SUSE-SU-2022:1933-1: important: Security update for hdf5, suse-hpc

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Jun 3 13:16:06 UTC 2022


   SUSE Security Update: Security update for hdf5, suse-hpc
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:1933-1
Rating:             important
References:         #1058563 #1072087 #1072090 #1072108 #1072111 
                    #1080022 #1080259 #1080426 #1080442 #1082209 
                    #1084951 #1088547 #1091237 #1093641 #1093649 
                    #1093653 #1093655 #1093657 #1101471 #1101474 
                    #1101493 #1101495 #1102175 #1109166 #1109167 
                    #1109168 #1109564 #1109565 #1109566 #1109567 
                    #1109568 #1109569 #1109570 #1116458 #1124509 
                    #1133222 #1134298 #1167401 #1167404 #1167405 
                    #1169793 #1174439 #1179521 #1196682 SLE-7766 
                    SLE-7773 SLE-8501 SLE-8604 
Cross-References:   CVE-2017-17505 CVE-2017-17506 CVE-2017-17508
                    CVE-2017-17509 CVE-2018-11202 CVE-2018-11203
                    CVE-2018-11204 CVE-2018-11206 CVE-2018-11207
                    CVE-2018-13869 CVE-2018-13870 CVE-2018-14032
                    CVE-2018-14033 CVE-2018-14460 CVE-2018-17233
                    CVE-2018-17234 CVE-2018-17237 CVE-2018-17432
                    CVE-2018-17433 CVE-2018-17434 CVE-2018-17435
                    CVE-2018-17436 CVE-2018-17437 CVE-2018-17438
                    CVE-2020-10809 CVE-2020-10810 CVE-2020-10811
                   
CVSS scores:
                    CVE-2017-17505 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2017-17505 (SUSE): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2017-17506 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2017-17506 (SUSE): 4.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2017-17508 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2017-17508 (SUSE): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2017-17509 (NVD) : 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2017-17509 (SUSE): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
                    CVE-2018-11202 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-11202 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2018-11203 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-11203 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2018-11204 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-11204 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2018-11206 (NVD) : 8.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
                    CVE-2018-11206 (SUSE): 5.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
                    CVE-2018-11207 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-11207 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2018-13869 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2018-13869 (SUSE): 3.6 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
                    CVE-2018-13870 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2018-13870 (SUSE): 3.6 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2018-14032 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2018-14033 (NVD) : 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2018-14033 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
                    CVE-2018-14460 (NVD) : 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2018-14460 (SUSE): 3.6 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
                    CVE-2018-17233 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17233 (SUSE): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17234 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17234 (SUSE): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17237 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17237 (SUSE): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17432 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17432 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17433 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17433 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17434 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17434 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17435 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17435 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17436 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17436 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17437 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17437 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2018-17438 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2018-17438 (SUSE): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
                    CVE-2020-10809 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-10809 (SUSE): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
                    CVE-2020-10810 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-10810 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-10811 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-10811 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Module for HPC 12
______________________________________________________________________________

   An update that solves 27 vulnerabilities, contains four
   features and has 17 fixes is now available.

Description:

   This update for hdf5, suse-hpc fixes the following issues:

   Security issues fixed:

