: sysfs: Fix error handling on failed export (git-fixes). * gve: Fixes for napi_poll when budget is 0 (git-fixes). * gve: Use size_add() in call to struct_size() (git-fixes). * hid: add ALWAYS_POLL quirk for Apple kb (git-fixes). * hid: glorious: fix Glorious Model I HID report (git-fixes). * hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes). * hid: hid-asus: reset the backlight brightness level on resume (git-fixes). * hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git- fixes). * hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes). * hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes). * hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git- fixes). * i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes). * i2c: core: Fix atomic xfer check for non-preempt config (git-fixes). * i2c: designware: Fix corrupted memory seen in the ISR (git-fixes). * i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372). * i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372). * i40e: Fix unexpected MFS warning message (jsc#PED-372). * i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372). * i40e: fix misleading debug logs (jsc#PED-372). * i40e: fix potential NULL pointer dereferencing of pf->vf i40e_sync_vsi_filters() (jsc#PED-372). * i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372). * i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372). * ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes) * ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes) * igb: Avoid starting unnecessary workqueues (jsc#PED-370). * igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370). * igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370). * igb: disable virtualization features on 82580 (jsc#PED-370). * igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375). * igc: Expose tx-usecs coalesce setting to user (jsc#PED-375). * igc: Fix ambiguity in the ethtool advertising (jsc#PED-375). * igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375). * igc: Fix the typo in the PTM Control macro (jsc#PED-375). * iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git- fixes). * iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes). * iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes). * iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes). * input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes). * input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes). * input: soc_button_array - add mapping for airplane mode button (git-fixes). * input: xpad - add HyperX Clutch Gladiate Support (git-fixes). * interconnect: Treat xlate() returning NULL node as an error (git-fixes). * iomap: Fix iomap_dio_rw return value for user copies (git-fixes). * iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167). * iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git- fixes). * jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes). * jfs: fix array-index-out-of-bounds in diAlloc (git-fixes). * jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount (git-fixes). * jfs: validate max amount of blocks before allocation (git-fixes). * kABI: Preserve the type of rethook::handler (git-fixes). * kABI: restore void return to typec_altmode_attention (git-fixes). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167) * kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167). * kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167). * kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167). * kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167). * kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167). * kconfig: fix memory leak from range properties (git-fixes). * kernel-source: Remove config-options.changes (jsc#PED-5021) * kprobes: consistent rcu api usage for kretprobe holder (git-fixes). * kvm: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167). * kvm: s390/mm: Properly reset no-dat (git-fixes bsc#1218056). * kvm: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933). * lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes). * libceph: use kernel_connect() (bsc#1217981). * limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * locking: Introduce __cleanup() based infrastructure (jsc#PED-7167). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes). * md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes). * md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes). * md/md-bitmap: remove unnecessary local variable in backlog_store() (git- fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes). * md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes). * md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes). * md/raid10: fix io loss while replacement replace rdev (git-fixes). * md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes). * md/raid10: fix memleak for 'conf->bio_split' (git-fixes). * md/raid10: fix memleak of md thread (git-fixes). * md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes). * md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git- fixes). * md/raid10: fix overflow of md/safe_mode_delay (git-fixes). * md/raid10: fix task hung in raid10d (git-fixes). * md/raid10: fix the condition to call bio_end_io_acct() (git-fixes). * md/raid10: fix wrong setting of max_corr_read_errors (git-fixes). * md/raid10: prevent soft lockup while flush writes (git-fixes). * md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes). * md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git- fixes). * md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git- fixes). * md: Put the right device in md_seq_next (bsc#1217822). * md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes). * md: avoid signed overflow in slot_store() (git-fixes). * md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes). * md: drop queue limitation for RAID1 and RAID10 (git-fixes). * md: raid0: account for split bio in iostat accounting (git-fixes). * md: raid10 add nowait support (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * md: select BLOCK_LEGACY_AUTOLOAD (git-fixes). * memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167). * memblock: make memblock_find_in_range method private (jsc#PED-7167). * misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes). * misc: mei: client.c: return negative error code in mei_cl_write (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167). * mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167). * mm/slab: Add __free() support for kvfree (jsc#PED-7167). * mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167). * mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167). * mm: Add support for unaccepted memory (jsc#PED-7167). * mm: add pageblock_align() macro (jsc#PED-7167). * mm: add pageblock_aligned() macro (jsc#PED-7167). * mm: avoid passing 0 to __ffs() (jsc#PED-7167). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * mm: move kvmalloc-related functions to slab.h (jsc#PED-7167). * mm: new primitive kvmemdup() (jsc#PED-7167). * mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167). * mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes). * mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes). * mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes). * neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes). * net/rose: Fix Use-After-Free in rose_ioctl (git-fixes). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495). * net: ena: Destroy correct number of xdp queues upon failure (git-fixes). * net: ena: Fix XDP redirection error (git-fixes). * net: ena: Fix xdp drops handling due to multibuf packets (git-fixes). * net: ena: Flush XDP packets on error (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net: rfkill: gpio: set GPIO direction (git-fixes). * net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes). * net: usb: ax88179_178a: clean up pm calls (git-fixes). * net: usb: ax88179_178a: wol optimizations (git-fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local (git-fixes). * nfs: Fix O_DIRECT locking issues (bsc#1211162). * nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * nfs: Fix a potential data corruption (bsc#1211162). * nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162). * nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * nilfs2: fix missing error check for sb_set_blocksize call (git-fixes). * nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes). * nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * null_blk: fix poll request timeout handling (git-fixes). * nvme-core: check for too small lba shift (bsc#1214117). * nvme-pci: Add sleep quirk for Kingston drives (git-fixes). * nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes). * nvme-pci: do not set the NUMA node of device if it has none (git-fixes). * nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes). * nvme-rdma: do not try to stop unallocated queues (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * nvmet-auth: complete a request only after freeing the dhchap pointers (git- fixes). * of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes). * padata: Fix refcnt handling in padata_free_shell() (git-fixes). * parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes). * pci: loongson: Limit MRRS to 256 (git-fixes). * perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167). * pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes). * platform/surface: aggregator: fix recv_buf() return value (git-fixes). * platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes). * platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git- fixes). * platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git- fixes). * platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes). * platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes). * platform/x86: wmi: Skip blocks with zero instances (git-fixes). * powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523). * qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526). * qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526). * qed: fix LL2 RX buffer allocation (jsc#PED-1526). * qede: fix firmware halt over suspend and resume (jsc#PED-1526). * qla2xxx: add debug log for deprecated hw detected (bsc#1216032). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8169: Fix PCI error on system resume (git-fixes). * rdma/bnxt_re: Correct module description string (jsc#PED-1495). * rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes) * rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes) * rdma/hfi1: Workaround truncation compilation error (git-fixes) * rdma/hns: Add check for SL (git-fixes) * rdma/hns: Fix printing level of asynchronous events (git-fixes) * rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes) * rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes) * rdma/hns: The UD mode can only be configured with DCQCN (git-fixes) * regmap: fix bogus error on regcache_sync success (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * reset: Fix crash when freeing non-existent optional resets (git-fixes). * restore renamed device IDs for USB HID devices (git-fixes). * rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes). * rethook: Use __rcu pointer for rethook::handler (git-fixes). * ring-buffer: Do not try to put back write_stamp (git-fixes). * ring-buffer: Do not update before stamp when switching sub-buffers (git- fixes). * ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * ring-buffer: Fix slowpath of interrupted event (git-fixes). * ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes). * ring-buffer: Fix writing to the buffer with max_data_size (git-fixes). * ring-buffer: Force absolute timestamp on discard of event (git-fixes). * ring-buffer: Have saved event hold the entire event (git-fixes). * ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes). * serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes). * serial: sc16is7xx: address RX timeout interrupt errata (git-fixes). * soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes). * spi: atmel: Fix clock issue when using devices with different polarities (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167) * swiotlb: always set the number of areas before allocating the pool (git- fixes). * swiotlb: do not panic! (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix debugfs reporting of reserved memory pools (git-fixes). * swiotlb: fix slot alignment checks (bsc#1216559). * swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes). * swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes). * swiotlb: reduce the number of areas to match actual memory pool size (git- fixes). * swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes). * swiotlb: use the calculated number of areas (git-fixes). * tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes). * tracing/kprobes: Fix the description of variable length arguments (git- fixes). * tracing/kprobes: Fix the order of argument descriptions (git-fixes). * tracing/perf: Add interrupt_context_level() helper (git-fixes). * tracing/synthetic: fix kernel-doc warnings (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Have the user copy of synthetic event address use correct context (git-fixes). * tracing: Reuse logic from perf's get_recursion_context() (git-fixes). * tracing: Set actual size after ring buffer resize (git-fixes). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * ubifs: Fix memory leak of bud->log_hash (git-fixes). * ubifs: fix possible dereference after free (git-fixes). * usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git- fixes). * usb: aqc111: check packet for fixup for true limit (git-fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes). * usb: hub: Guard against accesses to uninitialized BOS descriptors (git- fixes). * usb: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes). * usb: serial: option: add Foxconn T99W265 with new baseline (git-fixes). * usb: serial: option: add Quectel EG912Y module support (git-fixes). * usb: serial: option: add Quectel RM500Q R13 firmware support (git-fixes). * usb: typec: bus: verify partner exists in typec_altmode_attention (git- fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes). * virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167). * virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167). * virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167). * virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167). * virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167). * virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * wifi: cfg80211: Add my certificate (git-fixes). * wifi: cfg80211: fix certs build to not depend on file order (git-fixes). * wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock (git- fixes). * wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes). * wifi: mac80211: mesh: check element parsing succeeded (git-fixes). * wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes). * x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167). * x86/boot/compressed: Reserve more memory for page tables (git-fixes). * x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167). * x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167). * x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes). * x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes). * x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167). * x86/cpu: Fix amd_check_microcode() declaration (git-fixes). * x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167). * x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927). * x86/entry: Do not allow external 0x80 interrupts (bsc#1217927). * x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes). * x86/fpu: Invalidate FPU state correctly on exec() (git-fixes). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/purgatory: Remove LTO flags (git-fixes). * x86/resctrl: Fix kernel-doc warnings (git-fixes). * x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167). * x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167). * x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167). * x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167). * x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167). * x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167). * x86/sev: Fix address space sparse warning (jsc#PED-7167). * x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167). * x86/sev: Mark snp_abort() noreturn (jsc#PED-7167). * x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167). * x86/sev: Use large PSC requests if applicable (jsc#PED-7167). * x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes). * x86/srso: Add SRSO mitigation for Hygon processors (git-fixes). * x86/srso: Fix SBPB enablement for (possible) future fixed HW (git-fixes). * x86/srso: Fix vulnerability reporting for missing microcode (git-fixes). * x86/tdx: Add unaccepted memory support (jsc#PED-7167). * x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167). * x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167). * x86/tdx: Refactor try_accept_one() (jsc#PED-7167). * x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167). * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * xfs: Rename __xfs_attr_rmtval_remove (git-fixes). * xfs: Use kvcalloc() instead of kvzalloc() (git-fixes). * xfs: aborting inodes on shutdown may need buffer lock (git-fixes). * xfs: add selinux labels to whiteout inodes (git-fixes). * xfs: clean up "%Ld/%Lu" which does not meet C standard (git-fixes). * xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes). * xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes). * xfs: convert flex-array declarations in xfs attr shortform objects (git- fixes). * xfs: decode scrub flags in ftrace output (git-fixes). * xfs: dump log intent items that cannot be recovered due to corruption (git- fixes). * xfs: fix a bug in the online fsck directory leaf1 bestcount check (git- fixes). * xfs: fix agf_fllast when repairing an empty AGFL (git-fixes). * xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes). * xfs: fix silly whitespace problems with kernel libxfs (git-fixes). * xfs: fix uninit warning in xfs_growfs_data (git-fixes). * xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes). * xfs: make sure maxlen is still congruent with prod when rounding down (git- fixes). * xfs: remove kmem_alloc_io() (git-fixes). * xfs: remove the xfs_dinode_t typedef (git-fixes). * xfs: remove the xfs_dqblk_t typedef (git-fixes). * xfs: remove the xfs_dsb_t typedef (git-fixes). * xfs: rename xfs_has_attr() (git-fixes). * xfs: replace snprintf in show functions with sysfs_emit (git-fixes). * xfs: return EINTR when a fatal signal terminates scrub (git-fixes). * xfs: sb verifier does not handle uncached sb buffer (git-fixes). * xfs: simplify two-level sysctl registration for xfs_table (git-fixes). * xfs: sysfs: use default_groups in kobj_type (git-fixes). * xfs: use swap() to make dabtree code cleaner (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-141=1 openSUSE-SLE-15.5-2024-141=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-141=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * reiserfs-kmp-azure-5.14.21-150500.33.29.1 * kernel-azure-optional-5.14.21-150500.33.29.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-livepatch-devel-5.14.21-150500.33.29.1 * kernel-azure-debugsource-5.14.21-150500.33.29.1 * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-extra-debuginfo-5.14.21-150500.33.29.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kselftests-kmp-azure-5.14.21-150500.33.29.1 * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * gfs2-kmp-azure-5.14.21-150500.33.29.1 * kernel-azure-devel-5.14.21-150500.33.29.1 * kernel-syms-azure-5.14.21-150500.33.29.1 * dlm-kmp-azure-5.14.21-150500.33.29.1 * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.29.1 * ocfs2-kmp-azure-5.14.21-150500.33.29.1 * cluster-md-kmp-azure-5.14.21-150500.33.29.1 * kernel-azure-extra-5.14.21-150500.33.29.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.29.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.29.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.29.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-5.14.21-150500.33.29.1 * kernel-azure-vdso-debuginfo-5.14.21-150500.33.29.1 * openSUSE Leap 15.5 (noarch) * kernel-source-azure-5.14.21-150500.33.29.1 * kernel-devel-azure-5.14.21-150500.33.29.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.29.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-azure-devel-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-devel-5.14.21-150500.33.29.1 * kernel-syms-azure-5.14.21-150500.33.29.1 * kernel-azure-debuginfo-5.14.21-150500.33.29.1 * kernel-azure-debugsource-5.14.21-150500.33.29.1 * Public Cloud Module 15-SP5 (noarch) * kernel-source-azure-5.14.21-150500.33.29.1 * kernel-devel-azure-5.14.21-150500.33.29.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212139 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214117 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1215952 * https://bugzilla.suse.com/show_bug.cgi?id=1216032 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217822 * https://bugzilla.suse.com/show_bug.cgi?id=1217927 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218092 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218229 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218397 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218461 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218643 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:31 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 12:30:31 -0000 Subject: SUSE-SU-2024:0140-1: important: Security update for libssh Message-ID: <170558103160.4190.1237274517328600703@smelt2.prg2.suse.org> # Security update for libssh Announcement ID: SUSE-SU-2024:0140-1 Rating: important References: * bsc#1211188 * bsc#1211190 * bsc#1218126 * bsc#1218186 * bsc#1218209 Cross-References: * CVE-2023-1667 * CVE-2023-2283 * CVE-2023-48795 * CVE-2023-6004 * CVE-2023-6918 CVSS scores: * CVE-2023-1667 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-1667 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2283 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-2283 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-6004 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6004 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6918 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6918 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves five vulnerabilities can now be installed. ## Description: This update for libssh fixes the following issues: Security fixes: * CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) * CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) * CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) * CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) * CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: * Update to version 0.9.8 * Allow @ in usernames when parsing from URI composes * Update to version 0.9.7 * Fix several memory leaks in GSSAPI handling code ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-140=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-140=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-140=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-140=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-140=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-140=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-140=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-140=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-140=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-140=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-140=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-140=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-140=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-140=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-140=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-140=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-140=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-140=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-140=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libssh4-64bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-64bit-0.9.8-150400.3.3.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libssh4-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * Basesystem Module 15-SP5 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * SUSE Manager Proxy 4.3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh-config-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libssh-config-0.9.8-150400.3.3.1 * libssh4-0.9.8-150400.3.3.1 * libssh-devel-0.9.8-150400.3.3.1 * libssh4-debuginfo-0.9.8-150400.3.3.1 * libssh-debugsource-0.9.8-150400.3.3.1 * SUSE Manager Server 4.3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150400.3.3.1 * libssh4-32bit-0.9.8-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1667.html * https://www.suse.com/security/cve/CVE-2023-2283.html * https://www.suse.com/security/cve/CVE-2023-48795.html * https://www.suse.com/security/cve/CVE-2023-6004.html * https://www.suse.com/security/cve/CVE-2023-6918.html * https://bugzilla.suse.com/show_bug.cgi?id=1211188 * https://bugzilla.suse.com/show_bug.cgi?id=1211190 * https://bugzilla.suse.com/show_bug.cgi?id=1218126 * https://bugzilla.suse.com/show_bug.cgi?id=1218186 * https://bugzilla.suse.com/show_bug.cgi?id=1218209 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:39 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 12:30:39 -0000 Subject: SUSE-SU-2024:0138-1: moderate: Security update for libqt5-qtbase Message-ID: <170558103924.4190.10127822620945040725@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2024:0138-1 Rating: moderate References: * bsc#1218413 Cross-References: * CVE-2023-51714 CVSS scores: * CVE-2023-51714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51714 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-138=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-138=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-138=1 openSUSE-SLE-15.5-2024-138=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-5.15.8+kde185-150500.4.16.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core5-5.15.8+kde185-150500.4.16.1 * libQt5Test5-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-5.15.8+kde185-150500.4.16.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network5-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.16.1 * Basesystem Module 15-SP5 (noarch) * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.16.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (x86_64) * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.16.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.16.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.16.1 * libQt5Core5-5.15.8+kde185-150500.4.16.1 * libQt5Test5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-5.15.8+kde185-150500.4.16.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Network5-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (noarch) * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.16.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.16.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Gui5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.16.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.16.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.16.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51714.html * https://bugzilla.suse.com/show_bug.cgi?id=1218413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:43 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 12:30:43 -0000 Subject: SUSE-SU-2024:0137-1: moderate: Security update for pam Message-ID: <170558104359.4190.8157920819971720103@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2024:0137-1 Rating: moderate References: * bsc#1218475 Cross-References: * CVE-2024-22365 CVSS scores: * CVE-2024-22365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-137=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-137=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-137=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-137=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * pam-devel-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * pam-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-extra-debuginfo-1.1.8-24.56.1 * pam-extra-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * pam-doc-1.1.8-24.56.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * pam-extra-32bit-1.1.8-24.56.1 * pam-debuginfo-32bit-1.1.8-24.56.1 * pam-32bit-1.1.8-24.56.1 * pam-extra-debuginfo-32bit-1.1.8-24.56.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * pam-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-extra-debuginfo-1.1.8-24.56.1 * pam-extra-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * pam-doc-1.1.8-24.56.