From null at suse.de Thu Feb 1 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 08:30:02 -0000 Subject: SUSE-SU-2024:0295-1: important: Security update for runc Message-ID: <170677620291.24409.4553729919807866967@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2024:0295-1 Rating: important References: * bsc#1218894 Cross-References: * CVE-2024-21626 CVSS scores: * CVE-2024-21626 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP4 * Containers Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.1.11: * CVE-2024-21626: Fixed container breakout. (bsc#1218894) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-295=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-295=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-295=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-295=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-295=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-295=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-295=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-295=1 * Containers Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2024-295=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-295=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-295=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-295=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-295=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-295=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-295=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-295=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-295=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-295=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-295=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-295=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-295=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-295=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-295=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-295=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-295=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-295=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-295=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * Containers Module 15-SP4 (aarch64 ppc64le s390x) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE CaaS Platform 4.0 (x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * runc-debuginfo-1.1.11-150000.58.1 * runc-1.1.11-150000.58.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21626.html * https://bugzilla.suse.com/show_bug.cgi?id=1218894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 08:30:05 -0000 Subject: SUSE-SU-2024:0294-1: important: Security update for runc Message-ID: <170677620531.24409.10318678796835941497@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2024:0294-1 Rating: important References: * bsc#1218894 Cross-References: * CVE-2024-21626 CVSS scores: * CVE-2024-21626 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.1.11: * CVE-2024-21626: Fixed container breakout. (bsc#1218894) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 12 zypper in -t patch SUSE-SLE-Module-Containers-12-2024-294=1 ## Package List: * Containers Module 12 (ppc64le s390x x86_64) * runc-1.1.11-16.43.1 * runc-debuginfo-1.1.11-16.43.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21626.html * https://bugzilla.suse.com/show_bug.cgi?id=1218894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From meissner at suse.de Thu Feb 1 08:55:37 2024 From: meissner at suse.de (Marcus Meissner) Date: Thu, 1 Feb 2024 09:55:37 +0100 Subject: Announcement: Container updates moved to seperate list sle-container-updates Message-ID: <20240201085522.GA26204@suse.de> Hi folks, As the amount of container update e-mails has increased due to the increasing amount of containers shipped by SUSE, we have moved these announcements to a seperate list to reduce noise. https://lists.suse.com/mailman/listinfo/sle-container-updates Ciao, Marcus -- Marcus Meissner (he/him), Distinguished Engineer / Senior Project Manager Security SUSE Software Solutions Germany GmbH, Frankenstrasse 146, 90461 Nuernberg, Germany GF: Ivo Totev, Andrew McDonald, Werner Knoblich, HRB 36809, AG Nuernberg From null at suse.de Thu Feb 1 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 12:30:04 -0000 Subject: SUSE-RU-2024:0297-1: moderate: Recommended update for transactional-update Message-ID: <170679060473.30672.14871498797441160111@smelt2.prg2.suse.org> # Recommended update for transactional-update Announcement ID: SUSE-RU-2024:0297-1 Rating: moderate References: * bsc#1215878 Affected Products: * SUSE Linux Enterprise Micro 5.5 An update that has one fix can now be installed. ## Description: This update for transactional-update fixes the following issue: * Version 4.1.6 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-297=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (noarch) * transactional-update-zypp-config-4.1.6-150500.3.3.1 * dracut-transactional-update-4.1.6-150500.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tukit-debuginfo-4.1.6-150500.3.3.1 * transactional-update-4.1.6-150500.3.3.1 * tukitd-debuginfo-4.1.6-150500.3.3.1 * tukit-4.1.6-150500.3.3.1 * libtukit4-4.1.6-150500.3.3.1 * transactional-update-debuginfo-4.1.6-150500.3.3.1 * tukitd-4.1.6-150500.3.3.1 * transactional-update-debugsource-4.1.6-150500.3.3.1 * libtukit4-debuginfo-4.1.6-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 12:30:06 -0000 Subject: SUSE-SU-2024:0296-1: important: Security update for squid Message-ID: <170679060618.30672.4140521250697486720@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2024:0296-1 Rating: important References: * bsc#1217654 * bsc#1219131 Cross-References: * CVE-2023-50269 * CVE-2024-23638 CVSS scores: * CVE-2023-50269 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50269 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23638 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23638 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2023-50269: fixed X-Forwarded-For Stack Overflow. (bsc#1217654) * CVE-2024-23638: fixed Denial of Service attack against Cache Manager error responses. (bsc#1219131) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-296=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-296=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-296=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * squid-debuginfo-4.17-4.41.1 * squid-4.17-4.41.1 * squid-debugsource-4.17-4.41.