   - CVE-2020-10811: Fixed heap-based buffer over-read in the function
     H5O__layout_decode() located in H5Olayout.c (bsc#1167405).
   - CVE-2020-10810: Fixed NULL pointer dereference in the function
     H5AC_unpin_entry() located in H5AC.c (bsc#1167401).
   - CVE-2020-10809: Fixed heap-based buffer overflow in the function
     Decompress() located in decompress.c (bsc#1167404).
   - CVE-2018-17438: Fixed SIGFPE signal raise in the function
     H5D__select_io() of H5Dselect.c (bsc#1109570).
   - CVE-2018-17437: Fixed memory leak in the H5O_dtype_decode_helper()
     function in H5Odtype.c. (bsc#1109569).
   - CVE-2018-17436: Fixed issue in ReadCode() in decompress.c that allowed
     attackers to cause a denial of service via a crafted HDF5 file
     (bsc#1109568).
   - CVE-2018-17435: Fixed heap-based buffer over-read in H5O_attr_decode()
     in H5Oattr.c (bsc#1109567).
   - CVE-2018-17434: Fixed SIGFPE signal raise in function apply_filters() of
     h5repack_filters.c (bsc#1109566).
   - CVE-2018-17433: Fixed heap-based buffer overflow in ReadGifImageDesc()
     in gifread.c (bsc#1109565).
   - CVE-2018-17432: Fixed NULL pointer dereference in H5O_sdspace_encode()
     in H5Osdspace.c (bsc#1109564).
   - CVE-2018-17237: Fixed SIGFPE signal raise in the function
     H5D__chunk_set_info_real() (bsc#1109168).
   - CVE-2018-17234: Fixed memory leak in the H5O__chunk_deserialize()
     function in H5Ocache.c (bsc#1109167).
   - CVE-2018-17233: Fixed SIGFPE signal is raise in the function
     H5D__create_chunk_file_map_hyper (bsc#1109166).
   - CVE-2018-14460: Fixed heap-based buffer over-read in the function
     H5O_sdspace_decode in H5Osdspace.c (bsc#1102175).
   - CVE-2018-14033: Fixed heap-based buffer over-read in the function
     H5O_layout_decode in H5Olayout.c (bsc#1101471).
   - CVE-2018-14032: Fixed heap-based buffer over-read in the function
     H5O_fill_new_decode in H5Ofill.c (bsc#1101474).
   - CVE-2018-13870: Fixed heap-based buffer over-read in the function
     H5O_link_decode in H5Olink.c (bsc#1101493).
   - CVE-2018-13869: Fixed memcpy parameter overlap in the function
     H5O_link_decode in H5Olink.c (bsc#1101495).
   - CVE-2018-11207: Fixed division by zero was discovered in H5D__chunk_init
     in H5Dchunk.c (bsc#1093653).
   - CVE-2018-11206: Fixed out of bounds read in H5O_fill_new_decode and
     H5O_fill_old_decode in H5Ofill.c (bsc#1093657).
   - CVE-2018-11204: Fixed NULL pointer dereference in H5O__chunk_deserialize
     in H5Ocache.c (bsc#1093655).
   - CVE-2018-11203: Fixed division by zero in H5D__btree_decode_key in
     H5Dbtree.c (bsc#1093649).
   - CVE-2018-11202: Fixed NULL pointer dereference in H5S_hyper_make_spans
     in H5Shyper.c (bsc#1093641).
   - CVE-2017-17509: Fixed out of bounds write vulnerability in function
     H5G__ent_decode_vec (bsc#1072111).
   - CVE-2017-17508: Fixed divide-by-zero vulnerability in function
     H5T_set_loc (bsc#1072108).
   - CVE-2017-17506: Fixed out of bounds read in the function
     H5Opline_pline_decode (bsc#1072090).
   - CVE-2017-17505: Fixed NULL pointer dereference in the function
     H5O_pline_decode (bsc#1072087).

   Bugfixes:

   - Expand modules handling (bsc#1116458).
   - Fix default moduleversion link generation and deletion (bsc#1124509).
   - Set higher constraints for succesfull mpich tests (bsc#1133222).
   - Only build one examples package for all flavors, do not include
     dependencies as these would be flavor specific (bsc#1088547).
   - Prepend PKG_CONFIG_PATH in modules file (bsc#1080426).
   - Validate Python 3 code (bsc#1082209).
   - Fix library link flags on pkg-config file for HPC builds (bsc#1134298).
   - Fix .so number in baselibs.conf for libhdf5_fortran libs (bsc#1169793).
   - Fix python-h5py packages built against out-of-date version of HDF5
     (bsc#1196682).
   - Fix netcdf-cxx4 packages built against out-of-date version of HDF5
     (bsc#1179521).
   - Make module files package arch dependent: it contains arch-dependent
     paths (bsc#1080442).
   - Disable %check stage for mpich builds on s390(x) (bsc#1080022).
   - Add build support for gcc10 to HPC build (bsc#1174439).
   - Fix summary in module files (bsc#1080259).
   - Append a newline to the shebang line prepended by the
     %hpc_shebang_prepend_list macro (bsc#1084951).
   - Temporarily disable make check for PowerPC (bsc#1058563).
   - Fix HPC library master packages dependency: make it require the correct
     flavor (bsc#1091237).
   - Add HPC support for gcc8 and gcc9 (jsc#SLE-7766 & jsc#SLE-8604).
   - Enable openmpi3 builds for Leap and SLE > 15.1 (jsc#SLE-7773).
   - HDF5 version Update to 1.10.5 (jsc#SLE-8501).
   - Add support for openmpi2 for HPC (FATE#325089).
   - Initial version (FATE#320596).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for HPC 12:

      zypper in -t patch SUSE-SLE-Module-HPC-12-2022-1933=1



Package List:

   - SUSE Linux Enterprise Module for HPC 12 (aarch64 x86_64):

      hdf5_1_10_8-gnu-hpc-1.10.8-3.12.2
      hdf5_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      hdf5_1_10_8-gnu-hpc-debugsource-1.10.8-3.12.2
      hdf5_1_10_8-gnu-hpc-devel-1.10.8-3.12.2
      hdf5_1_10_8-gnu-hpc-devel-static-1.10.8-3.12.2
      hdf5_1_10_8-gnu-hpc-module-1.10.8-3.12.2
      hdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-3.12.2
      hdf5_1_10_8-gnu-mvapich2-hpc-debuginfo-1.10.8-3.12.2
      hdf5_1_10_8-gnu-mvapich2-hpc-debugsource-1.10.8-3.12.2
      hdf5_1_10_8-gnu-mvapich2-hpc-devel-1.10.8-3.12.2
      hdf5_1_10_8-gnu-mvapich2-hpc-devel-static-1.10.8-3.12.2
      hdf5_1_10_8-gnu-mvapich2-hpc-module-1.10.8-3.12.2
      hdf5_1_10_8-gnu-openmpi1-hpc-1.10.8-3.12.2
      hdf5_1_10_8-gnu-openmpi1-hpc-debuginfo-1.10.8-3.12.2
      hdf5_1_10_8-gnu-openmpi1-hpc-debugsource-1.10.8-3.12.2
      hdf5_1_10_8-gnu-openmpi1-hpc-devel-1.10.8-3.12.2
      hdf5_1_10_8-gnu-openmpi1-hpc-devel-static-1.10.8-3.12.2
      hdf5_1_10_8-gnu-openmpi1-hpc-module-1.10.8-3.12.2
      libhdf5-gnu-hpc-1.10.8-3.12.2
      libhdf5-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5_1_10_8-gnu-hpc-1.10.8-3.12.2
      libhdf5_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_1_10_8-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5_1_10_8-gnu-mvapich2-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_1_10_8-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5_1_10_8-gnu-openmpi1-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_cpp-gnu-hpc-1.10.8-3.12.2
      libhdf5_cpp_1_10_8-gnu-hpc-1.10.8-3.12.2
      libhdf5_cpp_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_fortran-gnu-hpc-1.10.8-3.12.2
      libhdf5_fortran-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5_fortran-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5_fortran_1_10_8-gnu-hpc-1.10.8-3.12.2
      libhdf5_fortran_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_fortran_1_10_8-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5_fortran_1_10_8-gnu-mvapich2-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_fortran_1_10_8-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5_fortran_1_10_8-gnu-openmpi1-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_hl-gnu-hpc-1.10.8-3.12.2
      libhdf5_hl-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5_hl-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5_hl_1_10_8-gnu-hpc-1.10.8-3.12.2
      libhdf5_hl_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_hl_1_10_8-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5_hl_1_10_8-gnu-mvapich2-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_hl_1_10_8-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5_hl_1_10_8-gnu-openmpi1-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_hl_cpp-gnu-hpc-1.10.8-3.12.2
      libhdf5_hl_cpp_1_10_8-gnu-hpc-1.10.8-3.12.2
      libhdf5_hl_cpp_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      libhdf5_hl_fortran-gnu-hpc-1.10.8-3.12.2
      libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5_hl_fortran-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5hl_fortran_1_10_8-gnu-hpc-1.10.8-3.12.2
      libhdf5hl_fortran_1_10_8-gnu-hpc-debuginfo-1.10.8-3.12.2
      libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc-1.10.8-3.12.2
      libhdf5hl_fortran_1_10_8-gnu-mvapich2-hpc-debuginfo-1.10.8-3.12.2
      libhdf5hl_fortran_1_10_8-gnu-openmpi1-hpc-1.10.8-3.12.2
      libhdf5hl_fortran_1_10_8-gnu-openmpi1-hpc-debuginfo-1.10.8-3.12.2
      suse-hpc-0.5.20220206.0c6b168-5.2