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * pam-extra-32bit-1.1.8-24.56.1 * pam-debuginfo-32bit-1.1.8-24.56.1 * pam-32bit-1.1.8-24.56.1 * pam-extra-debuginfo-32bit-1.1.8-24.56.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * pam-1.1.8-24.56.1 * pam-debuginfo-1.1.8-24.56.1 * pam-extra-debuginfo-1.1.8-24.56.1 * pam-extra-1.1.8-24.56.1 * pam-debugsource-1.1.8-24.56.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * pam-doc-1.1.8-24.56.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * pam-extra-32bit-1.1.8-24.56.1 * pam-debuginfo-32bit-1.1.8-24.56.1 * pam-32bit-1.1.8-24.56.1 * pam-extra-debuginfo-32bit-1.1.8-24.56.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22365.html * https://bugzilla.suse.com/show_bug.cgi?id=1218475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:48 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 12:30:48 -0000 Subject: SUSE-SU-2024:0136-1: moderate: Security update for pam Message-ID: <170558104897.4190.1467797366004675195@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2024:0136-1 Rating: moderate References: * bsc#1217000 * bsc#1218475 Cross-References: * CVE-2024-22365 CVSS scores: * CVE-2024-22365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). * Check localtime_r() return value to fix crashing (bsc#1217000) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-136=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-136=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-136=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-136=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-136=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-136=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-136=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-136=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-136=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-136=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-136=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-136=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-136=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-136=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-136=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-136=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-136=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-136=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-136=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-136=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-136=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-136=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-136=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-136=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-136=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-136=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-136=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * Basesystem Module 15-SP5 (noarch) * pam-doc-1.3.0-150000.6.66.1 * Basesystem Module 15-SP5 (x86_64) * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * Development Tools Module 15-SP5 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Proxy 4.3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Proxy 4.3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Manager Server 4.3 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Manager Server 4.3 (x86_64) * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * SUSE Enterprise Storage 7.1 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Enterprise Storage 7.1 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE CaaS Platform 4.0 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * SUSE CaaS Platform 4.0 (noarch) * pam-doc-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * pam-debugsource-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pam-devel-1.3.0-150000.6.66.1 * pam-debugsource-1.3.0-150000.6.66.1 * pam-extra-debuginfo-1.3.0-150000.6.66.1 * pam-extra-1.3.0-150000.6.66.1 * pam-1.3.0-150000.6.66.1 * pam-debuginfo-1.3.0-150000.6.66.1 * openSUSE Leap 15.5 (x86_64) * pam-devel-32bit-1.3.0-150000.6.66.1 * pam-32bit-debuginfo-1.3.0-150000.6.66.1 * pam-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-1.3.0-150000.6.66.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.66.1 * openSUSE Leap 15.5 (noarch) * pam-doc-1.3.0-150000.6.66.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22365.html * https://bugzilla.suse.com/show_bug.cgi?id=1217000 * https://bugzilla.suse.com/show_bug.cgi?id=1218475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 12:30:53 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 12:30:53 -0000 Subject: SUSE-SU-2024:0135-1: important: Security update for rear27a Message-ID: <170558105376.4190.9639056543759838584@smelt2.prg2.suse.org> # Security update for rear27a Announcement ID: SUSE-SU-2024:0135-1 Rating: important References: * bsc#1218728 Cross-References: * CVE-2024-23301 CVSS scores: * CVE-2024-23301 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for rear27a fixes the following issues: * CVE-2024-23301: Fixed ReaR creates world-readable initrd with GRUB_RESCUE=Y. (bsc#1218728) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-135=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-135=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * rear27a-2.7-8.6.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le x86_64) * rear27a-2.7-8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23301.html * https://bugzilla.suse.com/show_bug.cgi?id=1218728 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:05 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0154-1: important: Security update for the Linux Kernel Message-ID: <170559540599.31379.13247143945796438314@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0154-1 Rating: important References: * bsc#1179610 * bsc#1215237 * bsc#1217250 * bsc#1217709 * bsc#1217946 * bsc#1217947 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves seven vulnerabilities, contains one feature and has two security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * io_uring: fix 32-bit compatability with sendmsg/recvmsg (bsc#1217709). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-154=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-154=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-154=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-154=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-154=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-1-150200.5.3.1 * kernel-livepatch-5_3_18-150200_24_175-default-1-150200.5.3.1 * kernel-default-livepatch-devel-5.3.18-150200.24.175.1 * kernel-default-livepatch-5.3.18-150200.24.175.1 * kernel-livepatch-SLE15-SP2_Update_44-debugsource-1-150200.5.3.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.3.18-150200.24.175.1 * cluster-md-kmp-default-5.3.18-150200.24.175.1 * gfs2-kmp-default-debuginfo-5.3.18-150200.24.175.1 * cluster-md-kmp-default-debuginfo-5.3.18-150200.24.175.1 * ocfs2-kmp-default-debuginfo-5.3.18-150200.24.175.1 * dlm-kmp-default-debuginfo-5.3.18-150200.24.175.1 * dlm-kmp-default-5.3.18-150200.24.175.1 * ocfs2-kmp-default-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150200.24.175.1 * kernel-preempt-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-default-devel-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-devel-5.3.18-150200.24.175.1 * kernel-obs-build-5.3.18-150200.24.175.1 * kernel-default-base-5.3.18-150200.24.175.1.150200.9.89.1 * kernel-default-devel-5.3.18-150200.24.175.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-debuginfo-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-obs-build-debugsource-5.3.18-150200.24.175.1 * kernel-preempt-debugsource-5.3.18-150200.24.175.1 * kernel-syms-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.175.1 * kernel-devel-5.3.18-150200.24.175.1 * kernel-macros-5.3.18-150200.24.175.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.3.18-150200.24.175.1 * reiserfs-kmp-default-5.3.18-150200.24.175.1 * kernel-obs-build-5.3.18-150200.24.175.1 * kernel-default-base-5.3.18-150200.24.175.1.150200.9.89.1 * kernel-default-devel-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-obs-build-debugsource-5.3.18-150200.24.175.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.175.1 * kernel-syms-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.175.1 * kernel-devel-5.3.18-150200.24.175.1 * kernel-macros-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-debugsource-5.3.18-150200.24.175.1 * kernel-preempt-devel-5.3.18-150200.24.175.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * kernel-default-devel-debuginfo-5.3.18-150200.24.175.1 * reiserfs-kmp-default-5.3.18-150200.24.175.1 * kernel-obs-build-5.3.18-150200.24.175.1 * kernel-default-base-5.3.18-150200.24.175.1.150200.9.89.1 * kernel-default-devel-5.3.18-150200.24.175.1 * kernel-default-debuginfo-5.3.18-150200.24.175.1 * kernel-obs-build-debugsource-5.3.18-150200.24.175.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.175.1 * kernel-syms-5.3.18-150200.24.175.1 * kernel-default-debugsource-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * kernel-source-5.3.18-150200.24.175.1 * kernel-devel-5.3.18-150200.24.175.1 * kernel-macros-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) * kernel-preempt-5.3.18-150200.24.175.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * kernel-preempt-debuginfo-5.3.18-150200.24.175.1 * kernel-preempt-debugsource-5.3.18-150200.24.175.1 * kernel-preempt-devel-5.3.18-150200.24.175.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.175.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217709 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:10 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 16:30:10 -0000 Subject: SUSE-SU-2024:0153-1: important: Security update for the Linux Kernel Message-ID: <170559541099.31379.13937760975279186221@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0153-1 Rating: important References: * bsc#1179610 * bsc#1215237 * bsc#1215375 * bsc#1217250 * bsc#1217709 * bsc#1217946 * bsc#1217947 * bsc#1218105 * bsc#1218253 * bsc#1218258 * bsc#1218559 * jsc#PED-5021 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves seven vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * clocksource: Avoid accidental unstable marking of clocksources (bsc#1218105). * clocksource: Suspend the watchdog temporarily when high read latency detected (bsc#1218105). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021). * efi/mokvar: Reserve the table only if it is in boot services data (bsc#1215375). * io_uring: fix 32-bit compatability with sendmsg/recvmsg (bsc#1217709). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-153=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-153=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-153=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-153=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-153=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-153=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-153=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-153=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-153=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-153=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (noarch) * kernel-macros-5.3.18-150300.59.147.1 * kernel-docs-html-5.3.18-150300.59.147.1 * kernel-source-vanilla-5.3.18-150300.59.147.1 * kernel-devel-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.147.2 * kernel-debug-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-debugsource-5.3.18-150300.59.147.2 * kernel-debug-livepatch-devel-5.3.18-150300.59.147.2 * kernel-kvmsmall-devel-5.3.18-150300.59.147.2 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.147.2 * kernel-debug-devel-5.3.18-150300.59.147.2 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-debug-debuginfo-5.3.18-150300.59.147.2 * kernel-debug-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.147.2 * kernel-debug-debugsource-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kselftests-kmp-default-5.3.18-150300.59.147.2 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * cluster-md-kmp-default-5.3.18-150300.59.147.2 * kernel-default-optional-debuginfo-5.3.18-150300.59.147.2 * kernel-default-livepatch-devel-5.3.18-150300.59.147.2 * kernel-default-extra-5.3.18-150300.59.147.2 * kernel-obs-qa-5.3.18-150300.59.147.1 * kernel-default-base-rebuild-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-extra-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * dlm-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-livepatch-5.3.18-150300.59.147.2 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * ocfs2-kmp-default-5.3.18-150300.59.147.2 * dlm-kmp-default-5.3.18-150300.59.147.2 * kernel-default-optional-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * gfs2-kmp-default-5.3.18-150300.59.147.2 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_40-debugsource-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_147-default-1-150300.7.3.2 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_147-preempt-1-150300.7.3.2 * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-1-150300.7.3.2 * openSUSE Leap 15.3 (aarch64 x86_64) * cluster-md-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-optional-5.3.18-150300.59.147.2 * dlm-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-livepatch-devel-5.3.18-150300.59.147.2 * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * gfs2-kmp-preempt-5.3.18-150300.59.147.2 * reiserfs-kmp-preempt-5.3.18-150300.59.147.2 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * ocfs2-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.147.2 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * kselftests-kmp-preempt-5.3.18-150300.59.147.2 * kernel-preempt-extra-5.3.18-150300.59.147.2 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.147.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.147.1 * openSUSE Leap 15.3 (aarch64) * dtb-marvell-5.3.18-150300.59.147.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * dtb-freescale-5.3.18-150300.59.147.1 * gfs2-kmp-64kb-5.3.18-150300.59.147.2 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * dtb-zte-5.3.18-150300.59.147.1 * dlm-kmp-64kb-5.3.18-150300.59.147.2 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.147.2 * dtb-lg-5.3.18-150300.59.147.1 * dtb-renesas-5.3.18-150300.59.147.1 * dtb-al-5.3.18-150300.59.147.1 * dtb-allwinner-5.3.18-150300.59.147.1 * dtb-amd-5.3.18-150300.59.147.1 * dtb-apm-5.3.18-150300.59.147.1 * dtb-socionext-5.3.18-150300.59.147.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.147.2 * dtb-sprd-5.3.18-150300.59.147.1 * dtb-arm-5.3.18-150300.59.147.1 * ocfs2-kmp-64kb-5.3.18-150300.59.147.2 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kselftests-kmp-64kb-5.3.18-150300.59.147.2 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-extra-5.3.18-150300.59.147.2 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.147.2 * dtb-altera-5.3.18-150300.59.147.1 * kernel-64kb-devel-5.3.18-150300.59.147.2 * dtb-hisilicon-5.3.18-150300.59.147.1 * dtb-mediatek-5.3.18-150300.59.147.1 * dtb-xilinx-5.3.18-150300.59.147.1 * dtb-broadcom-5.3.18-150300.59.147.1 * dtb-cavium-5.3.18-150300.59.147.1 * reiserfs-kmp-64kb-5.3.18-150300.59.147.2 * dtb-exynos-5.3.18-150300.59.147.1 * dtb-qcom-5.3.18-150300.59.147.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-optional-5.3.18-150300.59.147.2 * dtb-amlogic-5.3.18-150300.59.147.1 * dtb-nvidia-5.3.18-150300.59.147.1 * dtb-rockchip-5.3.18-150300.59.147.1 * cluster-md-kmp-64kb-5.3.18-150300.59.147.2 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-5.3.18-150300.59.147.2 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-livepatch-5_3_18-150300_59_147-default-1-150300.7.3.2 * kernel-default-livepatch-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.147.2 * ocfs2-kmp-default-5.3.18-150300.59.147.2 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * dlm-kmp-default-5.3.18-150300.59.147.2 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * cluster-md-kmp-default-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.147.2 * dlm-kmp-default-debuginfo-5.3.18-150300.59.147.2 * gfs2-kmp-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * kernel-64kb-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.147.2 * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * kernel-64kb-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.147.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-64kb-debugsource-5.3.18-150300.59.147.2 * kernel-64kb-devel-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150300.59.147.2 * kernel-preempt-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-debugsource-5.3.18-150300.59.147.2 * reiserfs-kmp-default-5.3.18-150300.59.147.2 * kernel-syms-5.3.18-150300.59.147.1 * kernel-default-debuginfo-5.3.18-150300.59.147.2 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.147.2 * kernel-obs-build-5.3.18-150300.59.147.2 * kernel-default-devel-5.3.18-150300.59.147.2 * kernel-preempt-debuginfo-5.3.18-150300.59.147.2 * kernel-preempt-devel-5.3.18-150300.59.147.2 * SUSE Enterprise Storage 7.1 (noarch) * kernel-devel-5.3.18-150300.59.147.1 * kernel-macros-5.3.18-150300.59.147.1 * kernel-source-5.3.18-150300.59.147.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.147.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.147.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.147.2.150300.18.86.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.147.2 * kernel-default-debugsource-5.3.18-150300.59.147.2 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215375 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217709 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1218105 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://jira.suse.com/browse/PED-5021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 16:30:22 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 16:30:22 -0000 Subject: SUSE-SU-2024:0148-1: important: Security update for rear23a Message-ID: <170559542212.31379.16112016205606045788@smelt2.prg2.suse.org> # Security update for rear23a Announcement ID: SUSE-SU-2024:0148-1 Rating: important References: * bsc#1218728 Cross-References: * CVE-2024-23301 CVSS scores: * CVE-2024-23301 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for rear23a fixes the following issues: * CVE-2024-23301: Fixed ReaR creates world-readable initrd with GRUB_RESCUE=Y. (bsc#1218728) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-148=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-148=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * rear23a-2.3.a-3.9.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le x86_64) * rear23a-2.3.a-3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23301.html * https://bugzilla.suse.com/show_bug.cgi?id=1218728 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:15 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 20:30:15 -0000 Subject: SUSE-SU-2024:0160-1: important: Security update for the Linux Kernel Message-ID: <170560981530.13525.5637062957267457663@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0160-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1211162 * bsc#1211226 * bsc#1212139 * bsc#1212584 * bsc#1214117 * bsc#1214158 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1215952 * bsc#1216032 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217822 * bsc#1217927 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218092 * bsc#1218139 * bsc#1218184 * bsc#1218229 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218397 * bsc#1218447 * bsc#1218461 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218643 * bsc#1218738 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7167 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves 10 vulnerabilities, contains three features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6606: Fixed an out-of-bounds read vulnerability in smbCalcSize in fs/smb/client/netmisc.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217947). * CVE-2023-6610: Fixed an out-of-bounds read vulnerability in smb2_dump_detail in fs/smb/client/smb2ops.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217946). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253). The following non-security bugs were fixed: * Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167). * Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167). * Documentation: KVM: update msr.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167). * Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167). * Documentation: drop more IDE boot options and ide-cd.rst (git-fixes). * Documentation: qat: Use code block for qat sysfs example (git-fixes). * Drop Documentation/ide/ (git-fixes). * Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738) * Fix crash on screen resize (bsc#1218229) * Fix drm gem object underflow (bsc#1218092) * Revert "PCI/ASPM: Remove pcie_aspm_pm_state_change()" (git-fixes). * Revert "PCI: acpiphp: Reassign resources on bridge if necessary" (git- fixes). * Revert "md: unlock mddev before reap sync_thread in action_store" (git- fixes). * Revert "swiotlb: panic if nslabs is too small" (git-fixes). * Revert "xhci: Loosen RPM as default policy to cover for AMD xHC 1.1" (git- fixes). * Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces * acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git- fixes). * acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes). * acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes). * afs: Fix afs_server_list to be cleaned up with RCU (git-fixes). * afs: Fix dynamic root lookup DNS check (git-fixes). * afs: Fix file locking on R/O volumes to operate in local mode (git-fixes). * afs: Fix overwriting of result of DNS query (git-fixes). * afs: Fix refcount underflow from error handling race (git-fixes). * afs: Fix the dynamic root's d_delete to always delete unused dentries (git- fixes). * afs: Fix use-after-free due to get/remove race in volume tree (git-fixes). * afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes). * afs: Return ENOENT if no cell DNS record can be found (git-fixes). * alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes). * alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes). * alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git- fixes). * alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes). * alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes). * alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes). * alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes). * alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes). * alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git- fixes). * alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes). * alsa: hda/realtek: add new Framework laptop to quirks (git-fixes). * alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes). * alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes). * alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes). * alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes). * alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes). * alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes). * alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes). * apparmor: Free up __cleanup() name (jsc#PED-7167). * arm64: dts: arm: add missing cache properties (git-fixes) * arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes) * arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes) * arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167). * arm64: mm: Fix "rodata=on" when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git- fixes) * arm: OMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes). * arm: PL011: Fix DMA support (git-fixes). * asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes). * asoc: hdmi-codec: fix missing report for jack initial status (git-fixes). * asoc: meson: g12a-toacodec: Fix event generation (git-fixes). * asoc: meson: g12a-toacodec: Validate written enum values (git-fixes). * asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes). * asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes). * asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes). * bitmap: unify find_bit operations (jsc#PED-7167). * block: fix revalidate performance regression (bsc#1216057). * bluetooth: Fix deadlock in vhci_send_frame (git-fixes). * bluetooth: L2CAP: Send reject on command corrupted request (git-fixes). * bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git- fixes). * bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461). * bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git- fixes). * bluetooth: hci_event: shut up a false-positive warning (git-fixes). * bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * bnxt: do not handle XDP in netpoll (jsc#PED-1495). * bnxt_en: Clear resource reservation during resume (jsc#PED-1495). * bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495). * bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495). * bnxt_en: Fix page pool logic for page size >= 64K (jsc#PED-1495). * bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495). * bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes). * bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * cleanup: Make no_free_ptr() __must_check (jsc#PED-7167). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167). * crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167). * crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167). * crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167). * crypto: ccp - Add a quirk to firmware update (jsc#PED-7167). * crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167). * crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167). * crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167). * crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167). * crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167). * crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167). * crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167). * crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167). * crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167). * crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167). * crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167). * crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167). * crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167). * crypto: ccp - remove unneeded semicolon (jsc#PED-7167). * crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167). * dm verity: initialize fec io before freeing it (git-fixes). * dm-verity: do not use blocking calls from tasklets (git-fixes). * dm: add cond_resched() to dm_wq_requeue_work() (git-fixes). * dm: do not attempt to queue IO under RCU protection (git-fixes). * dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952). * dm: fix improper splitting for abnormal bios (bsc#1215952). * dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167). * doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021) * doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021) * doc/README.SUSE: Simplify the list of references (jsc#PED-5021) * drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes). * drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139). * drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes). * drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes). * drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes). * drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes). * drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes). * drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes). * drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes). * drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes). * drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git- fixes). * drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes). * drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes). * drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes). * drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes). * drm/bridge: parade-ps8640: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes). * drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes). * drm/bridge: ti-sn65dsi86: Never store more than msg->size bytes in AUX xfer (git-fixes). * drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes). * drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes). * drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes). * drm/i915/lvds: Use REG_BIT() & co (git-fixes). * drm/i915/mtl: limit second scaler vertical scaling in ver >= 14 (git-fixes). * drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git- fixes). * drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes). * drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes). * drm/i915: Reject async flips with bigjoiner (git-fixes). * drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes). * drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167). * drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git- fixes). * drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git- fixes). * efi/libstub: Implement support for unaccepted memory (jsc#PED-7167). * efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167). * efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167). * efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167). * efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167). * efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167). * efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167). * efi: Add unaccepted memory support (jsc#PED-7167). * efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167). * efi: libstub: install boot-time memory map as config table (jsc#PED-7167). * efi: libstub: remove DT dependency from generic stub (jsc#PED-7167). * efi: libstub: remove pointless goto kludge (jsc#PED-7167). * efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167). * efi: libstub: unify initrd loading between architectures (jsc#PED-7167). * floppy: fix MAX_ORDER usage (jsc#PED-7167). * fprobe: Fix to ensure the number of active retprobes is not zero (git- fixes). * fs/jfs: Add check for negative db_l2nbperpage (git-fixes). * fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes). * fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git- fixes). * fs/remap: constrain dedupe of EOF blocks (git-fixes). * fs: avoid empty option when generating legacy mount string (git-fixes). * fs: fix an infinite loop in iomap_fiemap (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * genwqe: fix MAX_ORDER usage (jsc#PED-7167). * gfs2: Add wrapper for iomap_file_buffered_write (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Clean up function may_grant (git-fixes). * gfs2: Fix filesystem block deallocation for short writes (git-fixes). * gfs2: Fix gfs2_release for non-writers regression (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix length of holes reported at end-of-file (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Improve gfs2_make_fs_rw error handling (git-fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Silence "suspicious RCU usage in gfs2_permission" warning (git-fixes). * gfs2: Switch from strlcpy to strscpy (git-fixes). * gfs2: fix an oops in gfs2_permission (git-fixes). * gfs2: gfs2_setattr_size error path fix (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: jdata writepage fix (git-fixes). * gfs2: use i_lock spin_lock for inode qadata (git-fixes). * gpiolib: sysfs: Fix error handling on failed export (git-fixes). * gve: Fixes for napi_poll when budget is 0 (git-fixes). * gve: Use size_add() in call to struct_size() (git-fixes). * hid: add ALWAYS_POLL quirk for Apple kb (git-fixes). * hid: glorious: fix Glorious Model I HID report (git-fixes). * hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes). * hid: hid-asus: reset the backlight brightness level on resume (git-fixes). * hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git- fixes). * hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes). * hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes). * hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git- fixes). * i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes). * i2c: core: Fix atomic xfer check for non-preempt config (git-fixes). * i2c: designware: Fix corrupted memory seen in the ISR (git-fixes). * i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372). * i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372). * i40e: Fix unexpected MFS warning message (jsc#PED-372). * i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372). * i40e: fix misleading debug logs (jsc#PED-372). * i40e: fix potential NULL pointer dereferencing of pf->vf i40e_sync_vsi_filters() (jsc#PED-372). * i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372). * i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372). * ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes) * ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes) * igb: Avoid starting unnecessary workqueues (jsc#PED-370). * igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370). * igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370). * igb: disable virtualization features on 82580 (jsc#PED-370). * igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370). * igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375). * igc: Expose tx-usecs coalesce setting to user (jsc#PED-375). * igc: Fix ambiguity in the ethtool advertising (jsc#PED-375). * igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375). * igc: Fix the typo in the PTM Control macro (jsc#PED-375). * iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git- fixes). * iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes). * iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes). * iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes). * input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes). * input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes). * input: soc_button_array - add mapping for airplane mode button (git-fixes). * input: xpad - add HyperX Clutch Gladiate Support (git-fixes). * interconnect: Treat xlate() returning NULL node as an error (git-fixes). * iomap: Fix iomap_dio_rw return value for user copies (git-fixes). * iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167). * iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git- fixes). * jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes). * jfs: fix array-index-out-of-bounds in diAlloc (git-fixes). * jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount (git-fixes). * jfs: validate max amount of blocks before allocation (git-fixes). * kABI: Preserve the type of rethook::handler (git-fixes). * kABI: restore void return to typec_altmode_attention (git-fixes). * kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff * kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167) * kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167). * kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167). * kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167). * kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167). * kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167). * kconfig: fix memory leak from range properties (git-fixes). * kprobes: consistent rcu api usage for kretprobe holder (git-fixes). * kvm: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167). * kvm: s390/mm: Properly reset no-dat (git-fixes bsc#1218056). * kvm: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933). * lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes). * libceph: use kernel_connect() (bsc#1217981). * locking: Introduce __cleanup() based infrastructure (jsc#PED-7167). * locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes). * md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes). * md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes). * md/md-bitmap: remove unnecessary local variable in backlog_store() (git- fixes). * md/raid0: add discard support for the 'original' layout (git-fixes). * md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes). * md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes). * md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes). * md/raid10: fix io loss while replacement replace rdev (git-fixes). * md/raid10: fix leak of 'r10bio->remaining' for recovery (git-fixes). * md/raid10: fix memleak for 'conf->bio_split' (git-fixes). * md/raid10: fix memleak of md thread (git-fixes). * md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes). * md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git- fixes). * md/raid10: fix overflow of md/safe_mode_delay (git-fixes). * md/raid10: fix task hung in raid10d (git-fixes). * md/raid10: fix the condition to call bio_end_io_acct() (git-fixes). * md/raid10: fix wrong setting of max_corr_read_errors (git-fixes). * md/raid10: prevent soft lockup while flush writes (git-fixes). * md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes). * md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes). * md/raid1: free the r1bio before waiting for blocked rdev (git-fixes). * md/raid1: hold the barrier until handle_read_error() finishes (git-fixes). * md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes). * md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git- fixes). * md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git- fixes). * md: Put the right device in md_seq_next (bsc#1217822). * md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes). * md: avoid signed overflow in slot_store() (git-fixes). * md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes). * md: drop queue limitation for RAID1 and RAID10 (git-fixes). * md: raid0: account for split bio in iostat accounting (git-fixes). * md: raid10 add nowait support (git-fixes). * md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes). * md: restore 'noio_flag' for the last mddev_resume() (git-fixes). * md: select BLOCK_LEGACY_AUTOLOAD (git-fixes). * memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167). * memblock: make memblock_find_in_range method private (jsc#PED-7167). * misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes). * misc: mei: client.c: return negative error code in mei_cl_write (git-fixes). * mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files. * mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167). * mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167). * mm/slab: Add __free() support for kvfree (jsc#PED-7167). * mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167). * mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167). * mm: Add support for unaccepted memory (jsc#PED-7167). * mm: add pageblock_align() macro (jsc#PED-7167). * mm: add pageblock_aligned() macro (jsc#PED-7167). * mm: avoid passing 0 to __ffs() (jsc#PED-7167). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * mm: move kvmalloc-related functions to slab.h (jsc#PED-7167). * mm: new primitive kvmemdup() (jsc#PED-7167). * mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167). * mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes). * mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes). * mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes). * neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes). * net/rose: Fix Use-After-Free in rose_ioctl (git-fixes). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes). * net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495). * net: ena: Destroy correct number of xdp queues upon failure (git-fixes). * net: ena: Fix XDP redirection error (git-fixes). * net: ena: Fix xdp drops handling due to multibuf packets (git-fixes). * net: ena: Flush XDP packets on error (git-fixes). * net: mana: select PAGE_POOL (git-fixes). * net: rfkill: gpio: set GPIO direction (git-fixes). * net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes). * net: usb: ax88179_178a: clean up pm calls (git-fixes). * net: usb: ax88179_178a: wol optimizations (git-fixes). * net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes). * nfc: llcp_core: Hold a ref to llcp_local->dev when holding a ref to llcp_local (git-fixes). * nfs: Fix O_DIRECT locking issues (bsc#1211162). * nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * nfs: Fix a potential data corruption (bsc#1211162). * nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162). * nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * nilfs2: fix missing error check for sb_set_blocksize call (git-fixes). * nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes). * nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * null_blk: fix poll request timeout handling (git-fixes). * nvme-core: check for too small lba shift (bsc#1214117). * nvme-pci: Add sleep quirk for Kingston drives (git-fixes). * nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes). * nvme-pci: do not set the NUMA node of device if it has none (git-fixes). * nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes). * nvme-rdma: do not try to stop unallocated queues (git-fixes). * nvme: sanitize metadata bounce buffer for reads (git-fixes). * nvmet-auth: complete a request only after freeing the dhchap pointers (git- fixes). * of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes). * padata: Fix refcnt handling in padata_free_shell() (git-fixes). * parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes). * pci: loongson: Limit MRRS to 256 (git-fixes). * perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167). * pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes). * platform/surface: aggregator: fix recv_buf() return value (git-fixes). * platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes). * platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git- fixes). * platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git- fixes). * platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes). * platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes). * platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes). * platform/x86: wmi: Skip blocks with zero instances (git-fixes). * powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523). * qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526). * qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526). * qed: fix LL2 RX buffer allocation (jsc#PED-1526). * qede: fix firmware halt over suspend and resume (jsc#PED-1526). * qla2xxx: add debug log for deprecated hw detected (bsc#1216032). * r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes). * r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes). * r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes). * r8169: Fix PCI error on system resume (git-fixes). * rdma/bnxt_re: Correct module description string (jsc#PED-1495). * rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes) * rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes) * rdma/hfi1: Workaround truncation compilation error (git-fixes) * rdma/hns: Add check for SL (git-fixes) * rdma/hns: Fix printing level of asynchronous events (git-fixes) * rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes) * rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes) * rdma/hns: The UD mode can only be configured with DCQCN (git-fixes) * regmap: fix bogus error on regcache_sync success (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * reset: Fix crash when freeing non-existent optional resets (git-fixes). * restore renamed device IDs for USB HID devices (git-fixes). * rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes). * rethook: Use __rcu pointer for rethook::handler (git-fixes). * ring-buffer: Do not try to put back write_stamp (git-fixes). * ring-buffer: Do not update before stamp when switching sub-buffers (git- fixes). * ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes). * ring-buffer: Fix memory leak of free page (git-fixes). * ring-buffer: Fix slowpath of interrupted event (git-fixes). * ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes). * ring-buffer: Fix writing to the buffer with max_data_size (git-fixes). * ring-buffer: Force absolute timestamp on discard of event (git-fixes). * ring-buffer: Have saved event hold the entire event (git-fixes). * ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes). * s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes). * serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes). * serial: sc16is7xx: address RX timeout interrupt errata (git-fixes). * soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes). * spi: atmel: Fix clock issue when using devices with different polarities (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167) * swiotlb: always set the number of areas before allocating the pool (git- fixes). * swiotlb: do not panic! (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix debugfs reporting of reserved memory pools (git-fixes). * swiotlb: fix slot alignment checks (bsc#1216559). * swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes). * swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes). * swiotlb: reduce the number of areas to match actual memory pool size (git- fixes). * swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes). * swiotlb: use the calculated number of areas (git-fixes). * tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes). * tracing/kprobes: Fix the description of variable length arguments (git- fixes). * tracing/kprobes: Fix the order of argument descriptions (git-fixes). * tracing/perf: Add interrupt_context_level() helper (git-fixes). * tracing/synthetic: fix kernel-doc warnings (git-fixes). * tracing: Always update snapshot buffer size (git-fixes). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Disable snapshot buffer when stopping instance tracers (git-fixes). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix blocked reader of snapshot buffer (git-fixes). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036). * tracing: Have the user copy of synthetic event address use correct context (git-fixes). * tracing: Reuse logic from perf's get_recursion_context() (git-fixes). * tracing: Set actual size after ring buffer resize (git-fixes). * tracing: Stop current tracer when resizing buffer (git-fixes). * tracing: Update snapshot buffer on resize if it is allocated (git-fixes). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * tracing: relax trace_event_eval_update() execution with cond_resched() (git- fixes). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * ubifs: Fix memory leak of bud->log_hash (git-fixes). * ubifs: fix possible dereference after free (git-fixes). * usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git- fixes). * usb: aqc111: check packet for fixup for true limit (git-fixes). * usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes). * usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes). * usb: hub: Guard against accesses to uninitialized BOS descriptors (git- fixes). * usb: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes). * usb: serial: option: add Foxconn T99W265 with new baseline (git-fixes). * usb: serial: option: add Quectel EG912Y module support (git-fixes). * usb: serial: option: add Quectel RM500Q R13 firmware support (git-fixes). * usb: typec: bus: verify partner exists in typec_altmode_attention (git- fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes). * virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167). * virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167). * virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167). * virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167). * virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167). * virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * wifi: cfg80211: Add my certificate (git-fixes). * wifi: cfg80211: fix certs build to not depend on file order (git-fixes). * wifi: iwlwifi: pcie: add another missing bh-disable for rxq->lock (git- fixes). * wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes). * wifi: mac80211: mesh: check element parsing succeeded (git-fixes). * wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes). * x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167). * x86/boot/compressed: Reserve more memory for page tables (git-fixes). * x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167). * x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167). * x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes). * x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes). * x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167). * x86/cpu: Fix amd_check_microcode() declaration (git-fixes). * x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167). * x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927). * x86/entry: Do not allow external 0x80 interrupts (bsc#1217927). * x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes). * x86/fpu: Invalidate FPU state correctly on exec() (git-fixes). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/purgatory: Remove LTO flags (git-fixes). * x86/resctrl: Fix kernel-doc warnings (git-fixes). * x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167). * x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167). * x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167). * x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167). * x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167). * x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167). * x86/sev: Fix address space sparse warning (jsc#PED-7167). * x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167). * x86/sev: Mark snp_abort() noreturn (jsc#PED-7167). * x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167). * x86/sev: Use large PSC requests if applicable (jsc#PED-7167). * x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes). * x86/srso: Add SRSO mitigation for Hygon processors (git-fixes). * x86/srso: Fix SBPB enablement for (possible) future fixed HW (git-fixes). * x86/srso: Fix vulnerability reporting for missing microcode (git-fixes). * x86/tdx: Add unaccepted memory support (jsc#PED-7167). * x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167). * x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167). * x86/tdx: Refactor try_accept_one() (jsc#PED-7167). * x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167). * x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * xfs: Rename __xfs_attr_rmtval_remove (git-fixes). * xfs: Use kvcalloc() instead of kvzalloc() (git-fixes). * xfs: aborting inodes on shutdown may need buffer lock (git-fixes). * xfs: add selinux labels to whiteout inodes (git-fixes). * xfs: clean up "%Ld/%Lu" which does not meet C standard (git-fixes). * xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes). * xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes). * xfs: convert flex-array declarations in xfs attr shortform objects (git- fixes). * xfs: decode scrub flags in ftrace output (git-fixes). * xfs: dump log intent items that cannot be recovered due to corruption (git- fixes). * xfs: fix a bug in the online fsck directory leaf1 bestcount check (git- fixes). * xfs: fix agf_fllast when repairing an empty AGFL (git-fixes). * xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes). * xfs: fix silly whitespace problems with kernel libxfs (git-fixes). * xfs: fix uninit warning in xfs_growfs_data (git-fixes). * xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes). * xfs: make sure maxlen is still congruent with prod when rounding down (git- fixes). * xfs: remove kmem_alloc_io() (git-fixes). * xfs: remove the xfs_dinode_t typedef (git-fixes). * xfs: remove the xfs_dqblk_t typedef (git-fixes). * xfs: remove the xfs_dsb_t typedef (git-fixes). * xfs: rename xfs_has_attr() (git-fixes). * xfs: replace snprintf in show functions with sysfs_emit (git-fixes). * xfs: return EINTR when a fatal signal terminates scrub (git-fixes). * xfs: sb verifier does not handle uncached sb buffer (git-fixes). * xfs: simplify two-level sysctl registration for xfs_table (git-fixes). * xfs: sysfs: use default_groups in kobj_type (git-fixes). * xfs: use swap() to make dabtree code cleaner (git-fixes). * xhci: Clear EHB bit only at end of interrupt handler (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-160=1 openSUSE-SLE-15.5-2024-160=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-160=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-160=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-160=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-160=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-160=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-160=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-160=1 ## Package List: * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (noarch) * kernel-source-vanilla-5.14.21-150500.55.44.1 * kernel-macros-5.14.21-150500.55.44.1 * kernel-docs-html-5.14.21-150500.55.44.1 * kernel-source-5.14.21-150500.55.44.1 * kernel-devel-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-devel-5.14.21-150500.55.44.1 * kernel-debug-debugsource-5.14.21-150500.55.44.1 * kernel-debug-livepatch-devel-5.14.21-150500.55.44.1 * kernel-debug-debuginfo-5.14.21-150500.55.44.1 * kernel-debug-devel-debuginfo-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (x86_64) * kernel-default-vdso-debuginfo-5.14.21-150500.55.44.1 * kernel-kvmsmall-vdso-5.14.21-150500.55.44.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.44.1 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.44.1 * kernel-default-vdso-5.14.21-150500.55.44.1 * kernel-debug-vdso-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150500.55.44.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.44.1 * kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-kvmsmall-debugsource-5.14.21-150500.55.44.1 * kernel-default-base-rebuild-5.14.21-150500.55.44.1.150500.6.19.2 * kernel-kvmsmall-devel-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150500.55.44.1 * kernel-default-optional-5.14.21-150500.55.44.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.44.1 * kselftests-kmp-default-5.14.21-150500.55.44.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-syms-5.14.21-150500.55.44.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.44.1 * kernel-obs-qa-5.14.21-150500.55.44.1 * kernel-obs-build-debugsource-5.14.21-150500.55.44.1 * gfs2-kmp-default-5.14.21-150500.55.44.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-livepatch-devel-5.14.21-150500.55.44.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-default-devel-5.14.21-150500.55.44.1 * cluster-md-kmp-default-5.14.21-150500.55.44.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-extra-5.14.21-150500.55.44.1 * kernel-obs-build-5.14.21-150500.55.44.1 * ocfs2-kmp-default-5.14.21-150500.55.44.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-livepatch-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * reiserfs-kmp-default-5.14.21-150500.55.44.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.44.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_44-default-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-1-150500.11.5.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-1-150500.11.5.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.44.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64) * dtb-allwinner-5.14.21-150500.55.44.1 * kselftests-kmp-64kb-5.14.21-150500.55.44.1 * dtb-amlogic-5.14.21-150500.55.44.1 * kernel-64kb-debugsource-5.14.21-150500.55.44.1 * dtb-arm-5.14.21-150500.55.44.1 * cluster-md-kmp-64kb-5.14.21-150500.55.44.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * dtb-apple-5.14.21-150500.55.44.1 * dtb-renesas-5.14.21-150500.55.44.1 * dtb-freescale-5.14.21-150500.55.44.1 * dtb-broadcom-5.14.21-150500.55.44.1 * dtb-cavium-5.14.21-150500.55.44.1 * dtb-hisilicon-5.14.21-150500.55.44.1 * dtb-altera-5.14.21-150500.55.44.1 * kernel-64kb-optional-5.14.21-150500.55.44.1 * reiserfs-kmp-64kb-5.14.21-150500.55.44.1 * kernel-64kb-extra-5.14.21-150500.55.44.1 * dtb-lg-5.14.21-150500.55.44.1 * dtb-exynos-5.14.21-150500.55.44.1 * dtb-sprd-5.14.21-150500.55.44.1 * dtb-xilinx-5.14.21-150500.55.44.1 * dlm-kmp-64kb-5.14.21-150500.55.44.1 * ocfs2-kmp-64kb-5.14.21-150500.55.44.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.44.1 * dtb-amazon-5.14.21-150500.55.44.1 * dtb-marvell-5.14.21-150500.55.44.1 * dtb-socionext-5.14.21-150500.55.44.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.44.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * kernel-64kb-devel-5.14.21-150500.55.44.1 * kernel-64kb-debuginfo-5.14.21-150500.55.44.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * dtb-rockchip-5.14.21-150500.55.44.1 * dtb-nvidia-5.14.21-150500.55.44.1 * dtb-mediatek-5.14.21-150500.55.44.1 * kernel-64kb-livepatch-devel-5.14.21-150500.55.44.1 * dtb-apm-5.14.21-150500.55.44.1 * dtb-amd-5.14.21-150500.55.44.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.44.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * dtb-qcom-5.14.21-150500.55.44.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.44.1 * gfs2-kmp-64kb-5.14.21-150500.55.44.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.44.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-64kb-debugsource-5.14.21-150500.55.44.1 * kernel-64kb-devel-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.44.1 * kernel-default-devel-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (noarch) * kernel-devel-5.14.21-150500.55.44.1 * kernel-macros-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.44.1 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.44.