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-4.17-4.41.1 * squid-4.17-4.41.1 * squid-debugsource-4.17-4.41.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * squid-debuginfo-4.17-4.41.1 * squid-4.17-4.41.1 * squid-debugsource-4.17-4.41.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50269.html * https://www.suse.com/security/cve/CVE-2024-23638.html * https://bugzilla.suse.com/show_bug.cgi?id=1217654 * https://bugzilla.suse.com/show_bug.cgi?id=1219131 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:01 -0000 Subject: SUSE-RU-2024:0304-1: moderate: Recommended update for sles15-image Message-ID: <170680500191.15318.13493300287064771655@smelt2.prg2.suse.org> # Recommended update for sles15-image Announcement ID: SUSE-RU-2024:0304-1 Rating: moderate References: * jsc#OBS-291 Affected Products: * openSUSE Leap 15.5 An update that contains one feature can now be installed. ## Description: This update for sles15-image fixes the following issues: * add artifacthub.io markers and introduction README.md (jsc#OBS-291) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-304=1 ## Package List: * openSUSE Leap 15.5 (noarch) * container:sles15-image-15.0.0-36.6.1 ## References: * https://jira.suse.com/browse/OBS-291 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:05 -0000 Subject: SUSE-RU-2024:0303-1: moderate: Recommended update for gcc7 Message-ID: <170680500543.15318.10824459083281366101@smelt2.prg2.suse.org> # Recommended update for gcc7 Announcement ID: SUSE-RU-2024:0303-1 Rating: moderate References: * bsc#1216488 * jsc#PED-5014 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for gcc7 fixes the following issues: * Avoid crash when hitting a broken pattern in the s390 backend. * Avoid creating recursive DIE references through DW_AT_abstract_origin when using LTO. [bsc#1216488] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-303=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-303=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-303=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-303=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-303=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-303=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-303=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-303=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-303=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-303=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-303=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-303=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-303=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-303=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-303=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-303=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-303=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-303=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Manager Proxy 4.3 (x86_64) * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Manager Server 4.3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Enterprise Storage 7.1 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Enterprise Storage 7.1 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libgomp1-gcc7-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-i386-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libgomp1-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-ppc64-gcc7-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-rx-gcc7-bootstrap-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * cross-i386-gcc7-7.5.0+r278197-150000.4.38.1 * cross-arm-none-gcc7-bootstrap-7.5.0+r278197-150000.4.38.1 * cross-arm-gcc7-7.5.0+r278197-150000.4.38.1 * cross-arm-none-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.38.1 * cross-arm-none-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-m68k-gcc7-7.5.0+r278197-150000.4.38.1 * cross-ppc64-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * cross-arm-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-7.5.0+r278197-150000.4.38.1 * cross-mips-gcc7-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libobjc4-gcc7-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-go-7.5.0+r278197-150000.4.38.1 * cross-arm-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * cross-epiphany-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * libgcc_s1-gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * libstdc++6-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-avr-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-sparc64-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-avr-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.38.1 * libatomic1-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgcc_s1-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-mips-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-go-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-epiphany-gcc7-bootstrap-7.5.0+r278197-150000.4.38.1 * cross-epiphany-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.38.1 * libgo11-7.5.0+r278197-150000.4.38.1 * cross-hppa-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * cross-hppa-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * cross-sparc-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * cross-rx-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.38.1 * cross-avr-gcc7-bootstrap-7.5.0+r278197-150000.4.38.1 * cross-m68k-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * cross-hppa-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-sparc64-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * libitm1-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-m68k-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-m68k-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-mips-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-ppc64-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-i386-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * libitm1-gcc7-7.5.0+r278197-150000.4.38.1 * cross-sparc64-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * cross-ppc64-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libobjc4-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-obj-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-sparc64-gcc7-7.5.0+r278197-150000.4.38.1 * libstdc++6-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-rx-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-gcc7-locale-7.5.0+r278197-150000.4.38.1 * cross-sparcv9-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-sparc-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * cross-sparc-gcc7-7.5.0+r278197-150000.4.38.1 * cross-i386-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * libgo11-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-hppa-gcc7-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * gcc7-obj-c++-7.5.0+r278197-150000.4.38.1 * libatomic1-gcc7-7.5.0+r278197-150000.4.38.1 * cross-mips-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * cross-aarch64-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * cross-aarch64-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-aarch64-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * cross-aarch64-gcc7-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * libmpxwrappers2-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libmpxwrappers2-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libmpx2-gcc7-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libquadmath0-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libquadmath0-gcc7-7.5.0+r278197-150000.4.38.1 * libquadmath0-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libquadmath0-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libmpx2-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libmpxwrappers2-gcc7-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libmpx2-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libmpx2-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * libmpxwrappers2-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64) * cross-ppc64le-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * cross-ppc64le-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-ppc64le-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * cross-ppc64le-gcc7-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * cross-s390x-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * liblsan0-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libtsan0-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-s390x-gcc7-7.5.0+r278197-150000.4.38.1 * cross-s390x-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * cross-s390x-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libtsan0-gcc7-7.5.0+r278197-150000.4.38.1 * liblsan0-gcc7-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (s390x x86_64) * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-go-32bit-7.5.0+r278197-150000.4.38.1 * libgomp1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * libobjc4-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libobjc4-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libgcc_s1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libgcc_s1-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libada7-32bit-7.5.0+r278197-150000.4.38.1 * libstdc++6-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libgo11-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libitm1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libitm1-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-obj-c++-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-ada-32bit-7.5.0+r278197-150000.4.38.1 * libatomic1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libgomp1-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libatomic1-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libstdc++6-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libgo11-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-32bit-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x) * cross-x86_64-gcc7-icecream-backend-7.5.0+r278197-150000.4.38.1 * cross-x86_64-gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * cross-x86_64-gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * cross-x86_64-gcc7-7.5.0+r278197-150000.4.38.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * Basesystem Module 15-SP5 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * Development Tools Module 15-SP5 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * Development Tools Module 15-SP5 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libasan4-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.38.1 * libgfortran4-7.5.0+r278197-150000.4.38.1 * gcc7-ada-7.5.0+r278197-150000.4.38.1 * libada7-debuginfo-7.5.0+r278197-150000.4.38.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-7.5.0+r278197-150000.4.38.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.38.1 * cpp7-7.5.0+r278197-150000.4.38.1 * libubsan0-7.5.0+r278197-150000.4.38.1 * gcc7-debugsource-7.5.0+r278197-150000.4.38.1 * gcc7-locale-7.5.0+r278197-150000.4.38.1 * gcc7-objc-7.5.0+r278197-150000.4.38.1 * gcc7-7.5.0+r278197-150000.4.38.