   - SUSE Linux Enterprise Module for HPC 12 (noarch):

      hdf5-gnu-hpc-devel-1.10.8-3.12.2
      hdf5-gnu-mvapich2-hpc-devel-1.10.8-3.12.2
      hdf5-gnu-openmpi1-hpc-devel-1.10.8-3.12.2


References:

   https://www.suse.com/security/cve/CVE-2017-17505.html
   https://www.suse.com/security/cve/CVE-2017-17506.html
   https://www.suse.com/security/cve/CVE-2017-17508.html
   https://www.suse.com/security/cve/CVE-2017-17509.html
   https://www.suse.com/security/cve/CVE-2018-11202.html
   https://www.suse.com/security/cve/CVE-2018-11203.html
   https://www.suse.com/security/cve/CVE-2018-11204.html
   https://www.suse.com/security/cve/CVE-2018-11206.html
   https://www.suse.com/security/cve/CVE-2018-11207.html
   https://www.suse.com/security/cve/CVE-2018-13869.html
   https://www.suse.com/security/cve/CVE-2018-13870.html
   https://www.suse.com/security/cve/CVE-2018-14032.html
   https://www.suse.com/security/cve/CVE-2018-14033.html
   https://www.suse.com/security/cve/CVE-2018-14460.html
   https://www.suse.com/security/cve/CVE-2018-17233.html
   https://www.suse.com/security/cve/CVE-2018-17234.html
   https://www.suse.com/security/cve/CVE-2018-17237.html
   https://www.suse.com/security/cve/CVE-2018-17432.html
   https://www.suse.com/security/cve/CVE-2018-17433.html
   https://www.suse.com/security/cve/CVE-2018-17434.html
   https://www.suse.com/security/cve/CVE-2018-17435.html
   https://www.suse.com/security/cve/CVE-2018-17436.html
   https://www.suse.com/security/cve/CVE-2018-17437.html
   https://www.suse.com/security/cve/CVE-2018-17438.html
   https://www.suse.com/security/cve/CVE-2020-10809.html
   https://www.suse.com/security/cve/CVE-2020-10810.html
   https://www.suse.com/security/cve/CVE-2020-10811.html
   https://bugzilla.suse.com/1058563
   https://bugzilla.suse.com/1072087
   https://bugzilla.suse.com/1072090
   https://bugzilla.suse.com/1072108
   https://bugzilla.suse.com/1072111
   https://bugzilla.suse.com/1080022
   https://bugzilla.suse.com/1080259
   https://bugzilla.suse.com/1080426
   https://bugzilla.suse.com/1080442
   https://bugzilla.suse.com/1082209
   https://bugzilla.suse.com/1084951
   https://bugzilla.suse.com/1088547
   https://bugzilla.suse.com/1091237
   https://bugzilla.suse.com/1093641
   https://bugzilla.suse.com/1093649
   https://bugzilla.suse.com/1093653
   https://bugzilla.suse.com/1093655
   https://bugzilla.suse.com/1093657
   https://bugzilla.suse.com/1101471
   https://bugzilla.suse.com/1101474
   https://bugzilla.suse.com/1101493
   https://bugzilla.suse.com/1101495
   https://bugzilla.suse.com/1102175
   https://bugzilla.suse.com/1109166
   https://bugzilla.suse.com/1109167
   https://bugzilla.suse.com/1109168
   https://bugzilla.suse.com/1109564
   https://bugzilla.suse.com/1109565
   https://bugzilla.suse.com/1109566
   https://bugzilla.suse.com/1109567
   https://bugzilla.suse.com/1109568
   https://bugzilla.suse.com/1109569
   https://bugzilla.suse.com/1109570
   https://bugzilla.suse.com/1116458
   https://bugzilla.suse.com/1124509
   https://bugzilla.suse.com/1133222
   https://bugzilla.suse.com/1134298
   https://bugzilla.suse.com/1167401
   https://bugzilla.suse.com/1167404
   https://bugzilla.suse.com/1167405
   https://bugzilla.suse.com/1169793
   https://bugzilla.suse.com/1174439
   https://bugzilla.suse.com/1179521
   https://bugzilla.suse.com/1196682



More information about the sle-security-updates mailing list