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.44.1 * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.44.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.14.21-150500.55.44.1 * kernel-obs-build-5.14.21-150500.55.44.1 * kernel-syms-5.14.21-150500.55.44.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.44.1 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_44-default-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-1-150500.11.5.1 * kernel-default-livepatch-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-livepatch-devel-5.14.21-150500.55.44.1 * kernel-livepatch-SLE15-SP5_Update_9-debugsource-1-150500.11.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150500.55.44.1 * cluster-md-kmp-default-5.14.21-150500.55.44.1 * ocfs2-kmp-default-5.14.21-150500.55.44.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * gfs2-kmp-default-5.14.21-150500.55.44.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.44.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.44.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.44.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * kernel-default-extra-debuginfo-5.14.21-150500.55.44.1 * kernel-default-extra-5.14.21-150500.55.44.1 * kernel-default-debugsource-5.14.21-150500.55.44.1 * kernel-default-debuginfo-5.14.21-150500.55.44.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212139 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214117 * https://bugzilla.suse.com/show_bug.cgi?id=1214158 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1215952 * https://bugzilla.suse.com/show_bug.cgi?id=1216032 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217822 * https://bugzilla.suse.com/show_bug.cgi?id=1217927 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218092 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218229 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218397 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218461 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218643 * https://bugzilla.suse.com/show_bug.cgi?id=1218738 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:19 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 20:30:19 -0000 Subject: SUSE-SU-2024:0158-1: important: Security update for perl-Spreadsheet-ParseExcel Message-ID: <170560981945.13525.15336026679630799297@smelt2.prg2.suse.org> # Security update for perl-Spreadsheet-ParseExcel Announcement ID: SUSE-SU-2024:0158-1 Rating: important References: * bsc#1218414 Cross-References: * CVE-2023-7101 CVSS scores: * CVE-2023-7101 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2023-7101 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for perl-Spreadsheet-ParseExcel fixes the following issues: * CVE-2023-7101: Fixed a command injection issue when parsing an untrusted spreadsheet (bsc#1218414). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-158=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-158=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-158=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-158=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2024-158=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-158=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-158=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-158=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-158=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-158=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-158=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-158=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-158=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-158=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-158=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-158=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * Basesystem Module 15-SP5 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Manager Proxy 4.3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Manager Server 4.3 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE Enterprise Storage 7.1 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 * SUSE CaaS Platform 4.0 (noarch) * perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7101.html * https://bugzilla.suse.com/show_bug.cgi?id=1218414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:21 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 20:30:21 -0000 Subject: SUSE-SU-2024:0157-1: moderate: Security update for libcryptopp Message-ID: <170560982177.13525.10128052783332305752@smelt2.prg2.suse.org> # Security update for libcryptopp Announcement ID: SUSE-SU-2024:0157-1 Rating: moderate References: * bsc#1218222 Cross-References: * CVE-2023-50981 CVSS scores: * CVE-2023-50981 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-50981 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libcryptopp fixes the following issues: * CVE-2023-50981: Fixed a potential denial of service issue via crafted DER public key data (bsc#1218222). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-157=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-157=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-157=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-157=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1 * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libcryptopp8_6_0-64bit-8.6.0-150400.3.6.1 * libcryptopp8_6_0-64bit-debuginfo-8.6.0-150400.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 * openSUSE Leap 15.5 (x86_64) * libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1 * libcryptopp8_6_0-32bit-debuginfo-8.6.0-150400.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libcryptopp8_6_0-debuginfo-8.6.0-150400.3.6.1 * libcryptopp8_6_0-8.6.0-150400.3.6.1 * libcryptopp-debugsource-8.6.0-150400.3.6.1 * libcryptopp-devel-8.6.0-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50981.html * https://bugzilla.suse.com/show_bug.cgi?id=1218222 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:31 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 20:30:31 -0000 Subject: SUSE-SU-2024:0156-1: important: Security update for the Linux Kernel Message-ID: <170560983143.13525.10318262391280302135@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0156-1 Rating: important References: * bsc#1179610 * bsc#1183045 * bsc#1193285 * bsc#1211162 * bsc#1211226 * bsc#1212584 * bsc#1214747 * bsc#1214823 * bsc#1215237 * bsc#1215696 * bsc#1215885 * bsc#1216057 * bsc#1216559 * bsc#1216776 * bsc#1217036 * bsc#1217217 * bsc#1217250 * bsc#1217602 * bsc#1217692 * bsc#1217790 * bsc#1217801 * bsc#1217933 * bsc#1217938 * bsc#1217946 * bsc#1217947 * bsc#1217980 * bsc#1217981 * bsc#1217982 * bsc#1218056 * bsc#1218139 * bsc#1218184 * bsc#1218234 * bsc#1218253 * bsc#1218258 * bsc#1218335 * bsc#1218357 * bsc#1218447 * bsc#1218515 * bsc#1218559 * bsc#1218569 * bsc#1218659 * jsc#PED-3459 * jsc#PED-5021 * jsc#PED-7322 Cross-References: * CVE-2020-26555 * CVE-2023-51779 * CVE-2023-6121 * CVE-2023-6531 * CVE-2023-6546 * CVE-2023-6606 * CVE-2023-6610 * CVE-2023-6622 * CVE-2023-6931 * CVE-2023-6932 CVSS scores: * CVE-2020-26555 ( SUSE ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2020-26555 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51779 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6121 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6121 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6546 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-6622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6931 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6931 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 10 vulnerabilities, contains three features and has 31 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559). * CVE-2020-26555: Fixed an issue during BR/EDR PIN code pairing in the Bluetooth subsystem that would allow replay attacks (bsc#1179610 bsc#1215237). * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947). * CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335). * CVE-2023-6931: Fixed an out of bounds write in the Performance Events subsystem when adding a new event (bsc#1218258). * CVE-2023-6932: Fixed a use-after-free issue when receiving an IGMP query packet due to reference count mismanagement (bsc#1218253). * CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938). * CVE-2023-6121: Fixed an information leak via dmesg when receiving a crafted packet in the NVMe-oF/TCP subsystem (bsc#1217250). The following non-security bugs were fixed: * Reviewed and added more information to README.SUSE (jsc#PED-5021). * Enabled multibuild for kernel packages (JSC-SLE#5501, boo#1211226, bsc#1218184). * Drop drm/bridge lt9611uxc patches that have been reverted on stable trees * KVM: s390/mm: Properly reset no-dat (bsc#1218056). * KVM: s390: vsie: fix wrong VIR 37 when MSO is used (bsc#1217933). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * NFS: Fix O_DIRECT locking issues (bsc#1211162). * NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162). * NFS: Fix a potential data corruption (bsc#1211162). * NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162). * NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162). * NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162). * NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162). * NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162). * NLM: Defend against file_lock changes after vfs_test_lock() (bsc#1217692). * Updated SPI patches for NVIDIA Grace enablement (bsc#1212584 jsc#PED-3459) * block: fix revalidate performance regression (bsc#1216057). * bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980). * ceph: fix type promotion bug on 32bit systems (bsc#1217982). * clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217). * clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217). * clocksource: Handle negative skews in "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve "skew is too large" messages (bsc#1215885 bsc#1217217). * clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217). * clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217). * clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217). * clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217). * dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * libceph: use kernel_connect() (bsc#1217981). * mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515). * net/smc: Fix pos miscalculation in statistics (bsc#1218139). * net/tg3: fix race condition in tg3_reset_task() (bsc#1217801). * nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162). * remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569). * s390/vx: fix save/restore of fpu kernel context (bsc#1218357). * scsi: lpfc: use unsigned type for num_sge (bsc#1214747). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * tracing: Disable preemption when using the filter buffer (bsc#1217036). * tracing: Fix a possible race when disabling buffered events (bsc#1217036). * tracing: Fix a warning when allocating buffered events fails (bsc#1217036). * tracing: Fix incomplete locking when disabling buffered events (bsc#1217036). * tracing: Fix warning in trace_buffered_event_disable() (bsc#1217036). * tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036). * uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978). * vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790). * x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217). * x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217). * x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-156=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-156=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-156=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-156=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-156=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-156=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-156=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-156=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-156=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-156=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-156=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-156=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-156=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-156=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-156=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-156=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-156=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-156=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Real Time 15 SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-extra-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.103.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-source-vanilla-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * kernel-source-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-devel-5.14.21-150400.24.103.1 * kernel-debug-debuginfo-5.14.21-150400.24.103.1 * kernel-debug-debugsource-5.14.21-150400.24.103.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.103.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.103.1 * kernel-kvmsmall-devel-5.14.21-150400.24.103.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.103.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.103.1 * kernel-default-base-rebuild-5.14.21-150400.24.103.1.150400.24.48.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-optional-5.14.21-150400.24.103.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * ocfs2-kmp-default-5.14.21-150400.24.103.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.103.1 * cluster-md-kmp-default-5.14.21-150400.24.103.1 * dlm-kmp-default-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-livepatch-devel-5.14.21-150400.24.103.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * gfs2-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-qa-5.14.21-150400.24.103.1 * kernel-default-extra-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * kernel-default-livepatch-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kselftests-kmp-default-5.14.21-150400.24.103.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_103-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.103.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64) * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-extra-5.14.21-150400.24.103.1 * dtb-socionext-5.14.21-150400.24.103.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * dtb-amazon-5.14.21-150400.24.103.1 * dtb-freescale-5.14.21-150400.24.103.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * dtb-lg-5.14.21-150400.24.103.1 * ocfs2-kmp-64kb-5.14.21-150400.24.103.1 * dtb-mediatek-5.14.21-150400.24.103.1 * dtb-hisilicon-5.14.21-150400.24.103.1 * dtb-altera-5.14.21-150400.24.103.1 * dlm-kmp-64kb-5.14.21-150400.24.103.1 * dtb-sprd-5.14.21-150400.24.103.1 * dtb-amlogic-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * dtb-nvidia-5.14.21-150400.24.103.1 * dtb-qcom-5.14.21-150400.24.103.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * gfs2-kmp-64kb-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * reiserfs-kmp-64kb-5.14.21-150400.24.103.1 * dtb-xilinx-5.14.21-150400.24.103.1 * dtb-apm-5.14.21-150400.24.103.1 * dtb-apple-5.14.21-150400.24.103.1 * dtb-marvell-5.14.21-150400.24.103.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.103.1 * dtb-renesas-5.14.21-150400.24.103.1 * dtb-rockchip-5.14.21-150400.24.103.1 * kernel-64kb-optional-5.14.21-150400.24.103.1 * kselftests-kmp-64kb-5.14.21-150400.24.103.1 * dtb-amd-5.14.21-150400.24.103.1 * dtb-arm-5.14.21-150400.24.103.1 * dtb-cavium-5.14.21-150400.24.103.1 * dtb-allwinner-5.14.21-150400.24.103.1 * dtb-exynos-5.14.21-150400.24.103.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.103.1 * dtb-broadcom-5.14.21-150400.24.103.1 * cluster-md-kmp-64kb-5.14.21-150400.24.103.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_103-default-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-default-livepatch-5.14.21-150400.24.103.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-1-150400.9.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.103.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.103.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.103.1 * ocfs2-kmp-default-5.14.21-150400.24.103.1 * gfs2-kmp-default-5.14.21-150400.24.103.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * cluster-md-kmp-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-debugsource-5.14.21-150400.24.103.1 * kernel-64kb-debuginfo-5.14.21-150400.24.103.1 * kernel-64kb-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.103.1 * kernel-obs-build-5.14.21-150400.24.103.1 * kernel-default-debugsource-5.14.21-150400.24.103.1 * kernel-obs-build-debugsource-5.14.21-150400.24.103.1 * reiserfs-kmp-default-5.14.21-150400.24.103.1 * kernel-default-devel-5.14.21-150400.24.103.1 * kernel-syms-5.14.21-150400.24.103.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.103.1 * kernel-default-debuginfo-5.14.21-150400.24.103.1 * kernel-default-base-5.14.21-150400.24.103.1.150400.24.48.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.103.1 * kernel-macros-5.14.21-150400.24.103.1 * kernel-devel-5.14.21-150400.24.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.103.1 ## References: * https://www.suse.com/security/cve/CVE-2020-26555.html * https://www.suse.com/security/cve/CVE-2023-51779.html * https://www.suse.com/security/cve/CVE-2023-6121.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6546.html * https://www.suse.com/security/cve/CVE-2023-6606.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2023-6622.html * https://www.suse.com/security/cve/CVE-2023-6931.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1179610 * https://bugzilla.suse.com/show_bug.cgi?id=1183045 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212584 * https://bugzilla.suse.com/show_bug.cgi?id=1214747 * https://bugzilla.suse.com/show_bug.cgi?id=1214823 * https://bugzilla.suse.com/show_bug.cgi?id=1215237 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216057 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216776 * https://bugzilla.suse.com/show_bug.cgi?id=1217036 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217250 * https://bugzilla.suse.com/show_bug.cgi?id=1217602 * https://bugzilla.suse.com/show_bug.cgi?id=1217692 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1217801 * https://bugzilla.suse.com/show_bug.cgi?id=1217933 * https://bugzilla.suse.com/show_bug.cgi?id=1217938 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217947 * https://bugzilla.suse.com/show_bug.cgi?id=1217980 * https://bugzilla.suse.com/show_bug.cgi?id=1217981 * https://bugzilla.suse.com/show_bug.cgi?id=1217982 * https://bugzilla.suse.com/show_bug.cgi?id=1218056 * https://bugzilla.suse.com/show_bug.cgi?id=1218139 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218253 * https://bugzilla.suse.com/show_bug.cgi?id=1218258 * https://bugzilla.suse.com/show_bug.cgi?id=1218335 * https://bugzilla.suse.com/show_bug.cgi?id=1218357 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218515 * https://bugzilla.suse.com/show_bug.cgi?id=1218559 * https://bugzilla.suse.com/show_bug.cgi?id=1218569 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://jira.suse.com/browse/PED-3459 * https://jira.suse.com/browse/PED-5021 * https://jira.suse.com/browse/PED-7322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 18 20:30:34 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 18 Jan 2024 20:30:34 -0000 Subject: SUSE-SU-2024:0155-1: important: Security update for suse-module-tools Message-ID: <170560983474.13525.14013892695985976329@smelt2.prg2.suse.org> # Security update for suse-module-tools Announcement ID: SUSE-SU-2024:0155-1 Rating: important References: * bsc#1205767 * bsc#1210335 * bsc#1217775 * jsc#PED-5731 Cross-References: * CVE-2023-1829 * CVE-2023-23559 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities, contains one feature and has one security fix can now be installed. ## Description: This update for suse-module-tools fixes the following issues: Updated to version 15.2.19: * Added a symlink for /boot/.vmlinuz.hmac (bsc#1217775). Updated to version 15.2.18: * CVE-2023-23559: Blacklisted RNDIS modules (bsc#1205767, jsc#PED-5731). * CVE-2023-1829: Blacklisted the cls_tcindex module (bsc#1210335). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-155=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-155=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-155=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * suse-module-tools-15.2.19-150200.4.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * suse-module-tools-15.2.19-150200.4.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * suse-module-tools-15.2.19-150200.4.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-23559.html * https://bugzilla.suse.com/show_bug.cgi?id=1205767 * https://bugzilla.suse.com/show_bug.cgi?id=1210335 * https://bugzilla.suse.com/show_bug.cgi?id=1217775 * https://jira.suse.com/browse/PED-5731 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Fri Jan 19 08:05:17 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:17 +0100 (CET) Subject: SUSE-CU-2024:242-1: Security update of suse/ltss/sle15.3/sle15 Message-ID: <20240119080517.9EB63FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.3/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:242-1 Container Tags : suse/ltss/sle15.3/bci-base:15.3 , suse/ltss/sle15.3/bci-base:15.3.3.42 , suse/ltss/sle15.3/sle15:15.3 , suse/ltss/sle15.3/sle15:15.3.3.42 Container Release : 3.42 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/ltss/sle15.3/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:05:22 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:22 +0100 (CET) Subject: SUSE-CU-2024:243-1: Security update of suse/ltss/sle15.4/sle15 Message-ID: <20240119080522.7D772FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/ltss/sle15.4/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:243-1 Container Tags : suse/ltss/sle15.4/bci-base:15.4 , suse/ltss/sle15.4/bci-base:15.4.2.8 , suse/ltss/sle15.4/sle15:15.4 , suse/ltss/sle15.4/sle15:15.4.2.8 Container Release : 2.8 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/ltss/sle15.4/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:05:44 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:05:44 +0100 (CET) Subject: SUSE-CU-2024:244-1: Security update of suse/389-ds Message-ID: <20240119080544.1AED2FD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/389-ds ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:244-1 Container Tags : suse/389-ds:2.2 , suse/389-ds:2.2-19.5 , suse/389-ds:latest Container Release : 19.5 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/389-ds was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:06:03 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:03 +0100 (CET) Subject: SUSE-CU-2024:245-1: Security update of bci/dotnet-aspnet Message-ID: <20240119080603.B2159FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:245-1 Container Tags : bci/dotnet-aspnet:6.0 , bci/dotnet-aspnet:6.0-21.4 , bci/dotnet-aspnet:6.0.26 , bci/dotnet-aspnet:6.0.26-21.4 Container Release : 21.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:06:22 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:22 +0100 (CET) Subject: SUSE-CU-2024:246-1: Security update of bci/dotnet-aspnet Message-ID: <20240119080622.6EA66FD1F@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-aspnet ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:246-1 Container Tags : bci/dotnet-aspnet:7.0 , bci/dotnet-aspnet:7.0-21.4 , bci/dotnet-aspnet:7.0.15 , bci/dotnet-aspnet:7.0.15-21.4 Container Release : 21.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-aspnet was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:06:50 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:06:50 +0100 (CET) Subject: SUSE-CU-2024:248-1: Security update of bci/dotnet-sdk Message-ID: <20240119080650.86D98FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:248-1 Container Tags : bci/dotnet-sdk:6.0 , bci/dotnet-sdk:6.0-20.4 , bci/dotnet-sdk:6.0.26 , bci/dotnet-sdk:6.0.26-20.4 Container Release : 20.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:07:12 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:12 +0100 (CET) Subject: SUSE-CU-2024:249-1: Security update of bci/dotnet-sdk Message-ID: <20240119080712.E99F6FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-sdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:249-1 Container Tags : bci/dotnet-sdk:7.0 , bci/dotnet-sdk:7.0-22.4 , bci/dotnet-sdk:7.0.15 , bci/dotnet-sdk:7.0.15-22.4 Container Release : 22.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-sdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:07:31 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:31 +0100 (CET) Subject: SUSE-CU-2024:250-1: Security update of bci/dotnet-runtime Message-ID: <20240119080731.E1962FD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:250-1 Container Tags : bci/dotnet-runtime:6.0 , bci/dotnet-runtime:6.0-20.4 , bci/dotnet-runtime:6.0.26 , bci/dotnet-runtime:6.0.26-20.4 Container Release : 20.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:07:49 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:49 +0100 (CET) Subject: SUSE-CU-2024:251-1: Security update of bci/dotnet-runtime Message-ID: <20240119080749.E19A9FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/dotnet-runtime ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:251-1 Container Tags : bci/dotnet-runtime:7.0 , bci/dotnet-runtime:7.0-22.4 , bci/dotnet-runtime:7.0.15 , bci/dotnet-runtime:7.0.15-22.4 Container Release : 22.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/dotnet-runtime was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:07:56 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:07:56 +0100 (CET) Subject: SUSE-CU-2024:252-1: Security update of suse/git Message-ID: <20240119080756.1BEBDFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/git ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:252-1 Container Tags : suse/git:2.35 , suse/git:2.35-7.4 , suse/git:latest Container Release : 7.4 Severity : important Type : security References : 1211188 1211190 1218126 1218186 1218209 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 ----------------------------------------------------------------- The container suse/git was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - container:micro-image-15.5.0-15.1 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:08:09 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:09 +0100 (CET) Subject: SUSE-CU-2024:253-1: Security update of bci/golang Message-ID: <20240119080809.8202DFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:253-1 Container Tags : bci/golang:1.20 , bci/golang:1.20-2.7.4 , bci/golang:oldstable , bci/golang:oldstable-2.7.4 Container Release : 7.4 Severity : important Type : security References : 1206346 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:142-1 Released: Thu Jan 18 11:40:23 2024 Summary: Recommended update for go1.20 Type: recommended Severity: moderate References: 1206346 This update for go1.20 fixes the following issues: - Update to version go1.20.13 (bsc#1206346) The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - go1.20-doc-1.20.13-150000.1.38.1 updated - go1.20-1.20.13-150000.1.38.1 updated - go1.20-race-1.20.13-150000.1.38.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:08:19 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:19 +0100 (CET) Subject: SUSE-CU-2024:254-1: Security update of bci/golang Message-ID: <20240119080819.65D67FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:254-1 Container Tags : bci/golang:1.20-openssl , bci/golang:1.20-openssl-11.4 , bci/golang:oldstable-openssl , bci/golang:oldstable-openssl-11.4 Container Release : 11.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:08:35 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:35 +0100 (CET) Subject: SUSE-CU-2024:255-1: Security update of bci/golang Message-ID: <20240119080835.F12CCFD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:255-1 Container Tags : bci/golang:1.21 , bci/golang:1.21-1.7.4 , bci/golang:latest , bci/golang:stable , bci/golang:stable-1.7.4 Container Release : 7.4 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - go1.21-doc-1.21.6-150000.1.21.1 updated - go1.21-1.21.6-150000.1.21.1 updated - go1.21-race-1.21.6-150000.1.21.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:08:45 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:08:45 +0100 (CET) Subject: SUSE-CU-2024:256-1: Security update of bci/golang Message-ID: <20240119080845.4F275FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/golang ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:256-1 Container Tags : bci/golang:1.21-openssl , bci/golang:1.21-openssl-11.4 , bci/golang:latest , bci/golang:stable-openssl , bci/golang:stable-openssl-11.4 Container Release : 11.