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.38.1 * libada7-7.5.0+r278197-150000.4.38.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.38.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.38.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libcilkrts5-7.5.0+r278197-150000.4.38.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-7.5.0+r278197-150000.4.38.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * gcc7-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libubsan0-32bit-7.5.0+r278197-150000.4.38.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.38.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.38.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.38.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.38.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.38.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216488 * https://jira.suse.com/browse/PED-5014 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:10 -0000 Subject: SUSE-RU-2024:0302-1: critical: Recommended update for regionServiceClientConfigEC2 Message-ID: <170680501014.15318.11159662148384045305@smelt2.prg2.suse.org> # Recommended update for regionServiceClientConfigEC2 Announcement ID: SUSE-RU-2024:0302-1 Rating: critical References: * bsc#1199668 * bsc#1203215 * bsc#1217536 * bsc#1218656 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has four fixes can now be installed. ## Description: This update for regionServiceClientConfigEC2 contains the following fixes: * Add patch to not serve IPv6 addresses on SLES12. (bsc#1218656) * Update to version 4.1.1 (bsc#1217536) * Replace 54.247.166.75.pem and 54.253.118.149.pem old soon to expired certs with new generated ones that expire in 8 years and have longer length (4096) * Update to version 4.1.0 (bsc#1203215) * New certs for 52.79.82.165 and 54.247.166.75 * Update to version 4.0.0 (bsc#1199668) * Move cert location to usr form var to accomodate ro filesystem of SLE-Micro * Fix source location in spec file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-302=1 ## Package List: * Public Cloud Module 12 (noarch) * regionServiceClientConfigEC2-4.1.1-4.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199668 * https://bugzilla.suse.com/show_bug.cgi?id=1203215 * https://bugzilla.suse.com/show_bug.cgi?id=1217536 * https://bugzilla.suse.com/show_bug.cgi?id=1218656 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:11 -0000 Subject: SUSE-SU-2024:0301-1: important: Security update for webkit2gtk3 Message-ID: <170680501157.15318.14853150318357472610@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0301-1 Rating: important References: * bsc#1219113 Cross-References: * CVE-2024-23222 CVSS scores: * CVE-2024-23222 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2024-23222: Fixed type confusion that may lead to arbitrary code execution. (bsc#1219113) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-301=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-301=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-301=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-301=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-301=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-301=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-301=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-devel-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-2.42.4-150200.100.1 * typelib-1_0-JavaScriptCore-4_0-2.42.4-150200.100.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.4-150200.100.1 * webkit2gtk3-debugsource-2.42.4-150200.100.1 * typelib-1_0-WebKit2-4_0-2.42.4-150200.100.1 * libjavascriptcoregtk-4_0-18-2.42.4-150200.100.1 * libwebkit2gtk-4_0-37-2.42.4-150200.100.1 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.42.4-150200.100.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23222.html * https://bugzilla.suse.com/show_bug.cgi?id=1219113 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:14 -0000 Subject: SUSE-SU-2024:0300-1: important: Security update for xerces-c Message-ID: <170680501403.15318.4530802301706526328@smelt2.prg2.suse.org> # Security update for xerces-c Announcement ID: SUSE-SU-2024:0300-1 Rating: important References: * bsc#1159552 Cross-References: * CVE-2018-1311 CVSS scores: * CVE-2018-1311 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-1311 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for xerces-c fixes the following issues: * CVE-2018-1311: fixed use-after-free triggered during the scanning of external DTDs potentially leading to DOS. (bsc#1159552) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-300=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-300=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-300=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-300=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-300=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-300=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-300=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * xerces-c-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-devel-3.1.4-150200.10.11.1 * xerces-c-debugsource-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libxerces-c-3_1-32bit-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-32bit-3.1.4-150200.10.11.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * xerces-c-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-devel-3.1.4-150200.10.11.1 * xerces-c-debugsource-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libxerces-c-3_1-32bit-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-32bit-3.1.4-150200.10.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * xerces-c-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-devel-3.1.4-150200.10.11.1 * xerces-c-debugsource-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libxerces-c-3_1-32bit-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-32bit-3.1.4-150200.10.