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/golang was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:09:04 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:04 +0100 (CET) Subject: SUSE-CU-2024:258-1: Security update of bci/bci-init Message-ID: <20240119080904.EAF03FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-init ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:258-1 Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.13.4 , bci/bci-init:latest Container Release : 13.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/bci-init was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:09:22 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:22 +0100 (CET) Subject: SUSE-CU-2024:261-1: Security update of bci/nodejs Message-ID: <20240119080922.97D10FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:261-1 Container Tags : bci/node:20 , bci/node:20-5.4 , bci/node:latest , bci/nodejs:20 , bci/nodejs:20-5.4 , bci/nodejs:latest Container Release : 5.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:09:45 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:09:45 +0100 (CET) Subject: SUSE-CU-2024:262-1: Security update of bci/openjdk-devel Message-ID: <20240119080945.7EC09FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:262-1 Container Tags : bci/openjdk-devel:11 , bci/openjdk-devel:11-13.7 Container Release : 13.7 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:bci-openjdk-11-15.5.11-13.7 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:10:02 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:02 +0100 (CET) Subject: SUSE-CU-2024:263-1: Security update of bci/openjdk Message-ID: <20240119081002.842FBFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:263-1 Container Tags : bci/openjdk:11 , bci/openjdk:11-13.7 Container Release : 13.7 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:10:20 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:20 +0100 (CET) Subject: SUSE-CU-2024:264-1: Security update of bci/openjdk Message-ID: <20240119081020.0CF5AFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:264-1 Container Tags : bci/openjdk:17 , bci/openjdk:17-15.3 , bci/openjdk:latest Container Release : 15.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:10:37 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:37 +0100 (CET) Subject: SUSE-CU-2024:266-1: Security update of suse/rmt-mariadb Message-ID: <20240119081037.3DB79FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:266-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.3 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.3 , suse/rmt-mariadb:latest Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Fri Jan 19 08:10:35 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Fri, 19 Jan 2024 09:10:35 +0100 (CET) Subject: SUSE-CU-2024:265-1: Security update of bci/php-fpm Message-ID: <20240119081035.6CAC0FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-fpm ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:265-1 Container Tags : bci/php-fpm:8 , bci/php-fpm:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php-fpm was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From null at suse.de Fri Jan 19 12:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 19 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0165-1: important: Security update for xwayland Message-ID: <170566740375.4901.16753067276415776509@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2024:0165-1 Rating: important References: * bsc#1218582 * bsc#1218583 * bsc#1218584 * bsc#1218585 * bsc#1218845 * bsc#1218846 Cross-References: * CVE-2023-6816 * CVE-2024-0229 * CVE-2024-0408 * CVE-2024-0409 * CVE-2024-21885 * CVE-2024-21886 CVSS scores: * CVE-2023-6816 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0229 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0408 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-0409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-21885 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21886 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 An update that solves six vulnerabilities can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582) * CVE-2024-0229: Fixed reattaching to different master device may lead to out- of-bounds memory access (bsc#1218583) * CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845) * CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846) * CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584) * CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-165=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-165=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xwayland-21.1.4-150400.3.31.1 * xwayland-debuginfo-21.1.4-150400.3.31.1 * xwayland-devel-21.1.4-150400.3.31.1 * xwayland-debugsource-21.1.4-150400.3.31.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * xwayland-21.1.4-150400.3.31.1 * xwayland-debuginfo-21.1.4-150400.3.31.1 * xwayland-debugsource-21.1.4-150400.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6816.html * https://www.suse.com/security/cve/CVE-2024-0229.html * https://www.suse.com/security/cve/CVE-2024-0408.html * https://www.suse.com/security/cve/CVE-2024-0409.html * https://www.suse.com/security/cve/CVE-2024-21885.html * https://www.suse.com/security/cve/CVE-2024-21886.html * https://bugzilla.suse.com/show_bug.cgi?id=1218582 * https://bugzilla.suse.com/show_bug.cgi?id=1218583 * https://bugzilla.suse.com/show_bug.cgi?id=1218584 * https://bugzilla.suse.com/show_bug.cgi?id=1218585 * https://bugzilla.suse.com/show_bug.cgi?id=1218845 * https://bugzilla.suse.com/show_bug.cgi?id=1218846 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 16:30:02 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 19 Jan 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0168-1: moderate: Security update for python-aiohttp Message-ID: <170568180227.29233.6143914107741093378@smelt2.prg2.suse.org> # Security update for python-aiohttp Announcement ID: SUSE-SU-2024:0168-1 Rating: moderate References: * bsc#1217682 Cross-References: * CVE-2023-49082 CVSS scores: * CVE-2023-49082 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49082 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-aiohttp fixes the following issues: Updated to version 3.8.6: * CVE-2023-49082: Fixed an HTTP header injection via a crafted method (bsc#1217682). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-168=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-168=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-168=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-aiohttp-debuginfo-3.8.6-150400.10.11.1 * python-aiohttp-debugsource-3.8.6-150400.10.11.1 * python311-aiohttp-3.8.6-150400.10.11.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-debuginfo-3.8.6-150400.10.11.1 * python-aiohttp-debugsource-3.8.6-150400.10.11.1 * python311-aiohttp-3.8.6-150400.10.11.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-aiohttp-debuginfo-3.8.6-150400.10.11.1 * python-aiohttp-debugsource-3.8.6-150400.10.11.1 * python311-aiohttp-3.8.6-150400.10.11.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49082.html * https://bugzilla.suse.com/show_bug.cgi?id=1217682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 16:30:04 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 19 Jan 2024 16:30:04 -0000 Subject: SUSE-SU-2024:0167-1: important: Security update for bluez Message-ID: <170568180439.29233.8504276443305847047@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0167-1 Rating: important References: * bsc#1192760 * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2021-41229 * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2021-41229 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-41229 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves three vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2021-41229: Fix leaking buffers stored in cstates cache (bsc#1192760). * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-167=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-167=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-167=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * bluez-5.48-150200.13.30.1 * bluez-debuginfo-5.48-150200.13.30.1 * libbluetooth3-5.48-150200.13.30.1 * libbluetooth3-debuginfo-5.48-150200.13.30.1 * bluez-debugsource-5.48-150200.13.30.1 * bluez-devel-5.48-150200.13.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * bluez-5.48-150200.13.30.1 * bluez-debuginfo-5.48-150200.13.30.1 * libbluetooth3-5.48-150200.13.30.1 * libbluetooth3-debuginfo-5.48-150200.13.30.1 * bluez-debugsource-5.48-150200.13.30.1 * bluez-devel-5.48-150200.13.30.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * bluez-5.48-150200.13.30.1 * bluez-debuginfo-5.48-150200.13.30.1 * libbluetooth3-5.48-150200.13.30.1 * libbluetooth3-debuginfo-5.48-150200.13.30.1 * bluez-debugsource-5.48-150200.13.30.1 * bluez-devel-5.48-150200.13.30.1 ## References: * https://www.suse.com/security/cve/CVE-2021-41229.html * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1192760 * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 19 16:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 19 Jan 2024 16:30:06 -0000 Subject: SUSE-SU-2024:0166-1: important: Security update for bluez Message-ID: <170568180632.29233.13337305763016437002@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0166-1 Rating: important References: * bsc#1192760 * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2021-41229 * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2021-41229 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-41229 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves three vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2021-41229: Fix leaking buffers stored in cstates cache (bsc#1192760). * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-166=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-166=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-166=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 * SUSE CaaS Platform 4.0 (x86_64) * bluez-devel-5.48-150000.5.54.1 * libbluetooth3-debuginfo-5.48-150000.5.54.1 * bluez-5.48-150000.5.54.1 * libbluetooth3-5.48-150000.5.54.1 * bluez-debuginfo-5.48-150000.5.54.1 * bluez-debugsource-5.48-150000.5.54.1 ## References: * https://www.suse.com/security/cve/CVE-2021-41229.html * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1192760 * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From sle-security-updates at lists.suse.com Sat Jan 20 08:01:46 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:01:46 +0100 (CET) Subject: SUSE-CU-2024:267-1: Security update of suse/sle-micro/5.5/toolbox Message-ID: <20240120080146.3B1B1FD95@maintenance.suse.de> SUSE Container Update Advisory: suse/sle-micro/5.5/toolbox ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:267-1 Container Tags : suse/sle-micro/5.5/toolbox:12.1 , suse/sle-micro/5.5/toolbox:12.1-2.2.138 , suse/sle-micro/5.5/toolbox:latest Container Release : 2.2.138 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle-micro/5.5/toolbox was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:03:10 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:10 +0100 (CET) Subject: SUSE-CU-2024:268-1: Security update of suse/sles12sp5 Message-ID: <20240120080310.4C2D9FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sles12sp5 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:268-1 Container Tags : suse/sles12sp5:6.5.556 , suse/sles12sp5:latest Container Release : 6.5.556 Severity : moderate Type : security References : 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sles12sp5 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:137-1 Released: Thu Jan 18 09:55:34 2024 Summary: Security update for pam Type: security Severity: moderate References: 1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). The following package changes have been done: - pam-1.1.8-24.56.1 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:03:50 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:03:50 +0100 (CET) Subject: SUSE-CU-2024:270-1: Security update of suse/registry Message-ID: <20240120080350.567AAFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/registry ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:270-1 Container Tags : suse/registry:2.8 , suse/registry:2.8-18.4 , suse/registry:latest Container Release : 18.4 Severity : moderate Type : security References : 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/registry was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) The following package changes have been done: - pam-1.3.0-150000.6.66.1 updated - container:micro-image-15.5.0-15.1 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:04:02 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:04:02 +0100 (CET) Subject: SUSE-CU-2024:271-1: Security update of suse/nginx Message-ID: <20240120080402.C018DFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/nginx ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:271-1 Container Tags : suse/nginx:1.21 , suse/nginx:1.21-9.4 , suse/nginx:latest Container Release : 9.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/nginx was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:04:20 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:04:20 +0100 (CET) Subject: SUSE-CU-2024:272-1: Security update of bci/nodejs Message-ID: <20240120080420.C09DEFD1F@maintenance.suse.de> SUSE Container Update Advisory: bci/nodejs ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:272-1 Container Tags : bci/node:18 , bci/node:18-15.4 , bci/nodejs:18 , bci/nodejs:18-15.4 Container Release : 15.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/nodejs was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:05:04 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:04 +0100 (CET) Subject: SUSE-CU-2024:274-1: Security update of bci/openjdk-devel Message-ID: <20240120080504.CBE81FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/openjdk-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:274-1 Container Tags : bci/openjdk-devel:17 , bci/openjdk-devel:17-15.10 , bci/openjdk-devel:latest Container Release : 15.10 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/openjdk-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - google-guice-5.1.0-150200.3.7.1 updated - container:bci-openjdk-17-15.5.17-15.3 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:05:27 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:27 +0100 (CET) Subject: SUSE-CU-2024:275-1: Security update of suse/pcp Message-ID: <20240120080527.37BBFFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/pcp ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:275-1 Container Tags : suse/pcp:5 , suse/pcp:5-21.5 , suse/pcp:5.2 , suse/pcp:5.2-21.5 , suse/pcp:5.2.5 , suse/pcp:5.2.5-21.5 , suse/pcp:latest Container Release : 21.5 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/pcp was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:bci-bci-init-15.5-15.5-13.4 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:05:45 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:05:45 +0100 (CET) Subject: SUSE-CU-2024:276-1: Security update of bci/php-apache Message-ID: <20240120080545.51B47FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/php-apache ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:276-1 Container Tags : bci/php-apache:8 , bci/php-apache:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php-apache was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:06:02 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:02 +0100 (CET) Subject: SUSE-CU-2024:277-1: Security update of bci/php Message-ID: <20240120080602.2B212FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/php ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:277-1 Container Tags : bci/php:8 , bci/php:8-11.3 Container Release : 11.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/php was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:06:17 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:17 +0100 (CET) Subject: SUSE-CU-2024:278-1: Security update of suse/postgres Message-ID: <20240120080617.67E9DFBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:278-1 Container Tags : suse/postgres:15 , suse/postgres:15-16.3 , suse/postgres:15.5 , suse/postgres:15.5-16.3 Container Release : 16.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:06:21 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:21 +0100 (CET) Subject: SUSE-CU-2024:279-1: Security update of suse/postgres Message-ID: <20240120080621.BF128FBA4@maintenance.suse.de> SUSE Container Update Advisory: suse/postgres ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:279-1 Container Tags : suse/postgres:16 , suse/postgres:16-5.3 , suse/postgres:16.1 , suse/postgres:16.1-5.3 , suse/postgres:latest Container Release : 5.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/postgres was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:06:38 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:38 +0100 (CET) Subject: SUSE-CU-2024:280-1: Security update of bci/python Message-ID: <20240120080638.88703FD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:280-1 Container Tags : bci/python:3 , bci/python:3-16.3 , bci/python:3.11 , bci/python:3.11-16.3 , bci/python:latest Container Release : 16.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:06:59 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:06:59 +0100 (CET) Subject: SUSE-CU-2024:281-1: Security update of bci/python Message-ID: <20240120080659.9980EFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/python ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:281-1 Container Tags : bci/python:3 , bci/python:3-17.3 , bci/python:3.6 , bci/python:3.6-17.3 Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/python was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:07:01 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:01 +0100 (CET) Subject: SUSE-CU-2024:282-1: Security update of suse/rmt-mariadb-client Message-ID: <20240120080701.5C55EFBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb-client ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:282-1 Container Tags : suse/mariadb-client:10.6 , suse/mariadb-client:10.6-14.3 , suse/mariadb-client:latest , suse/rmt-mariadb-client:10.6 , suse/rmt-mariadb-client:10.6-14.3 , suse/rmt-mariadb-client:latest Container Release : 14.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb-client was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:07:04 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:04 +0100 (CET) Subject: SUSE-CU-2024:266-1: Security update of suse/rmt-mariadb Message-ID: <20240120080704.0CAC2FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/rmt-mariadb ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:266-1 Container Tags : suse/mariadb:10.6 , suse/mariadb:10.6-17.3 , suse/mariadb:latest , suse/rmt-mariadb:10.6 , suse/rmt-mariadb:10.6-17.3 , suse/rmt-mariadb:latest Container Release : 17.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/rmt-mariadb was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:07:27 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:27 +0100 (CET) Subject: SUSE-CU-2024:283-1: Security update of bci/ruby Message-ID: <20240120080727.05DD7FD0A@maintenance.suse.de> SUSE Container Update Advisory: bci/ruby ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:283-1 Container Tags : bci/ruby:2 , bci/ruby:2-15.3 , bci/ruby:2.5 , bci/ruby:2.5-15.3 , bci/ruby:latest Container Release : 15.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/ruby was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:07:44 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:07:44 +0100 (CET) Subject: SUSE-CU-2024:284-1: Security update of bci/rust Message-ID: <20240120080744.C5472FBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:284-1 Container Tags : bci/rust:1.74 , bci/rust:1.74-2.3.3 , bci/rust:oldstable , bci/rust:oldstable-2.3.3 Container Release : 3.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:08:03 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:03 +0100 (CET) Subject: SUSE-CU-2024:285-1: Security update of bci/rust Message-ID: <20240120080803.43527FBA4@maintenance.suse.de> SUSE Container Update Advisory: bci/rust ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:285-1 Container Tags : bci/rust:1.75 , bci/rust:1.75-1.3.3 , bci/rust:latest , bci/rust:stable , bci/rust:stable-1.3.3 Container Release : 3.3 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/rust was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:08:06 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:06 +0100 (CET) Subject: SUSE-CU-2024:286-1: Security update of bci/bci-sle15-kernel-module-devel Message-ID: <20240120080806.3C6DFFBA9@maintenance.suse.de> SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:286-1 Container Tags : bci/bci-sle15-kernel-module-devel:15.5 , bci/bci-sle15-kernel-module-devel:15.5.5.4 , bci/bci-sle15-kernel-module-devel:latest Container Release : 5.4 Severity : important Type : security References : 1211188 1211190 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated - kernel-macros-5.14.21-150500.55.44.1 updated - kernel-devel-5.14.21-150500.55.44.1 updated - kernel-default-devel-5.14.21-150500.55.44.1 updated - kernel-syms-5.14.21-150500.55.44.1 updated - container:sles15-image-15.0.0-36.5.74 updated From sle-security-updates at lists.suse.com Sat Jan 20 08:08:21 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sat, 20 Jan 2024 09:08:21 +0100 (CET) Subject: SUSE-CU-2024:287-1: Security update of suse/sle15 Message-ID: <20240120080821.ACC74FBA9@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:287-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74 Container Release : 36.5.74 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-security-updates at lists.suse.com Sun Jan 21 08:03:51 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:03:51 +0100 (CET) Subject: SUSE-CU-2024:288-1: Security update of suse/sle15 Message-ID: <20240121080351.C6718FD1F@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:288-1 Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.866 Container Release : 6.2.866 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-security-updates at lists.suse.com Sun Jan 21 08:05:28 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:05:28 +0100 (CET) Subject: SUSE-CU-2024:289-1: Security update of suse/sle15 Message-ID: <20240121080528.82B1AFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:289-1 Container Tags : suse/sle15:15.2 , suse/sle15:15.2.9.5.395 Container Release : 9.5.395 Severity : moderate Type : security References : 1212475 1217000 1218475 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - pam-1.3.0-150000.6.66.1 updated From sle-security-updates at lists.suse.com Sun Jan 21 08:05:52 2024 From: sle-security-updates at lists.suse.com (sle-security-updates at lists.suse.com) Date: Sun, 21 Jan 2024 09:05:52 +0100 (CET) Subject: SUSE-CU-2024:287-1: Security update of suse/sle15 Message-ID: <20240121080552.840BCFD0A@maintenance.suse.de> SUSE Container Update Advisory: suse/sle15 ----------------------------------------------------------------- Container Advisory ID : SUSE-CU-2024:287-1 Container Tags : bci/bci-base:15.5 , bci/bci-base:15.5.36.5.74 , suse/sle15:15.5 , suse/sle15:15.5.36.5.74 Container Release : 36.5.74 Severity : important Type : security References : 1211188 1211190 1212475 1217000 1218126 1218186 1218209 1218475 CVE-2023-1667 CVE-2023-2283 CVE-2023-48795 CVE-2023-6004 CVE-2023-6918 CVE-2024-22365 ----------------------------------------------------------------- The container suse/sle15 was updated. The following patches have been included in this update: ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:136-1 Released: Thu Jan 18 09:53:47 2024 Summary: Security update for pam Type: security Severity: moderate References: 1217000,1218475,CVE-2024-22365 This update for pam fixes the following issues: - CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475). - Check localtime_r() return value to fix crashing (bsc#1217000) ----------------------------------------------------------------- Advisory ID: SUSE-RU-2024:139-1 Released: Thu Jan 18 11:33:54 2024 Summary: Recommended update for go1.21 Type: recommended Severity: moderate References: 1212475 This update for go1.21 fixes the following issues: go1.21.6 (released 2024-01-09) includes fixes to the compiler, the runtime, and the crypto/tls, maps, and runtime/pprof packages. (bsc#1212475) * x/build,os/signal: TestDetectNohup and TestNohup fail on replacement darwin LUCI builders * runtime: ReadMemStats fatal error: mappedReady and other memstats are not equal * cmd/compile: linux/s390x: inlining bug in s390x * maps: maps.Clone reference semantics when cloning a map with large value types * runtime: excessive memory use between 1.21.0 -> 1.21.1 * cmd/compile: max/min builtin broken when used with string(byte) conversions * runtime/pprof: incorrect function names for generics functions * crypto: upgrade to BoringCrypto fips-20220613 and enable TLS 1.3 * runtime: race condition raised with parallel tests, panic(nil) and -race ----------------------------------------------------------------- Advisory ID: SUSE-SU-2024:140-1 Released: Thu Jan 18 11:34:58 2024 Summary: Security update for libssh Type: security Severity: important References: 1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918 This update for libssh fixes the following issues: Security fixes: - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) Other fixes: - Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes - Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code The following package changes have been done: - container-suseconnect-2.4.0-150000.4.48.1 updated - libssh-config-0.9.8-150400.3.3.1 updated - libssh4-0.9.8-150400.3.3.1 updated - pam-1.3.0-150000.6.66.1 updated From null at suse.de Mon Jan 22 20:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 22 Jan 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0172-1: moderate: Security update for openssl-3 Message-ID: <170595540372.8454.9165491155046485121@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:0172-1 Rating: moderate References: * bsc#1218690 * bsc#1218810 Cross-References: * CVE-2023-6129 * CVE-2023-6237 CVSS scores: * CVE-2023-6129 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2023-6237 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2023-6129: Fixed vector register clobbering on PowerPC. (bsc#1218690) * CVE-2023-6237: Fixed excessive time spent checking invalid RSA public keys. (bsc#1218810) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-172=1 openSUSE-SLE-15.5-2024-172=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-172=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-debuginfo-3.0.8-150500.5.24.1 * libopenssl3-3.0.8-150500.5.24.1 * openssl-3-debugsource-3.0.8-150500.5.24.1 * libopenssl3-debuginfo-3.0.8-150500.5.24.1 * libopenssl-3-devel-3.0.8-150500.5.24.1 * openssl-3-3.0.8-150500.5.24.1 * openSUSE Leap 15.5 (x86_64) * libopenssl3-32bit-3.0.8-150500.5.24.1 * libopenssl3-32bit-debuginfo-3.0.8-150500.5.24.1 * libopenssl-3-devel-32bit-3.0.8-150500.5.24.1 * openSUSE Leap 15.5 (noarch) * openssl-3-doc-3.0.8-150500.5.24.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libopenssl-3-devel-64bit-3.0.8-150500.5.24.1 * libopenssl3-64bit-3.0.8-150500.5.24.1 * libopenssl3-64bit-debuginfo-3.0.8-150500.5.24.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openssl-3-debuginfo-3.0.8-150500.5.24.1 * libopenssl3-3.0.8-150500.5.24.1 * openssl-3-debugsource-3.0.8-150500.5.24.1 * libopenssl3-debuginfo-3.0.8-150500.5.24.1 * libopenssl-3-devel-3.0.8-150500.5.24.1 * openssl-3-3.0.8-150500.5.24.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6129.html * https://www.suse.com/security/cve/CVE-2023-6237.html * https://bugzilla.suse.com/show_bug.cgi?id=1218690 * https://bugzilla.suse.com/show_bug.cgi?id=1218810 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:03 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 23 Jan 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0183-1: important: Security update for bluez Message-ID: <170601300327.9926.14970378667079424648@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0183-1 Rating: important References: * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-183=1 openSUSE-SLE-15.5-2024-183=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-183=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-183=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-183=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-183=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * bluez-cups-debuginfo-5.65-150500.3.6.1 * bluez-deprecated-5.65-150500.3.6.1 * bluez-devel-5.65-150500.3.6.1 * bluez-obexd-debuginfo-5.65-150500.3.6.1 * bluez-test-5.65-150500.3.6.1 * bluez-test-debuginfo-5.65-150500.3.6.1 * bluez-cups-5.65-150500.3.6.1 * libbluetooth3-debuginfo-5.65-150500.3.6.1 * bluez-obexd-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * libbluetooth3-5.65-150500.3.6.1 * bluez-deprecated-debuginfo-5.65-150500.3.6.1 * bluez-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * openSUSE Leap 15.5 (noarch) * bluez-zsh-completion-5.65-150500.3.6.1 * bluez-auto-enable-devices-5.65-150500.3.6.1 * openSUSE Leap 15.5 (x86_64) * bluez-devel-32bit-5.65-150500.3.6.1 * libbluetooth3-32bit-debuginfo-5.65-150500.3.6.1 * libbluetooth3-32bit-5.65-150500.3.6.1 * openSUSE Leap 15.5 (aarch64_ilp32) * bluez-devel-64bit-5.65-150500.3.6.1 * libbluetooth3-64bit-5.65-150500.3.6.1 * libbluetooth3-64bit-debuginfo-5.65-150500.