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libxerces-c-3_1-3.1.4-150200.10.11.1 * libxerces-c-3_1-debuginfo-3.1.4-150200.10.11.1 * SUSE Enterprise Storage 7.1 (x86_64) * libxerces-c-3_1-32bit-debuginfo-3.1.4-150200.10.11.1 * libxerces-c-3_1-32bit-3.1.4-150200.10.11.1 ## References: * https://www.suse.com/security/cve/CVE-2018-1311.html * https://bugzilla.suse.com/show_bug.cgi?id=1159552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:15 -0000 Subject: SUSE-SU-2024:0299-1: important: Security update for xerces-c Message-ID: <170680501595.15318.11460310818687659346@smelt2.prg2.suse.org> # Security update for xerces-c Announcement ID: SUSE-SU-2024:0299-1 Rating: important References: * bsc#1159552 Cross-References: * CVE-2018-1311 CVSS scores: * CVE-2018-1311 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-1311 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for xerces-c fixes the following issues: * CVE-2018-1311: fixed use-after-free triggered during the scanning of external DTDs potentially leading to DOS. (bsc#1159552) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-299=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-299=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-299=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-299=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * xerces-c-debugsource-3.1.1-13.12.1 * libxerces-c-devel-3.1.1-13.12.1 * xerces-c-debuginfo-3.1.1-13.12.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * xerces-c-debugsource-3.1.1-13.12.1 * libxerces-c-3_1-debuginfo-3.1.1-13.12.1 * xerces-c-debuginfo-3.1.1-13.12.1 * libxerces-c-3_1-3.1.1-13.12.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libxerces-c-3_1-debuginfo-32bit-3.1.1-13.12.1 * libxerces-c-3_1-32bit-3.1.1-13.12.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * xerces-c-debugsource-3.1.1-13.12.1 * libxerces-c-3_1-debuginfo-3.1.1-13.12.1 * xerces-c-debuginfo-3.1.1-13.12.1 * libxerces-c-3_1-3.1.1-13.12.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libxerces-c-3_1-debuginfo-32bit-3.1.1-13.12.1 * libxerces-c-3_1-32bit-3.1.1-13.12.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * xerces-c-debugsource-3.1.1-13.12.1 * libxerces-c-3_1-debuginfo-3.1.1-13.12.1 * xerces-c-debuginfo-3.1.1-13.12.1 * libxerces-c-3_1-3.1.1-13.12.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libxerces-c-3_1-debuginfo-32bit-3.1.1-13.12.1 * libxerces-c-3_1-32bit-3.1.1-13.12.1 ## References: * https://www.suse.com/security/cve/CVE-2018-1311.html * https://bugzilla.suse.com/show_bug.cgi?id=1159552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 16:30:17 -0000 Subject: SUSE-SU-2024:0298-1: important: Security update for squid Message-ID: <170680501770.15318.12130751135542630594@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2024:0298-1 Rating: important References: * bsc#1217654 * bsc#1219131 Cross-References: * CVE-2023-50269 * CVE-2024-23638 CVSS scores: * CVE-2023-50269 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50269 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23638 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23638 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2023-50269: fixed X-Forwarded-For Stack Overflow. (bsc#1217654) * CVE-2024-23638: fixed Denial of Service attack against Cache Manager error responses. (bsc#1219131) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-298=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-298=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-298=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-298=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-298=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-298=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-298=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * squid-4.17-150000.5.49.1 * squid-debuginfo-4.17-150000.5.49.1 * squid-debugsource-4.17-150000.5.49.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50269.html * https://www.suse.com/security/cve/CVE-2024-23638.html * https://bugzilla.suse.com/show_bug.cgi?id=1217654 * https://bugzilla.suse.com/show_bug.cgi?id=1219131 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0307-1: important: Security update for gstreamer Message-ID: <170681940331.4479.12411796507115368424@smelt2.prg2.suse.org> # Security update for gstreamer Announcement ID: SUSE-SU-2024:0307-1 Rating: important References: * bsc#1215796 Cross-References: * CVE-2023-40474 CVSS scores: * CVE-2023-40474 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gstreamer fixes the following issues: * CVE-2023-40474: Fixed an integer overflow during MXF file parsing (bsc#1215796). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-307=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-307=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-307=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-307=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * gstreamer-devel-1.8.3-10.9.1 * gstreamer-debugsource-1.8.3-10.9.1 * gstreamer-debuginfo-1.8.3-10.9.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * gstreamer-1.8.3-10.9.1 * gstreamer-utils-1.8.3-10.9.1 * libgstreamer-1_0-0-1.8.3-10.9.1 * gstreamer-debuginfo-1.8.3-10.9.1 * gstreamer-utils-debuginfo-1.8.3-10.9.1 * typelib-1_0-Gst-1_0-1.8.3-10.9.1 * libgstreamer-1_0-0-debuginfo-1.8.3-10.9.1 * gstreamer-debugsource-1.8.3-10.9.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * gstreamer-lang-1.8.3-10.9.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libgstreamer-1_0-0-debuginfo-32bit-1.8.3-10.9.1 * gstreamer-debuginfo-32bit-1.8.3-10.9.1 * libgstreamer-1_0-0-32bit-1.8.3-10.