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libbluetooth3-debuginfo-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * libbluetooth3-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbluetooth3-debuginfo-5.65-150500.3.6.1 * libbluetooth3-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * bluez-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * Basesystem Module 15-SP5 (noarch) * bluez-zsh-completion-5.65-150500.3.6.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * bluez-devel-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * bluez-cups-5.65-150500.3.6.1 * bluez-debuginfo-5.65-150500.3.6.1 * bluez-cups-debuginfo-5.65-150500.3.6.1 * bluez-debugsource-5.65-150500.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 12:30:06 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 23 Jan 2024 12:30:06 -0000 Subject: SUSE-SU-2024:0182-1: important: Security update for bluez Message-ID: <170601300634.9926.1124241493605524542@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2024:0182-1 Rating: important References: * bsc#1218300 * bsc#1218301 Cross-References: * CVE-2023-50229 * CVE-2023-50230 CVSS scores: * CVE-2023-50229 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-50230 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-50229: Fixed an out of bounds write in the primary version counter for the Phone Book Access Profile implementation (bsc#1218300). * CVE-2023-50230: Fixed an out of bounds write in the secondary version counter for the Phone Book Access Profile implementation (bsc#1218301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-182=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-182=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-182=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-182=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-182=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * bluez-cups-5.55-150300.3.28.1 * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-cups-debuginfo-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-test-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-test-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * openSUSE Leap 15.3 (noarch) * bluez-auto-enable-devices-5.55-150300.3.28.1 * openSUSE Leap 15.3 (x86_64) * libbluetooth3-32bit-debuginfo-5.55-150300.3.28.1 * libbluetooth3-32bit-5.55-150300.3.28.1 * bluez-devel-32bit-5.55-150300.3.28.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libbluetooth3-64bit-5.55-150300.3.28.1 * libbluetooth3-64bit-debuginfo-5.55-150300.3.28.1 * bluez-devel-64bit-5.55-150300.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libbluetooth3-5.55-150300.3.28.1 * bluez-devel-5.55-150300.3.28.1 * bluez-deprecated-5.55-150300.3.28.1 * bluez-deprecated-debuginfo-5.55-150300.3.28.1 * libbluetooth3-debuginfo-5.55-150300.3.28.1 * bluez-debuginfo-5.55-150300.3.28.1 * bluez-5.55-150300.3.28.1 * bluez-debugsource-5.55-150300.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50229.html * https://www.suse.com/security/cve/CVE-2023-50230.html * https://bugzilla.suse.com/show_bug.cgi?id=1218300 * https://bugzilla.suse.com/show_bug.cgi?id=1218301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 20:30:04 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 23 Jan 2024 20:30:04 -0000 Subject: SUSE-SU-2024:0200-1: important: Security update for redis7 Message-ID: <170604180455.29864.9213420336376187681@smelt2.prg2.suse.org> # Security update for redis7 Announcement ID: SUSE-SU-2024:0200-1 Rating: important References: * bsc#1212119 * bsc#1216376 Cross-References: * CVE-2023-45145 CVSS scores: * CVE-2023-45145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45145 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for redis7 fixes the following issues: * CVE-2023-45145: Fixed a potential permission bypass due to a race condition during UNIX socket creation (bsc#1216376). The following non-security issues were fixed: * Redis services are no longer disabled after an upgrade (bsc#1212119). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-200=1 openSUSE-SLE-15.5-2024-200=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-200=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * redis7-debugsource-7.0.8-150500.3.9.1 * redis7-7.0.8-150500.3.9.1 * redis7-debuginfo-7.0.8-150500.3.9.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * redis7-debugsource-7.0.8-150500.3.9.1 * redis7-7.0.8-150500.3.9.1 * redis7-debuginfo-7.0.8-150500.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45145.html * https://bugzilla.suse.com/show_bug.cgi?id=1212119 * https://bugzilla.suse.com/show_bug.cgi?id=1216376 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 23 20:30:23 2024 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 23 Jan 2024 20:30:23 -0000 Subject: SUSE-SU-2024:0196-1: moderate: Security Beta update for SUSE Manager Client Tools and Salt Message-ID: <170604182395.29864.8588618211797867060@smelt2.prg2.suse.org> # Security Beta update for SUSE Manager Client Tools and Salt Announcement ID: SUSE-SU-2024:0196-1 Rating: moderate References: * bsc#1172110 * bsc#1176460 * bsc#1180816 * bsc#1180942 * bsc#1181119 * bsc#1181935 * bsc#1183684 * bsc#1187725 * bsc#1188061 * bsc#1188571 * bsc#1189520 * bsc#1191454 * bsc#1192154 * bsc#1192383 * bsc#1192696 * bsc#1192763 * bsc#1193492 * bsc#1193686 * bsc#1193688 * bsc#1197507 * bsc#1198903 * bsc#1199810 * bsc#1200142 * bsc#1200480 * bsc#1200591 * bsc#1200968 * bsc#1200970 * bsc#1201003 * bsc#1201059 * bsc#1201535 * bsc#1201539 * bsc#1202614 * bsc#1202945 * bsc#1203283 * bsc#1203596 * bsc#1203597 * bsc#1203599 * bsc#1204032 * bsc#1204126 * bsc#1204302 * bsc#1204303 * bsc#1204304 * bsc#1204305 * bsc#1204501 * bsc#1205207 * bsc#1205225 * bsc#1205227 * bsc#1205599 * bsc#1205759 * bsc#1207352 * bsc#1207749 * bsc#1207750 * bsc#1207830 * bsc#1208046 * bsc#1208049 * bsc#1208060 * bsc#1208062 * bsc#1208065 * bsc#1208270 * bsc#1208293 * bsc#1208298 * bsc#1208612 * bsc#1208692 * bsc#1208719 * bsc#1208819 * bsc#1208821 * bsc#1208965 * bsc#1209113 * bsc#1209645 * bsc#1210458 * bsc#1210640 * bsc#1210907 * bsc#1211525 * bsc#1212099 * bsc#1212100 * bsc#1212279 * bsc#1212641 * bsc#1218843 * bsc#1218844 * jsc#MSQA-718 * jsc#PED-2145 * jsc#PED-2617 * jsc#PED-3576 * jsc#PED-3694 * jsc#PED-4556 * jsc#PED-5405 * jsc#PED-5406 * jsc#SLE-23422 * jsc#SLE-23439 * jsc#SLE-23631 * jsc#SLE-24133 * jsc#SLE-24565 * jsc#SLE-24791 Cross-References: * CVE-2020-7753 * CVE-2021-20178 * CVE-2021-20180 * CVE-2021-20191 * CVE-2021-20228 * CVE-2021-3447 * CVE-2021-3583 * CVE-2021-3620 * CVE-2021-36222 * CVE-2021-3711 * CVE-2021-3807 * CVE-2021-3918 * CVE-2021-41174 * CVE-2021-41244 * CVE-2021-43138 * CVE-2021-43798 * CVE-2021-43813 * CVE-2021-43815 * CVE-2022-0155 * CVE-2022-23552 * CVE-2022-27664 * CVE-2022-29170 * CVE-2022-31097 * CVE-2022-31107 * CVE-2022-31123 * CVE-2022-31130 * CVE-2022-32149 * CVE-2022-35957 * CVE-2022-36062 * CVE-2022-39201 * CVE-2022-39229 * CVE-2022-39306 * CVE-2022-39307 * CVE-2022-39324 * CVE-2022-41715 * CVE-2022-41723 * CVE-2022-46146 * CVE-2023-0507 * CVE-2023-0594 * CVE-2023-1387 * CVE-2023-1410 * CVE-2023-2183 * CVE-2023-2801 * CVE-2023-3128 CVSS scores: * CVE-2020-7753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-20178 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20180 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20180 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20191 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20191 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-20228 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-20228 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-3447 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2021-3447 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-3583 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2021-3583 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2021-3620 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-3620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-36222 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-36222 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3711 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3711 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3807 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3918 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3918 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-41174 ( SUSE ): 6.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N * CVE-2021-41174 ( NVD ): 6.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N * CVE-2021-41244 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2021-41244 ( NVD ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43138 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43798 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43798 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43813 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43813 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43815 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43815 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-0155 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2022-23552 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-23552 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-27664 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-27664 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-29170 ( SUSE ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L * CVE-2022-29170 ( NVD ): 8.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N * CVE-2022-31097 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-31097 ( NVD ): 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N * CVE-2022-31107 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2022-31107 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-31123 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2022-31123 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-31130 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-31130 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-32149 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-32149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-35957 ( SUSE ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-35957 ( NVD ): 6.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36062 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2022-36062 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2022-39201 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-39201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-39229 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-39229 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-39306 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-39306 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2022-39307 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2022-39307 ( NVD ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2022-39324 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2022-39324 ( NVD ): 6.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0507 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-0507 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-0594 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-0594 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-1387 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2023-1387 ( NVD ): 4.2 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2023-1410 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N * CVE-2023-1410 ( NVD ): 6.2 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N * CVE-2023-2183 ( SUSE ): 4.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N * CVE-2023-2183 ( NVD ): 4.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N * CVE-2023-2801 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2801 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3128 ( SUSE ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L * CVE-2023-3128 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Client Tools Beta for SLE 15 * SUSE Manager Client Tools Beta for SLE Micro 5 An update that solves 44 vulnerabilities, contains 14 features and has 35 security fixes can now be installed. ## Description: This update fixes the following issues: ansible: * Update to version 2.9.27 (jsc#SLE-23631) (jsc#SLE-24133) * bsc#1187725 CVE-2021-3620 ansible-connection module discloses sensitive info in traceback error message (in 2.9.27) * bsc#1188061 CVE-2021-3583 Template Injection through yaml multi-line strings with ansible facts used in template. (in 2.9.23) * bsc#1176460 gh#ansible/ansible#72094 ansible module nmcli is broken in ansible 2.9.13 (in 2.9.15) * Update to 2.9.22: * CVE-2021-3447 (bsc#1183684) multiple modules expose secured values * CVE-2021-20228 (bsc#1181935) basic.py no_log with fallback option * CVE-2021-20191 (bsc#1181119) multiple collections exposes secured values * CVE-2021-20180 (bsc#1180942) bitbucket_pipeline_variable exposes sensitive values * CVE-2021-20178 (bsc#1180816) user data leak in snmp_facts module dracut-saltboot: * Update to version 0.1.1681904360.84ef141 * Load network configuration even when missing protocol version (bsc#1210640) * Update to verion 0.1.1674034019.a93ff61 * Install copied wicked config as client.xml (bsc#1205599) * Update to version 0.1.1673279145.e7616bd * Add failsafe stop file when salt-minion does not stop (bsc#1172110) * Copy existing wicked config instead of generating new (bsc#1205599) * Update to version 0.1.1665997480.587fa10 * Add dependencies on xz and gzip to support compressed images * Update to version 0.1.1661440542.6cbe0da * Use standard susemanager.conf * Move image services to dracut-saltboot package * Use salt bundle * Require e2fsprogs (bsc#1202614) * Update to version 0.1.1657643023.0d694ce * Update dracut-saltboot dependencies (bsc#1200970) * Fix network loading when ipappend is used in pxe config * Add new information messages golang-github-QubitProducts-exporter_exporter: * Remove license file from %doc * Exclude s390 arch * Adapted to build on Enterprise Linux. * Fix build for RedHat 7 * Require Go >= 1.14 also for CentOS * Add support for CentOS * Replace %{?systemd_requires} with %{?systemd_ordering} golang-github-boynux-squid_exporter: * Exclude s390 architecture (gh#SUSE/spacewalk#19050) * Enhanced to build on Enterprise Linux 8. golang-github-lusitaniae-apache_exporter: * Do not strip if SUSE Linux Enterprise 15 SP3 * Exclude debug for RHEL >= 8 * Build with Go >= 1.20 when the OS is not RHEL * Spec file clean up * Fix apparmor profile for SLE 12 * Do not build with apparmor profile for SLE 12 * Upgrade to version 1.0.0 (jsc#PED-5405) * Improved flag parsing * Added support for custom headers * Build with Go 1.19 * Build using promu * Add _service file * Fix sandboxing options * Upgrade to version 0.13.4 * Fix denial of service vulnerability (CVE-2022-32149, bsc#1204501) * Upgrade to version 0.13.3 * Fix uncontrolled resource consumption (CVE-2022-41723, bsc#1208270) * Upgrade to version 0.13.1 * Fix panic caused by missing flagConfig options * Upgrade to version 0.13.0 * Fix authentication bypass vulnarability (CVE-2022-46146, bsc#1208046) * Corrected comment in AppArmor profile * Added AppArmor profile * Added sandboxing options to systemd service unit * Exclude s390 architecture (gh#SUSE/spacewalk#19050) * Update to upstream release 0.11.0 (jsc#SLE-24791) * Add TLS support * Switch to logger, please check --log.level and --log.format flags * Update to version 0.10.1 * Bugfix: Reset ProxyBalancer metrics on each scrape to remove stale data * Update to version 0.10.0 * Add Apache Proxy and other metrics * Update to version 0.8.0 * Change commandline flags * Add metrics: Apache version, request duration total * Adapted to build on Enterprise Linux 8 * Require building with Go 1.15 * Add support for RedHat 8 * Adjust dependencies on spec file * Disable dwarf compression in go build * Add support for Red Hat * Add %license macro for LICENSE file golang-github-prometheus-prometheus: * Update to 2.45.0 (jsc#PED-5406): * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint. * [FEATURE] Config: Add limits to global config. * [FEATURE] Consul SD: Added support for `path_prefix`. * [FEATURE] Native histograms: Add option to scrape both classic and native histograms. * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time`. * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed. * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace. * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set to its former value 120. * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails. * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner. * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk. * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault. * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder. * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call. * [BUGFIX] TSDB: Use path/filepath to set the WAL directory. * Update to 2.44.0: * [FEATURE] Remote-read: Handle native histograms. * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI. * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries. * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples. * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels. * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`. * [ENHANCEMENT] Rules API: Allow filtering by rule name. * [ENHANCEMENT] Native Histograms: Various fixes and improvements. * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive. * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair. * [BUGFIX] TSDB: Block compaction failed when shutting down. * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted. * Update to 2.43.1 * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules. * Update to 2.43.0: * [FEATURE] Promtool: Add HTTP client configuration to query commands. * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files. * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests. * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables. * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API. * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled. * [ENHANCEMENT] Scrape: Allow exemplars for all metric types. * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size. * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL. * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible. * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion. * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading. * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks` metrics when reading WAL. * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the `prometheus_tsdb_sample_ooo_delta` metric. * Update to 2.42.0: This release comes with a bunch of feature coverage for native histograms and breaking changes. If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the latest data. Additionally, if you scrape "float histograms" or use recording rules on native histograms in v2.42.0 (which writes float histograms), it is a one-way street since older versions do not support float histograms. * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms. * [FEATURE] Add 'keep_firing_for' field to alerting rules. * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump. * [ENHANCEMENT] Agent: Native histogram support. * [ENHANCEMENT] Rules: Support native histograms in recording rules. * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes. * [ENHANCEMENT] SD: Add VM size label to azure service discovery. * [ENHANCEMENT] Support native histograms in federation. * [ENHANCEMENT] TSDB: Add gauge histogram support. * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values. * [ENHANCEMENT] UI: Show individual scrape pools on /targets page. * Update to 2.41.0: * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions. * [FEATURE] Add support for HTTP proxy headers. * [ENHANCEMENT] Reload private certificates when changed on disk. * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config. * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info. * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs. * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total. * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling. * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators. * [ENHANCEMENT] TSDB: Optimize postings offset table reading. * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling. * [BUGFIX] Remote Write receiver and rule manager: Fix error handling. * Update to 2.40.7: * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms. * Update to 2.40.5: * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators. * Update to 2.40.3: * [BUGFIX] TSDB: Fix compaction after a deletion is called. * Update to 2.40.2: * [BUGFIX] UI: Fix black-on-black metric name color in dark mode. * Update to 2.40.1: * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture. * [BUGFIX] Scrape: Fix accept headers. * Update to 2.40.0: * [FEATURE] Add experimental support for native histograms. Enable with the flag --enable-feature=native-histograms. * [FEATURE] SD: Add service discovery for OVHcloud. * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding. * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed. * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition config in consul_sd_config. * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series. * Update to 2.39.1: * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts. * Update to 2.39.0: * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via out_of_order_time_window field in the config file; check config file docs for more info. * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing GET support. * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label. * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label. * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label. * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory. * [ENHANCEMENT] TSDB: Improve WAL replay timings. * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory. * [ENHANCEMENT] TSDB: Allow overlapping blocks by default. \--storage.tsdb.allow-overlapping-blocks now has no effect. * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard. * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak. * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup. * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries. * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired. * Update to 2.38.0: * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions. * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI. * [FEATURE]: DNS SD: Support MX records for discovering targets. * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to Go time.Time values. * [ENHANCEMENT]: Kubernetes SD: Add __meta_kubernetes_service_port_number meta label indicating the service port number. __meta_kubernetes_pod_container_image meta label indicating the container image. * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message. * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio. * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead. * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80) or HTTPS (:443) ports in the target's scrape address. * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the type="exemplar" label instead of type="unknown" for exemplar records. * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading. * Remove npm_licenses.tar.bz2 during "make clean" * Remove web-ui archives during "make clean". * Require promu >= 0.14.0 for building * Drop: * Upgrade to version 2.37.6 * Require Go 1.19 * Upgrade to version 2.37.5 * [SECURITY] Security upgrade from go and upstream dependencies that include security fixes to the net/http and os packages. * Upgrade to version 2.37.4 * [SECURITY] Fix basic authentication bypass vulnerability (CVE-2022-46146, bsc#1208049, jsc#PED-3576). * Upgrade to version 2.37.3 * [BUGFIX] Update our regexp library to fix upstream CVE-2022-41715. * Upgrade to version 2.37.2 * Upgrade to version 2.37.1 * [BUGFIX] Properly close file descriptor when logging unfinished queries. * [BUGFIX] TSDB: In the WAL watcher metrics, expose the * Upgrade to version 2.37.0 * [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery. * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role. * [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels. * [ENHANCEMENT] TSDB: Memory optimizations. * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL. * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header. * [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued. * [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file. * [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures. * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads. * [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled. * [BUGFIX] TSDB: Fix panic if series is not found when deleting series. * [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors. * [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default configuration values. * Upgrade to version 2.36.2 * [BUGFIX] Fix serving of static assets like fonts and favicon. * Upgrade to version 2.36.1 * [BUGFIX] promtool: Add --lint-fatal option. * Upgrade to version 2.36.0 * [FEATURE] Add lowercase and uppercase relabel action. * [FEATURE] SD: Add IONOS Cloud integration. * [FEATURE] SD: Add Vultr integration. * [FEATURE] SD: Add Linode SD failure count metric. * [FEATURE] Add prometheus_ready metric. * [ENHANCEMENT] Add stripDomain to template function. * [ENHANCEMENT] UI: Enable active search through dropped targets. * [ENHANCEMENT] promtool: support matchers when querying label * [ENHANCEMENT] Add agent mode identifier. * [BUGFIX] Changing TotalQueryableSamples from int to int64. * [BUGFIX] tsdb/agent: Ignore duplicate exemplars. * [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate. * [BUGFIX] Stop rule manager before TSDB is stopped. * Upgrade to version 2.35.0 * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts. * [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting in a new exit code (3) for linter errors. * [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit. Enable with the flag \--enable-feature=auto-gomaxprocs. * [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query. Additionally, per-step statistics are available with --enable- feature=promql-per-step-stats and using stats=all in the query API. Enable with the flag \--enable-feature=per-step-stats. * [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup. * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures. * [ENHANCEMENT] Azure SD: Add an optional resource_group configuration. * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1 EndpointSlice (previously only discovery.k8s.io/v1beta1 EndpointSlice was supported). * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods. * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens. * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2. * [ENHANCEMENT] Config: Support overriding minimum TLS version. * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io. * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly. * [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page. * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false. * [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments. * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue. * Upgrade to version 2.34.0 * [CHANGE] UI: Classic UI removed. * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing. * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag \--storage.tsdb.head-chunks-write- queue-size. * [ENHANCEMENT] HTTP SD: Add a failure counter. * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests. * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni. * [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape. * [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1. * [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read. * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar. * [ENHANCEMENT] UI: Improve graph colors that were hard to see. * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels. * [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset. * [BUGFIX] UI: Fix bug that sets the range input to the resolution. * [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled. * [BUGFIX] Parser: Specify type in metadata parser errors. * [BUGFIX] Scrape: Fix label limit changes not applying. * Upgrade to version 2.33.5 * [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch. * Upgrade to version 2.33.4 * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk. * Upgrade to version 2.33.3 * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set. * Upgrade to version 2.33.2 * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set. * [BUGFIX] Remote-write: Fix deadlock when stopping a shard. * Upgrade to version 2.33.1 * [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s. * Upgrade to version 2.33.0 * [CHANGE] PromQL: Promote negative offset and @ modifer to stable features. * [CHANGE] Web: Promote remote-write-receiver to stable. * [FEATURE] Config: Add stripPort template function. * [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended. * [FEATURE] SD: Enable target discovery in own K8s namespace. * [FEATURE] SD: Add provider ID label in K8s SD. * [FEATURE] Web: Add limit field to the rules API. * [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces. * [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver. * [ENHANCEMENT] Remote-write: Shard up more when backlogged. * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance. * [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap. * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write. * [ENHANCEMENT] TSDB: Improve label matching performance. * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar. * [ENHANCEMENT] UI: Optimize the target page and add a search bar. * [BUGFIX] Promtool: Make exit codes more consistent. * [BUGFIX] Promtool: Fix flakiness of rule testing. * [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write irrecoverably fails. * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator. * [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks. * [BUGFIX] TSDB: Fix logging of exemplar storage size. * [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes. * [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets. * [BUGFIX] UI: Fix autocompletion when expression is empty. * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write. * Fix authentication bypass by updating Prometheus Exporter Toolkit to version 0.7.3 (CVE-2022-46146, bsc#1208049) * Fix uncontrolled resource consumption by updating Go to version 1.20.1 (CVE-2022-41723, bsc#1208298) * Restructure the spec to build web assets online * Makefile grafana: * Update to version 9.5.8: * Features and enhancements GenericOAuth: Set sub as auth id * Bug fixes: DataSourceProxy: Fix url validation error handling * Update to version 9.5.7: Alerting: Sort NumberCaptureValues in EvaluationString Alerting: Improve performance of matching captures Alerting: No longer silence paused alerts during legacy migration Alerting: Remove and revert flag alertingBigTransactions Alerting: Migrate unknown NoData\Error settings to the default Tracing: supply Grafana build version Tempo: Escape regex-sensitive characters in span name before building promql query Plugins: Only configure plugin proxy transport once Alerting: Fix unique violation when updating rule group with title chains/cycles Prometheus: Version detect bug Prometheus: Fix heatmap format with no data Database: Change getExistingDashboardByTitleAndFolder to get dashboard by title, not slug Alerting: Convert 'Both' type Prometheus queries to 'Range' in SQLStore: Fix Postgres dialect treating "false" migrator default as true Alerting: Support newer http_config struct InfluxDB: Interpolate retention policies StatusHistory: Fix rendering of value-mapped null Alerting: Fix provenance guard checks for Alertmanager configuration to not cause panic when compared nested objects AnonymousAuth: Fix concurrent read-write crash AzureMonitor: Ensure legacy properties containing template variables are correctly migrated Explore: Remove data source onboarding page Dashboard: Re-align Save form Azure Monitor: Fix bug that did not show alert rule preview Histogram: Respect min/max panel settings for x-axis Heatmap: Fix color rendering for value ranges < 1 Heatmap: Handle unsorted timestamps in calculate mode Google Cloud Monitor: Fix mem usage for dropdown AzureMonitor: Fix logs query multi-resource and timespan values Utils: Reimplement util.GetRandomString to avoid modulo bias Alerting: Fix matching labels with spaces in their values Dashboard: Fix applying timezone to datetime variables Dashboard: Fix panel description event triggering every time panel is rendered Tempo: Fix get label values based on CoreApp type Heatmap: Fix log scale editor Dashboard: Fix disappearing panel when viewed panel is refreshed Prometheus: Fix bug in creating autocomplete queries with labels Prometheus: Fix Query Inspector expression range value Alerting: Fix migration failing if alert_configuration table is not empty InfluxDB: Fix querying retention policies on flux mode * Update to version 9.5.6: * Bug fixes Dashboard: Fix library panels in collapsed rows not getting updated Auth: Add and document option for enabling email lookup * Update to version 9.5.5: Security: Fix authentication bypass using Azure AD OAuth (bsc#1212641, CVE-2023-3128, jsc#PED-3694). Auth: Show invite button if disable login form is set to false. Azure: Fix Kusto auto-completion for Azure datasources. RBAC: Remove legacy AC editor and admin role on new dashboard route. API: Revert allowing editors to access GET /datasources. Settings: Add ability to override skip_org_role_sync with Env variables. * Update to version 9.5.3: Query: Prevent crash while executing concurrent mixed queries (bsc#1212099, CVE-2023-2801). Alerting: Require alert.notifications:write permissions to test receivers and templates (bsc#1212100, CVE-2023-2183). * Update to version 9.5.2: Alerting: Scheduler use rule fingerprint instead of version. Explore: Update table min height. DataLinks: Encoded URL fixed. TimeSeries: Fix leading null-fill for missing intervals. Dashboard: Revert fixed header shown on mobile devices in the new panel header. PostgreSQL: Fix TLS certificate issue by downgrading lib/pq. Provisioning: Fix provisioning issues with legacy alerting and data source permissions. Alerting: Fix misleading status code in provisioning API. Loki: Fix log samples using `instant` queries. Panel Header: Implement new Panel Header on Angular Panels. Azure Monitor: Fix bug that was not showing resources for certain locations. Alerting: Fix panic when reparenting receivers to groups following an attempted rename via Provisioning. Cloudwatch Logs: Clarify Cloudwatch Logs Limits. * Update to 9.5.1 Loki Variable Query Editor: Fix bug when the query is updated Expressions: Fix expression load with legacy UID -100 * Update to 9.5.0 (CVE-2023-1387, bsc#1210907, jsc#PED-3694) * Breaking changes * default named retention policies won't be used to query. Users who have a default named retention policy in their influxdb database, have to rename it to something else. Having default named retention policy is not breaking anything. We will make sure to use the actual default retention policy under the hood. To change the hardcoded retention policy in the dashboard.json, users must they select the right retention policy from dropdown and save the panel/dashboard. * Grafana Alerting rules with NoDataState configuration set to Alerting will now respect "For" duration. * Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it will default to false. API keys: Add deprecation to api keys. API: Enable serving Swagger UI by default and add docs and guidelines. API: Permit Cache-Control (browser caching) for datasource resources. Accessibility: Make row actions keyboard accessible. Admin/Plugins: Set category filter in connections link. Alerting: Add CustomDetails field in PagerDuty contact point. Alerting: Add dashboard and panel links to rule and instance annotations. Alerting: Add filter and remove funcs for custom labels and Alerting: Add fuzzy search to alert list view. Alerting: Add metrics for active receiver and integrations. Alerting: Better printing of labels. Alerting: Create new state history "fanout" backend that dispatches to multiple other backends at once. Alerting: Enable preview for recording rules. Alerting: Fetch all applied alerting configurations. Alerting: Introduce proper feature toggles for common state history backend combinations. Alerting: Make time range query parameters not required when querying Loki. Alerting: New notification policies view. Alerting: No longer index state history log streams by instance labels. Alerting: Respect "For" Duration for NoData alerts. Alerting: Support filtering rules by multiple datasources. Alerting: Switch to snappy-compressed-protobuf for outgoing push requests to Loki. Angular: Prevent angular from loading when disabled. Auth: Add Generic oauth skip org role sync setting. Auth: Add feature flag to move token rotation to client. Auth: Show user sync external Authentication status. Backend: Use sdk version 0.148.0. Chore: Add stat for remote cache config. Chore: Replace short UID generation with more standard UUIDs. Chore: Use DOMPurify to sanitize strings rather than js-xss. CloudMonitoring: Add possibility to use path for private key. CloudWatch Logs: Update default timeout to 30m. CloudWatch: Add AWS/IotSiteWise namespace and metrics. CloudWatch: Add account support to variable queries. CloudWatch: Make deeplinks work for us-gov and china regions. Cloudwatch: Add MeteredIOBytes metric for EFS. Command Palette: Display dashboard location. Command palette: Enable folder searching. Connections: Turn on feature toggle by default. Cookies: Provide a mechanism for per user control over cookies. Dashboard Datasource: Update Query List & Improve UX. Dashboard: Add a feature that creates a table panel when a spreadsheet file is dropped on the dashboard. Dashboard: Add new visualization/row/library panel/pasted panel is now a dropdown menu. Dashboard: Add value format for requests per minute. Dashboard: Empty/No Panels dashboard with a new design. Dashboard: When dashboard is not found show message instead of empty page. Dashboards: Enable feature flag newPanelChromeUI by default. Dataplane: Support timeSeriesLong without transform. Datasources: Add user_agent header customization for outgoing HTTP requests. Datasources: Use getDefaultQuery in annotations editors. Docs: Add documentation on how to debug backend plugins. Docs: Deprecate dashboard previews. Elasticsearch: Detect Elasticsearch version. Elasticsearch: Run Explore queries trough data source backend. Explore: Add range option to internal data links. Explore: Add transformations to correlation data links. Explore: Support mixed data sources for supplementary query. Extensions: Expose an enum for available placements. Feat: Changing link destination for get more plugins. Feat: Linking to plugin details page rather than externally for new datasources. FieldMatchers: Add match by value (reducer). Flame graph: Add context menu. Flame graph: Add metadata above flame graph. Geomap: Improve tooltip url for photos layer. Geomap: Release night / day layer. InfluxDB: Move database information into jsondata. Jaeger and Zipkin: Config & docs upgrade. LDAP: Allow setting minimum TLS version and accepted ciphers. Live: Remove (alpha) ability to configure live pipelines. Logger: Add feature toggle for errors in HTTP request logs. Login: Allow custom name and icon for social providers. Logs Panel: Refactor style generation to improve rendering performance. Logs: Add millisecond to timestamp in log line. Logs: Rename dedup to deduplicate. Loki Query Editor: Make Monaco the default editor. Loki: Add unpack query builder hint. Loki: Add descriptions to query builder operations. Loki: Add placeholder to the loki query editor. Loki: Always fetch for new label keys in the QueryBuilder. Loki: Display error with label filter conflicts. Loki: Improve the display of loki query stats. MSSQL/Postgres: List views in table dropdown as well. MSSQL: Update forked go-mssqldb dependency. Metrics: Update comment to mention folders instead of dashboards. Navigation: Enable new navigation by default. NodeGraph: Support icons for nodes. Notifications: Enable display of trace ID by default. Packaging: Start Grafana service after InfluxDB. Panel Header: Add CancelQuery option to panel header. Panel: Show multiple errors info in the inspector. PanelChrome: Add option to show actions on the right side (actions = leftItems). Phlare: Allow variables in labelSelector (in query). Plugin: Skip preloading disabled app plugins. Plugins: Add optional logger for plugin requests sent to backend plugins. Plugins: Extend panel menu with commands from plugins. Plugins: Extend panel menu with links from plugins. Plugins: Improve instrumentation by adding metrics and tracing. Plugins: Support for distributed tracing in backend plugins SDK. Plugins: Support for link extensions. Profiling: Enable flame graph & Phlare/Parca data sources for all users. Prometheus Datasource: Improve Prom query variable editor. Prometheus Metrics: Add missing stat_total_teams metric. Prometheus/Loki: Run query explicitly instead of onblur in panel edit. Prometheus: Browser resource caching. Prometheus: Improve prometheus query variable editor. Prometheus: Use $__rate_interval for rate queries generated by metric browser. Pubdash: Email sharing handle dashboard deleted. PublicDashboards: Backfills share column with default value. PublicDashboards: Configuration modal redesign. PublicDashboards: Email sharing. PublicDashboards: Enable creation when dashboard has template variables. PublicDashboards: Paused or deleted public dashboard screen. QueryHistory: Improve handling of mixed datasource entries. Rendering: Experimental support to use JWTs as auth method. SQL Datasources: Add back help content. Schema: Remove exclusion for timeseries and update imports. Search: Improvements for starred dashboard search. Select: Show icon in the grafana/ui Select component. Service accounts: Creation logic simplification. Service accounts: Remove Add API keys buttons and remove one state of migrating for API keys tab. SplitOpen: Update API to accept multiple queries. Stat Panel: Add an option for a non-gradient/solid background. Stat: Add ability to remove default single-color background gradient. SupportBundles: Add OAuth bundle collectors. Table Panel: Add ability to use text color for value or hide value in gauge cell. Table: Introduce sparkline cell type. Tempo: Config and doc updates. Tempo: Update service graph view and docs. TraceView: Add key and url escaping of json tag values. TraceView: Reworked header. Tracing: Add more detail to HTTP Outgoing Request. Tracing: Docs and config improvements for Tempo/Jaeger/Zipkin. Tracing: Support multiple OTel propagators. Transformations: Support time format when converting time to strings. Transformers: Support adding the row index using calculate field transformer. Units: Format currency with negative before the symbol. API: Fix "Updated by" Column in dashboard versions table. AccessControl: Allow editors to access GET /api/datasources. Alerting: Add "backend" label to state history writes metrics. Alerting: Add alert instance labels to Loki log lines in addition to stream labels. Alerting: Elide requests to Loki if nothing should be recorded. Alerting: Fix DatasourceUID and RefID missing for DatasourceNoData alerts. Alerting: Fix ambiguous handling of equals in labels when bucketing Loki state history streams. Alerting: Fix attachment of external labels to Loki state history log streams. Alerting: Fix creating a recording rule when having multiple datasources. Alerting: Fix explore link in alert detail view. Alerting: Fix share URL for Prometheus rules on subpath. Alerting: Fix stats that display alert count when using unified alerting. Alerting: Hide mute timing actions when dealing with vanilla prometheus. Alerting: Paginate result previews. Alerting: Prometheus-compatible Alertmanager timings editor. Alerting: Update scheduler to get updates only from database. Alerting: Use a completely isolated context for state history writes. Alerting: Use displayNameFromDS if available in preview. Annotation List: Fix panel not updating when variable is changed. Annotations: Ignore unique constraint violations for tags. Auth: Fix orgrole picker disabled if isSynced user. AzureMonitor: Fix Log Analytics portal links. BrowseDashboards: Fix move to General folder not working. Catalog: Show install error with incompatible version. Chore: Update Grafana to use Alertmanager v0.25.1-0.20230308154952-78fedf89728b. CloudMonitoring: Add project selector for MQL editor[fix]. CloudWatch Logs: Fix running logs queries with expressions. CloudWatch Logs: Fix to make log queries use a relative time if available. CloudWatch Logs: Revert "Queries in an expression should run synchronously". CloudWatch: Fix cachedQueries insights not being updated for metric queries. Cloudwatch: Pass refId from query for expression queries. Dashboards: Evaluate provisioned dashboard titles in a backwards compatible way. Dashboards: Fix broken internal data links. Database: Don't sleep 10ms before every request. Elasticsearch: Fix processing of response with multiple group by for alerting. Elasticsearch: Handle multiple annotation structures. Email: Mark HTML comments as "safe" in email templates. ErrorHandling: Fixes issues with bad error messages. ErrorView: Better detection of no-data responses. Explore: Make DataSourcePicker visible on small screens. Fix: DataLinks from data sources override user defined data link. Fix: Top table rendering and update docs. Frontend: Fix broken links in /plugins when pathname has a trailing slash. Geomap: Fix route layer zoom behavior. Google Cloud Monitoring: Fix project variable. HeatMap: Sort y buckets when all bucket names are numeric. InfluxDB: Fix querying with hardcoded retention policy. InfluxDB: Fix sending retention policy with InfluxQL queries. KVStore: Include database field in migration. LDAP: Always synchronize Server Admin role through role sync if role sync is enabled. Library panels: Ensure pagination controls are always correctly displayed. Loki: Fix autocomplete situations with multiple escaped quotes. MegaMenu: Fixes mega menu showing scroll indicator when it shouldn't. Navigation: Redirect to root page when switching organization. Navigation: Scrolled hamburger menu links now navigate correctly in Safari. NestedFolders: Fix nested folder deletion. New Panel Header: Fix when clicking submenu item the parent menu item onClick get's triggered. Phlare: Fix error when there are no profileTypes to send from backend. PieChart: Show long labels properly. PluginExtensions: Fixed issue with incorrect type being exposed when configuring an extension. Plugins: Ensure proxy route bodies are valid JSON. Plugins: Fix width for README pages with tables. Plugins: Markdown fetch retry with lowercase. Plugins: Skip instrumenting plugin build info for core and bundled plugins. PublicDashboards: Query collapsed panels inside rows. Query Splitting: Fix for handling queries with no requestId. SQL Datasources: Fix variable throwing error if query returns no data. SQL Datasources: Prevent Call Stack Overflows with Large Numbers of Values for Variable. SQLStore: Fix SQLite error propagation if query retries are disabled. Stat Panel: Fix issue with clipping text values. Table Panel: Fix panel migration for options cell type. Table: Fix migrations from old angular table for cell color modes. Table: Fixes issue with pagination summary causing scrollbar. Table: Fixes table panel gauge alignment. TablePanel: Fix table cells overflowing when there are multiple data links. TablePanel: fix footer bug; no footer calculated values after "hidden" column override. Templating: Allow percent encoding of variable with custom all. Tempo: Set default limit if none is provided for traceql queries. TimeSeries: Don't extend stepped interpolation to graph edges. TimeSeries: Improve stacking direction heuristic. Trace View: Update the queryType to traceql for checking if same trace when clicking span link. TraceView: Don't require preferredVisualisationType to render. Utils: Reimplement util.GetRandomString to avoid modulo bias. XYChart: Add all dataset columns in tooltip. * Plugin development fixes & changes DateTimePicker: Can now select time correctly. Grafana UI: Fix tooltip prop of button component. DateTimePicker: Add min date support to calendar. GrafanaUI: Implement new component Toggletip. ContextMenu: Fix padding and show border based on items. * Update to 9.4.7 (2023-03-16) Alerting: Update scheduler to receive rule updates only from database. Influxdb: Re-introduce backend migration feature toggle. Security: Fixes for CVE-2023-1410. The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4 and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either: Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` or `dashboard.json` as the exporter toolkit has been updated by upstream * Install wrapper scripts under /usr/sbin * Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin) * Update to 9.4.3 Alerting: Use background context for maintenance function. * Update to 9.4.2 Alerting: Fix boolean default in migration from false to 0. * Update to 9.4.0 Alerting: Add endpoint for querying state history. Alerting: Add label query parameters to state history endpoint. Alerting: Add static label to all state history entries. Alerting: Mark AM configuration as applied. Azure Monitor: Enable multiple resource queries. Query Caching: Add per-panel query caching TTL. Table: Add row number column option. Tempo: Remove tempoApmTable feature flag. Transformations: Selectively apply transformation to queries. AccessControl: Clear user permission cache for update org user role. Alerting: Fix handling of special floating-point cases when writing observed values to annotations. Auth: Rotate token patch. ContextMenu: Consider y coord when determining bottom collision. Elasticsearch: Fix consistent label order in alerting. Explore: Fix graph not updating when changing config. Heatmap: Support heatmap rows with non- timeseries X axis. Login: Fix panic when a user is upserted by a background process. MSSQL: Add support for macro function calls. MySQL: Quote identifiers that include special characters. Navigation: Sign in button now works correctly when served under a sub path. Nested Folder: Fix for SQLite not to overwrite the parent on restarts. PanelChrome: Adds display mode to support transparent option. Plugins: Case-sensitive routes for standalone pages. Plugins: Prefer to use the data source UID when querying. SQLStore: Fix folder migration for MySQL < 5.7. Search: Fix not being able to clear sort value. Tempo: Fix span name being dropped from the query. PanelChrome: Implement hover header. * Update to 9.3.7 Alerting: Validate that tags are 100 characters or less. Expressions: Fixes the issue showing expressions editor. Logs: Fix stats not being updated when log results change. Plugins: Fix circular reference in customOptions leading to MarshalJSON errors. Time Series Panel: Fix legend text selection in Firefox. * Update to 9.3.6 QueryEditorRow: Fixes issue loading query editor when data source variable selected. * Update to 9.3.4 Prometheus: Add default editor configuration. TextPanel: Refactor to functional component. Alerting: Fix webhook to use correct key for decrypting token. Alerting: Set error annotation on EvaluationError regardless of underlying error type. Datasources: Fix Proxy by UID Failing for UIDs with a Hyphen. Fix creating of span link with no tags. Elasticsearch: Fix failing requests when using SigV4. Elasticsearch: Fix toggle-settings are not shown correctly. Explore: Be sure time range key bindings are mounted after clear. Explore: Unsync time ranges when a pane is closed. Logs: Lines with long words do not break properly. Loki: Fix misaligned derived fields settings. Query Builder: Fix max width of input component to prevent overflows. Search: Auto focus input elements. Search: Fix empty folder message showing when by starred dashboards. Table Panel: Fix image of image cell overflowing table cell and cells ignoring text alignment setting when a data link is added. * Update to 9.3.2 Graphite: Process multiple queries to Graphite plugin. API: Fix delete user failure due to quota not enabled. Accessibility: Improved keyboard accessibility in BarGauge. Accessibility: Improved keyboard accessibility in BigValue. Alerting: Use the QuotaTargetSrv instead of the QuotaTarget in quota check. AzureMonitor: Automate location retrieval. AzureMonitor: Fix bad request when setting dimensions. BarChart: Fix value mappings. Build: Streamline and sync dockerfiles. Build: Unified dockerfile for all builds. CloudWatch: Fix - make sure dimensions are propagated to alert query editor. Cloudwatch: Fix deeplink with default region. Command Palette: Fix not being able to type if triggered whilst another modal is open. Command Palette: Maintain page state when changing theme. Dashboards: Fix 'Make Editable' button not working in Dashboard Settings. Dashboards: Show error when data source is missing. Datasource: Fix - apply default query also to queries in new panels. Dropdown: Menu now closes correctly when selecting options on touch devices. Influx: Query segment menus now position correctly near the bottom of the screen. Login: Fix failure to login a new user via an external provider if quota are enabled. Loki/Prometheus: Fix wrong queries executed in split view. Loki: Fix wrongly escaped label values when using LabelFilter. Navigation: Prevent app crash when importing a dashboard with a uid of `home`. Panel Edit: Fix data links edit icons being off screen when provided title is too long. Prometheus: Fix exemplar fill color to match series color in time series. Prometheus: Fix exemplars not respecting corresponding series display status. StateTimeline: Fix negative infinity legend/tooltip from thresholds. Table: Fixes row border style not showing and colored rows blending together. Tempo: Fix TraceQL autocomplete issues. TimePicker: Prevent TimePicker overflowing viewport on small screens. TimeRangePicker: Fix recently ranges only not showing all recent ranges. TimeZonePicker: Scroll menu correctly when using keyboard controls. * Update to 9.3.1 Connections: Update "Your connections/Data sources" page. Accessibility: Increase badge constrast to be WCAG AA compliant. * Update to 9.3.0 Alerting: Enable interpolation for notification policies in file provisioning. Azure Monitor Logs: Avoid warning when the response is empty. Azure Monitor: Add support to customized routes. Canvas: Add icon value mapping. CloudWatch: Cross-account querying support. Docs: Update `merge-pull-request.md` regarding backport policies. GaugePanel: Setting the neutral-point of a gauge. Geomap: Improve location editor. Internationalization: Enable internationalization by default. Logs: Add `Download logs` button to log log-browser. Loki: Add `gzip` compression to resource calls. Loki: Add improvements to loki label browser. Loki: Make label browser accessible in query builder. Loki: Remove raw query toggle. Middleware: Add CSP Report Only support. Navigation: Prevent viewer role accessing dashboard creation, import and folder creation. OAuth: Refactor OAuth parameters handling to support obtaining refresh tokens for Google OAuth. Oauth: Display friendly error message when role_attribute_strict=true and no valid role found. Preferences: Add confirmation modal when saving org preferences. PublicDashboards: Orphaned public dashboard deletion script added. Query Editor: Hide overflow for long query names. Solo Panel: Configurable timezone. TablePanel: Add support for Count calculation per column or per entire dataset. Tempo: Send the correct start time when making a TraceQL query. Various Panels: Remove beta label from Bar Chart, Candlestick, Histogram, State Timeline, & Status History Panels. Access Control: Clear user's permission cache after resource creation. Accessibility: Improve keyboard accessibility in `AnnoListPanel`. Accessibility: Improve keyboard accessibility in `Collapse`. `GettingStarted` panel. Accessibility: Improve keyboard accessibility of `FilterPill`. Admin: Fix broken links to image assets in email templates. Azure Monitor: Fix namespace selection for storageaccounts. Calcs: Fix difference percent in legend. DataLinks: Improve Data-Links AutoComplete Logic. Explore: Fix a11y issue with logs navigation buttons. Heatmap: Fix blurry text & rendering. Heatmap: Fix tooltip y range of top and bottom buckets in calculated heatmaps. Logs: Fix misalignment of LogRows. Navigation: Stop clearing search state when opening a result in a new tab. OptionsUI: SliderValueEditor does not get auto focused on slider change. PanelEdit: Fixes bug with not remembering panel options pane collapse/expand state. Quota: Fix failure in store due to missing scope parameters. Quota: Fix failure when checking session limits. StateTimeline: Prevent label text from overflowing state rects. Tempo: Fix search table duration unit. TraceView: Fix broken rendering when scrolling in Dashboard panel in Firefox. GrafanaUI: Add disabled option for menu items. * Update to 9.2.4 Access Control: Add an endpoint for setting several managed resource permissions. Accessibility: Increase `Select` placeholder contrast to be WCAG AA compliant. Alerting: Append org ID to alert notification URLs. Alerting: Make the Grouped view the default one for Rules. Build: Remove unnecessary alpine package updates. Google Cloud Monitoring: Set frame interval to draw null values. Instrumentation: Expose when the binary was built as a gauge. Loki: Preserve `X-ID-Token` header. Search: Reduce requests in folder view. TimeSeries: More thorough detection of negative values for auto-stacking direction. Alerting: Attempt to preserve UID from migrated legacy channel. Alerting: Fix response is not returned for invalid Duration in Provisioning API. Alerting: Fix screenshot is not taken for stale series. Auth: Fix admins not seeing pending invites. MSSQL/Postgres: Fix visual query editor filter disappearing. Tempo: Fix dropdown issue on tag field focus. Timeseries: Fix null pointer when matching fill below to field. Toolkit: Fix Webpack less-loader config. * Update to 9.2.3 Docs: Add information about DB version support to upgrade guide. Footer: Update footer release notes link to Github changelog. Prometheus: Do not drop errors in streaming parser. Prometheus: Flavor/version configuration. Prometheus: Provide label values match parameter API when supported prometheus instance is configured. Security: Upgrade x/text to version unaffected by CVE-2022-32149. Auth: Fix GF_AUTH_JWT_URL_LOGIN env variable doesn't work. Live: Explicitly reply with http 200. Prometheus: Fix builder operation mode changing multiselect to single select behaviour. Security: Fix vulnerabilities in webpack loader- utils. * Update to 9.2.2 Alerting: Add support for wecom apiapp. Canvas: Improve resource picker initialization. Canvas: Improve text element readability. CloudWatch: Make sure adoption tracking is done on valid, migrated queries. Dashboard: Alerts user to incorrect tag format for JSON import. MSSQL: Support tables from all schemas. Opentsdb: Allow template variables for filter keys. QueryEditor: Revert components from grafana-ui. Browse: Fix General folder not showing in FolderPicker. Elasticsearch: Fix calculation of trimEdges in alert mode. Elasticsearch: Fix trimEdges delete logic in alert mode. GoogleOAuth: Unlock User Admin UI. LogContext: Fix wrong color of `show context` icon in light theme. Loki: Fix adding of adhoc filters to stream selector when query with empty stream selector. Loki: Fix double stringified log-lines when copied via Copy button. Loki: Fix explain section about $__interval variable. Loki: Remove already selected options from next label filter options in builder. NodeGraph: Fix rendering issues when values of arc are over 1. PublicDashboards: Fix hidden queries execution. Tempo: Fix Node Graph visualization type in dashboard. TimeSeries: Fix stacking when first value is negative zero. TimeseriesPanel: Fix variables in data links. User: Fix externalUserId not being populated. We added some components a bit too early to @grafana/ui in 9.2 so we are moving them back to @grafana/experimental. If you used any of these components AccessoryButton EditorFieldGroup EditorHeader EditorField EditorRow EditorList EditorRows EditorSwitch FlexItem Stack InlineSelect InputGroup Space Please use them from grafana/experimental from now on. * Update to 9.2.1 Alerting: Improve notification policies created during migration. AzureAD: Add option to force fetch the groups from the Graph API. Docs: Note end of release notes publication. Inspect: Handle JSON tab crash when the provided object is too big to stringify. TablePanel: Footer now updates values on column filtering. Alerting: Fix email image embedding on Windows. Alerting: Fix mathexp.NoData for ConditionsCmd. Legacy Alerting: Fix duration calculation when testing a rule. Loki: Propagate additional headers from Grafana to Loki when querying data. Search: Sort alphabetically in the folder view, increase the limit of the folder search from 50 to 1000. TablePanel: Fix last table column to be centered. Grafana UI: Export prop types for queryfield, modal and field components. Toolkit: Fix `Cannot use import statement outside...` error in tests. * Update to 9.2.0 Alerting: Add Notification error feedback on contact points view. Alerting: Allow created by to be manually set when there's no creator for silences. Alerting: Expose info about notification delivery errors in a new /receivers endpoint. Alerting: Update imported prometheus alertmanager version. Alerting: Write and Delete multiple alert instances. Core: Implement aria attributes for query rows, improve a11y. DevEnv: Adds docker block for clickhouse. Docker: removes unneccesary use of edge repo. Explore: Revert split pane resize feature. Frontend: Make local storage items propagate to different tabs immediately. PublicDashboards: Allow disabling an existent public dashboard if it. QueryEditorRow: Only pass error to query editor if panel is not in a loading state. XYChart: Beta release. Alerting: Start ticker only when scheduler starts. Alerting: Fix pq: missing FROM- clause for table "a". AzureMonitor: Correctly update subscriptions value in ARG editor. Chore: Regenerate swagger specification and fix validation failures. Correlations: Only return correlation for which both source and target datasources exist. Explore: Prevent panes from disappearing when resizing window in split view. Links: Fix opening links from different orgs on the same tab. LogContext: Fix scroll position in upper context group. Logs: Show copy button independently from context. Loki/Prometheus: Fix adding of ad hoc filters when jumping from dashboard to explore. Loki: Add support for range aggregations with by grouping. Loki: Fix label-value escaping in context query. Loki: Fix redundant escaping in adhoc filter with regex match. PanelEdit: Fixes resize pane border and spacing issues. RBAC: Redirect to /login when forceLogin is set. Security: Fix CVE-2022-27664. StateTimeline: Fix tooltip showing erroneously in shared crosshair dashboards. Tempo: Fix unexpected trimming of leading zeroes in traceID. Tracing: Fix bug where errors are not reported to OpenTelemetry. * Update to 9.1.8 Alerting: Fix evaluation interval validation. Alerting: Fix migration to create rules with group index 1. Alerting: Fix migration to not add label "alertname". Azure Monitor: Fix empty Logs response for Alerting. Azure Monitor: Fix subscription selector when changing data sources. Google Cloud Monitoring: Fix bucket bound for distributions. * Update to 9.1.7 CloudWatch: Add missing AWS/Prometheus metrics. Explore: Add feature tracking events. Graphite: Add error information to graphite queries tracing. Prometheus: Restore FromAlert header. Search: Add search index configuration options. Thresholds: Add option for dashed line style. Alerting: Fix default query's data source when no default datasource specified. Alerting: Fix mathexp.NoData cannot be reduced. Alerting: Skip unsupported file types on provisioning. AzureMonitor: Ensure resourceURI template variable is migrated. Dashboard: Fix plugin dashboard save as button. Docs: Fix decimals: auto docs for panel edit. Fix: RBAC handle `error no resolver` found. LibraryPanelSearch: Refactor and fix hyphen issue. Live: Fix live streaming with `live-service-web-worker` feature flag enabled. QueryField: Fix wrong cursor position on autocomplete. * Update to 9.1.6 DataSource: Adding possibility to hide queries from the inspector. Inspect: Hide Actions tab when it is empty. PanelMenu: Remove hide legend action as it was showing on all panel types. Provisioning Contact points: Support disableResolveMessage via YAML. PublicDashboards: Support subpaths when generating pubdash url. Alerting: Fix legacy migration crash when rule name is too long. Alerting: Fix send resolved notifications. Azure Monitor: Fix migration issue with MetricDefinitionsQuery template variable query types. Browse: Hide dashboard actions if user does not have enough permission. ElasticSearch: Fix dispatching queries at a wrong time. Panel: Disable legends when showLegend is false prior to schema v37. Prometheus: Fix metadata requests for browser access mode. Search: Avoid requesting all dashboards when in Folder View. TablePanel/StatPanel: Fix values not being visible when background transparent. * Update to 9.1.5 Alerting: Sanitize invalid label/annotation names for external alertmanagers. Alerting: Telegram: Truncate long messages to avoid send error. DisplayProcessor: Handle reverse-ordered data when auto-showing millis. Heatmap: Add option to reverse color scheme. PluginLoader: Alias slate-react as @grafana/slate-react. Search: Add substring matcher, to bring back the old dashboard search behavior. Traces: More visible span colors. Alerting: Fix incorrect propagation of org ID and other fields in rule provisioning endpoints. Alerting: Resetting the notification policy tree to the default policy will also restore default contact points. AzureMonitor: Fix custom namespaces. AzureMonitor: Fix issue where custom metric namespaces are not included in the metric namespace list. CloudWatch: Fix display name of metric and namespace. Cloudwatch: Fix annotation query serialization issue. Dashboard: Fix issue where unsaved changes warning would appear even after save, and not being able to change library panels. Dashboard: Hide overflow content for single left pane. Loki: Fix a bug where adding adhoc filters was not possible. * Update to 9.1.4 GrafanaUI: Fixes Chrome issue for various query fields. * Update to 9.1.3 API: Do not expose user input in datasource error responses. Library Panel: Allow to delete them when deprecated. Plugins Catalog: Allow to filter plugins using special characters. Alerting: Fix UI bug when setting custom notification policy group by. AppRootPage: Fix issue navigating between two app plugin pages. Correlations: Use correct fallback handlers. RBAC: Fix deleting empty snapshots. LibraryElements: Fix inability to delete library panels under MySQL. Metrics: fix `grafana_database_conn_*` metrics, and add new `go_sql_stats_*` metrics as eventual replacement. TestData DB: Fix node graph not showing when the `Data type` field is set to `random`. * Deprecations The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use the `go_sql_stats_*` metrics instead. * Update to 9.1.2 AdHoc variable: Correctly preselect datasource when provisioning. AzureMonitor: Added ARG query function for template variables. Dashboards: Persist details message when navigating through dashboard save drawer's tabs. Dashboards: Correctly migrate mixed data source targets. Elasticsearch: Use millisecond intervals for alerting. Elasticsearch: Use millisecond intervals in frontend. Geomap: Local color range. Plugins Catalog: Use appSubUrl to generate plugins catalog urls. Rendering: Add support for renderer token. Alerting: Fix saving of screenshots uploaded with a signed url. AngularPanels: Fixing changing angular panel options not taking having affect when coming back from panel edit. Explore: Improve a11y of query row collapse button. Geomap: Fix tooltip display. QueryEditorRow: Filter data on mount. Search: Show all dashboards in the folder view. Tracing: Fix the event attributes in opentelemetry tracing. GrafanaUI: Fix styles for invalid selects & DataSourcePicker. * Update to 9.1.1 Cloud Monitoring: Support SLO burn rate. Schema: Restore "hidden" in LegendDisplayMode. Timeseries: Revert the timezone(s) property name change back to singular. Alerting: Fix links in Microsoft Teams notifications. Alerting: Fix notifications for Microsoft Teams. Alerting: Fix width of Adaptive Cards in Teams notifications. ColorPickerInput: Fix popover in disabled state. Decimals: Fixes auto decimals to behave the same for positive and negative values. Loki: Fix unique log row id generation. Plugins: Fix file extension in development authentication guide. TimeSeries: Fix jumping legend issue. TimeSeries: Fix memory leak on viz re-init caused by KeyboardPlugin. TimePicker: Fixes relative timerange of less than a day not displaying. GrafanaUI: Fixes ClipboardButton to always keep multi line content. * Update to 9.1.0 API: Allow creating teams with a user defined identifier. Alerting: Adds interval and For to alert rule details. Alerting: Extend PUT rule-group route to write the entire rule group rather than top-level fields only. Alerting: Use Adaptive Cards in Teams notifications. Azure Monitor: Add Network Insights Dashboard. Chore: Improve logging of unrecoverable errors. Correlations: Add UpdateCorrelation HTTP API. Dashboard: Reverted the changes of hiding multi-select and all variable in the datasource picker. Geomap: Add alpha day/night layer. Geomap: Add measuring tools. GrafanaUI: Add success state to ClipboardButton. Heatmap: Replace the heatmap panel with new implementation. KVStore: Allow empty value in kv_store. Prometheus: Promote Azure auth flag to configuration. Search: Display only dashboards in General folder of Search Folder View. Status history/State timeline: Support datalinks. Transform: Add a limit transform. Transformations: Add standard deviation and variance reducers. API: Fix snapshot responses. Access Control: Fix permission error during dashboard creation flow. Access Control: Set permissions for Grafana's test data source. Alerting: Fix migration failure. BarGauge: Show empty bar when value, minValue and maxValue are all equal. Dashboard: Fix color of bold and italics text in panel description tooltip. Loki: Fix passing of query with defaults to code mode. Loki: Fix producing correct log volume query for query with comments. Loki: Fix showing of unusable labels field in detected fields. Tracing: Fix OpenTelemetry Jaeger context propagation. Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled. Plugins: Only pass `rootUrls` field in request when not empty. Alert notifications to Microsoft Teams now use Adaptive Cards instead of Office 365 Connector Cards. Starting at 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL. The most notable changes are: Significantly improved rendering performance When calculating heatmaps, the buckets are now placed on reasonable borders (1m, 5m, 30s etc) Round cells are no longer supported * Update to 9.0.9 AuthNZ: Security fixes for CVE-2022-35957 and CVE-2022-36062. * Update to 9.0.8 Alerting: Hide "no rules" message when we are fetching from data sources. Alerting: AlertingProxy to elevate permissions for request forwarded to data proxy when RBAC enabled. * Update to 9.0.7 CloudMonitoring: Remove link setting for SLO queries. GrafanaUI: Render PageToolbar's leftItems regardless of title's presence. * Update to 9.0.6 Access Control: Allow org admins to invite new users to their organization. Grafana/toolkit: Fix incorrect image and font generation for plugin builds. Prometheus: Fix adding of multiple values for regex operator. UI/Card: Fix card items always having pointer cursor. * Update to 9.0.5 Access control: Show dashboard settings to users who can edit dashboard. Alerting: Allow the webhook notifier to support a custom Authorization header. Plugins: Add signature wildcard globbing for dedicated private plugin type. Prometheus: Don't show errors from unsuccessful API checks like rules or exemplar checks. Access control: Allow organisation admins to add existing users to org. Alerting: Fix alert panel instance- based rules filtering. Apps: Fixes navigation between different app plugin pages. Cloudwatch: Upgrade grafana-aws-sdk to fix auth issue with secret keys. Loki: Fix `show context` not working in some occasions. RBAC: Fix permissions on dashboards and folders created by anonymous users. * Update to 9.0.4 Browse/Search: Make browser back work properly when visiting Browse or search. Logs: Improve getLogRowContext API. Loki: Improve handling of empty responses. Plugins: Always validate root URL if specified in signature manfiest. Preferences: Get home dashboard from teams. SQLStore: Support Upserting multiple rows. Traces: Add more template variables in Tempo & Zipkin. Traces: Remove serviceMap feature flag. Access Control: Fix missing folder permissions. Access control: Fix org user removal for OSS users. Alerting: Fix Slack notifications. Alerting: Preserve new-lines from custom email templates in rendered email. Log: Fix text logging for unsupported types. Loki: Fix incorrect TopK value type in query builder. * Update to 9.0.3 Access Control: Allow dashboard admins to query org users. Alerting: Add method to provisioning API for obtaining a group and its rules. Alerting: Allow filtering of contact points by name. Alerting: Disable /api/admin/pause-all-alerts with Unified Alerting. Annotations: Use point marker for short time range annotations. AzureMonitor: Update UI to experimental package. AzureMonitor: Update resource and namespace metadata. CloudWatch: Remove simplejson in favor of 'encoding/json'. DashboardRow: Collapse shortcut prevent to move the collapsed rows. Navigation: Highlight active nav item when Grafana is served from subpath. Plugins: InfluxDB datasource - set epoch query param value as "ms". Plugins: InfluxDB update time range query. StateTimeline: Try to sort time field. API: Do not validate/save legacy alerts when saving a dashboard if legacy alerting is disabled. Alerting: Add method to reset notification policy tree back to the default. Alerting: Fix Teams notifier not failing on 200 response with error. Alerting: Fix bug where state did not change between Alerting and Error. Alerting: Fix consistency errors in OpenAPI documentation. Alerting: Fix normalization of alert states for panel Alerting: Provisioning API respects global rule quota. CSRF: Fix additional headers option. Chore: Bump parse-url to 6.0.2 to fix security vulnerabilities. Chore: Fix CVE-2020-7753. Chore: Fix CVE-2021-3807. Chore: Fix CVE-2021-3918. Chore: Fix CVE-2021-43138. Chore: Fix CVE-2022-0155. Dashboard: Fixes tooltip issue with TimePicker and Setting buttons. Dashboard: Prevent unnecessary scrollbar when viewing single panel. Logs: Fixed wrapping log lines from detected fields. Loki: Add missing operators in label filter expression. Loki: Fix error when changing operations with different parameters. Loki: Fix suggesting of correct operations in query builder. Plugins: InfluxDB variable interpolation fix for influxdbBackendMigration feature flag. SQLstore: Fix fetching an inexistent playlist. Security: Fixes for CVE-2022-31107 and CVE-2022-31097. Snapshots: Fix deleting external snapshots when using RBAC. Table: Fix scrollbar being hidden by pagination. Templating: Changing between variables with the same name now correctly triggers a dashboard refresh. Time series panel: Fix an issue with stacks being not complete due to the incorrect data frame length. * Update to 9.0.2 Alerting: Add support for images in Pushover alerts. Alerting: Don't stop the migration when alert rule tags are invalid. Alerting: Skip the default data source if incompatible. AzureMonitor: Parse non-fatal errors for Logs. OAuth: Restore debug log behavior. Plugins: Improved handling of symlinks. Alerting: Code-gen parsing of URL parameters and fix related bugs. Annotations: Fix annotation autocomplete causing panels to crash. Barchart: Fix warning not showing. CloudWatch: Enable custom session duration in AWS plugin auth. Dashboards: Fixes issue with the initial panel layout counting as an unsaved change. Plugins: Use a Grafana specific SDK logger implementation for core plugins. Search: Fix pagination in the new search page. * Update to 9.0.1 Alerting: Add support for image annotation in Alertmanager alerts. Alerting: Add support for images in SensuGo alerts. Alerting: Add support for images in Threema alerts. Alerting: Adds Mimir to Alertmanager data source implementation. Alerting: Invalid setting of enabled for unified alerting should return error. AzureMonitor: Clean namespace when changing the resource. AzureMonitor: Update supported namespaces and filter resources by the right type. CLI: Allow relative symlinks in zip archives when installing plugins. Dashboard: Don't show unsaved changes modal for automatic schema changes. Dashboard: Unsaved changes warning should not trigger when only pluginVersion has changed. Expression: Execute hidden expressions. Geomap: Support showing tooltip content on click (not just hover). Heatmap: Remove alpha flag from new heatmap panel. Instrumentation: Define handlers for requests that are not handled with named handlers. Log Panel: Improve log row hover contrast and visibility. Logs: Handle backend- mode errors in histogram. Loki: Do not show histogram for instant queries. Loki: Handle data source configs with path in the url. Loki: Handle invalid query type values. OAuth: Redirect to login if no oauth module is found or if module is not configured. OptionsUI: Move internal options editors out of @grafana/ui. Prometheus: Don't show undefined for step in collapsed options in query editor when value is "auto". Prometheus: Show query patterns in all editor modes for Prometheus and Loki. Tempo: Add link to Tempo Search with node service selected. Time Series Panel: Add Null Filling and "No Value" Support. TimeSeries: Add an option to set legend width. Timeseries: Improve cursor Y sync behavior. Traces: Do not use red in span colors as this looks like an error. Alerting: Fix AM config overwrite when SQLite db is locked during sync. Alerting: Fix alert instances filtering for prom rules. Alerting: Fix alert rule page crashing when datasource contained URL unsafe characters. Alerting: Fix automatically select newly created folder option. Alerting: Fix removal of notification policy without labels matchers. CloudWatch: Allow hidden queries to be executed in case an ID is provided. Dashboard: Prevent non-repeating panels being dropped from repeated rows when collapsed/expanded. Dashboards: Fix folder picker not showing correct results when typing too fast. Datasource: Prevent panic when proxying for non-existing data source. Explore: Fix log context scroll to bottom. Explore: Revert "Remove support for compact format URLs". Expressions: Fixes dashboard schema migration issue that casued Expression datasource to be set on panel level. Formatting: Fixes valueFormats for a value of 0. GrafanaData: Fix week start for non-English browsers. LibraryPanel: Resizing a library panel to 6x3 no longer crashes the dashboard on startup. LogRow: Fix placement of icon. Loki: Fix bug in labels framing. Loki: Fix issues with using query patterns. Loki: Fix showing of duplicated label values in dropdown in query builder. MSSQL: Fix ParseFloat error. Panels: Fixes issue with showing 'Cannot visualize data' when query returned 0 rows. Playlists: Disable Create Playlist buttons for users with viewer role. Plugins: Fix typo in plugin data frames documentation. Prometheus: Fix body not being included in resource calls if they are POST. RolePicker: Fix submenu position on horizontal space overflow. Tracing: Fix trace links in traces panel. Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when navigating to Explore using the deprecated format the URLs are automatically converted. If you have existing links pointing to Explore update them using the format generated by Explore upon navigation. You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as an array of strings, for example `&left=["now-1h","now"...]`. The standard explore URLs follow a key/value pattern, for example `&left={"datasource":"test"...}`. Please be sure to check your dashboards for any hardcoded links to Explore and update them to the standard URL pattern. * Update to 9.0.0 API: Add GET /api/annotations/:annotationId endpoint. API: Add endpoint for updating a data source by its UID. AccessControl: Add enterprise only setting for rbac permission cache. AccessControl: Document basic roles changes and provisioning V2. AccessControl: Enable RBAC by default. AddDataSourceConfig: Remove deprecated checkHealth prop. Alerting: Add Image URLs to Microsoft Teams notifier. Alerting: Add RBAC actions and role for provisioning API routes. Alerting: Add Screenshot URLs to Pagerduty Notifier. Alerting: Add a "Reason" to Alert Instances to show underlying cause of state. Alerting: Add a general screenshot service and alerting- specific image service. Alerting: Add image url or file attachment to email notifications. Alerting: Add image_urls to OpsGenie notification details. Alerting: Add notification policy flow chart. Alerting: Attach image URL to alerts in Webhook notifier format. Alerting: Attach image URLs or upload files to Discord Alerting: Attach image URLs to Google Chat notifications. Alerting: Attach screenshot data to Unified Alerting Alerting: Create folder for alerting when start from the scratch. Alerting: Modify alertmanager endpoints for proxying using the datasource UID. Alerting: Modify endpoint for testing a datasource rule using the UID. Alerting: Modify prometheus endpoints for proxying using the datasource UID. Alerting: State Manager takes screenshots. Alerting: Use UID scope for folders authorization. Alerting: modify ruler endpoints for proxying using the datasource UID. Angular: Adds back two angular directives that are still used by remaining angular bits and plugins. Azure Monitor: Add Resource Picker to Metrics Queries. Azure Monitor: Add search feature to resource picker. AzureMonitor: Add support for selecting multiple options when using the equals and not equals dimension filters. AzureMonitor: Remove deprecated code. Build: Change names to PascalCase to match. Chore: Remove deprecated DataSourceAPI methods. Chore: Upgrade typescript to 4.6.4. Cloud Monitoring: Use new annotation API. CloudMonitoring: Allow to set a custom value or disable graph_period. CloudWatch: Add generic filter component to variable editor. CloudWatch: Added missing AWS/AppRunner metrics. CloudWatch: Enable support for dynamic labels with migrated alias patterns. Cloudwatch: Pass label in deep link. Cloudwatch: Use new annotation API. Dashboard: Validate dashboards against schema on save. DashboardPickerByID: Add option to exclude dashboards. DashboardPickerById: Add optionLabel prop. Dashboards: Display values of 0 with the configured decimal places. Data: Remove deprecated types and functions from valueMappings. Elasticsearch: Remove browser access mode. Elasticsearch: Remove support for versions after their end of the life (<7.10.0). Encryption: Add support for multiple data keys per day. Encryption: Enable envelope encryption by default. Explore: Remove support for legacy, compact format URLs. Explore: Skip Angular error handling when Angular support is disabled. Explore: simplify support for multiple query editors. FeatureToggles: Support changing feature toggles with URL parameters. FileUpload: Make component accessible by keyboard navigation. Formatting: Make SI number formats more robust. Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels. IconButton: IconButtons are now correctly aligned in Safari. Logger: Enable new logging format by default. Loki: Add more query patterns. Loki: Enable new visual query builder by default. Loki: use the same dataframe-format for both live and normal queries. OAuth: Make allowed email domain case insensitive. Panels: Use the No value option when showing the no data message. Plugins: Remove plugin list panel. Query History: Enable new query history by default. QueryEditorRow: Show query errors next to query in a consistent way across Grafana. SAML: Implement Name Templates for assertion_attribute_name option. Service accounts: Do not display service accounts assigned to team. Settings: Use Grafana Azure SDK to pass Azure env vars for external plugins. Shortcuts: Add shortcut to show shortcuts to the list of shortcuts. Traces Panel: Add new Traces Panel visualization. Traces: Filter by service/span name and operation in Tempo and Jaeger. Transformations: Allow more complex regex expressions in `Rename by regex`. grafana/ui: Add default type="button" to