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * gstreamer-1.8.3-10.9.1 * gstreamer-utils-1.8.3-10.9.1 * libgstreamer-1_0-0-1.8.3-10.9.1 * gstreamer-debuginfo-1.8.3-10.9.1 * gstreamer-utils-debuginfo-1.8.3-10.9.1 * typelib-1_0-Gst-1_0-1.8.3-10.9.1 * libgstreamer-1_0-0-debuginfo-1.8.3-10.9.1 * gstreamer-debugsource-1.8.3-10.9.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * gstreamer-lang-1.8.3-10.9.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libgstreamer-1_0-0-debuginfo-32bit-1.8.3-10.9.1 * gstreamer-debuginfo-32bit-1.8.3-10.9.1 * libgstreamer-1_0-0-32bit-1.8.3-10.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * gstreamer-1.8.3-10.9.1 * gstreamer-utils-1.8.3-10.9.1 * libgstreamer-1_0-0-1.8.3-10.9.1 * gstreamer-debuginfo-1.8.3-10.9.1 * gstreamer-utils-debuginfo-1.8.3-10.9.1 * typelib-1_0-Gst-1_0-1.8.3-10.9.1 * libgstreamer-1_0-0-debuginfo-1.8.3-10.9.1 * gstreamer-debugsource-1.8.3-10.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * gstreamer-lang-1.8.3-10.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libgstreamer-1_0-0-debuginfo-32bit-1.8.3-10.9.1 * gstreamer-debuginfo-32bit-1.8.3-10.9.1 * libgstreamer-1_0-0-32bit-1.8.3-10.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40474.html * https://bugzilla.suse.com/show_bug.cgi?id=1215796 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 20:30:07 -0000 Subject: SUSE-RU-2024:0306-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <170681940795.4479.5729731845577166713@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2024:0306-1 Rating: moderate References: * bsc#1218561 * bsc#1218739 Affected Products: * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Support proxy setup on the client to access the update infrastructure API (bsc#1218561) * Add IPv6 support (bsc#1218739) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-306=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-306=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-306=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-306=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-306=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-306=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-306=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-306=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-0.0.6-150000.1.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218561 * https://bugzilla.suse.com/show_bug.cgi?id=1218739 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 1 20:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 01 Feb 2024 20:30:10 -0000 Subject: SUSE-SU-2024:0305-1: moderate: Security update for cpio Message-ID: <170681941044.4479.4929348214124969558@smelt2.prg2.suse.org> # Security update for cpio Announcement ID: SUSE-SU-2024:0305-1 Rating: moderate References: * bsc#1218571 * bsc#1219238 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two security fixes can now be installed. ## Description: This update for cpio fixes the following issues: * Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-305=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-305=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-305=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-305=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-305=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-305=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-305=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-305=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-305=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-305=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * openSUSE Leap 15.4 (noarch) * cpio-lang-2.13-150400.3.6.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * openSUSE Leap 15.5 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-2.13-150400.3.6.1 * Basesystem Module 15-SP5 (noarch) * cpio-lang-2.13-150400.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218571 * https://bugzilla.suse.com/show_bug.cgi?id=1219238 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 08:30:04 -0000 Subject: SUSE-SU-2024:0313-1: important: Security update for slurm_18_08 Message-ID: <170686260420.17005.17621022281652580589@smelt2.prg2.suse.org> # Security update for slurm_18_08 Announcement ID: SUSE-SU-2024:0313-1 Rating: important References: * bsc#1216207 * bsc#1216869 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for slurm_18_08 fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-313=1 ## Package List: * HPC Module 12 (aarch64 x86_64) * slurm_18_08-lua-debuginfo-18.08.9-3.23.1 * slurm_18_08-torque-18.08.9-3.23.1 * slurm_18_08-lua-18.08.9-3.23.1 * slurm_18_08-plugins-18.08.9-3.23.1 * slurm_18_08-auth-none-debuginfo-18.08.9-3.23.1 * slurm_18_08-node-debuginfo-18.08.9-3.23.1 * slurm_18_08-sql-18.08.9-3.23.1 * slurm_18_08-pam_slurm-18.08.9-3.23.1 * slurm_18_08-slurmdbd-debuginfo-18.08.9-3.23.1 * slurm_18_08-sql-debuginfo-18.08.9-3.23.1 * slurm_18_08-doc-18.08.9-3.23.1 * slurm_18_08-config-18.08.9-3.23.1 * libpmi0_18_08-18.08.9-3.23.1 * libslurm33-18.08.9-3.23.1 * slurm_18_08-munge-debuginfo-18.08.9-3.23.1 * slurm_18_08-debugsource-18.08.9-3.23.1 * slurm_18_08-devel-18.08.9-3.23.1 * perl-slurm_18_08-debuginfo-18.08.9-3.23.1 * slurm_18_08-torque-debuginfo-18.08.9-3.23.1 * perl-slurm_18_08-18.08.9-3.23.1 * slurm_18_08-auth-none-18.08.9-3.23.1 * slurm_18_08-node-18.08.9-3.23.1 * slurm_18_08-slurmdbd-18.08.9-3.23.1 * slurm_18_08-18.08.9-3.23.1 * slurm_18_08-plugins-debuginfo-18.08.9-3.23.1 * slurm_18_08-munge-18.08.9-3.23.1 * libslurm33-debuginfo-18.08.9-3.23.1 * slurm_18_08-debuginfo-18.08.9-3.23.1 * slurm_18_08-pam_slurm-debuginfo-18.08.9-3.23.1 * libpmi0_18_08-debuginfo-18.08.9-3.23.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 08:30:07 -0000 Subject: SUSE-SU-2024:0312-1: important: Security update for slurm_23_02 Message-ID: <170686260799.17005.14502160824194479103@smelt2.prg2.suse.org> # Security update for slurm_23_02 Announcement ID: SUSE-SU-2024:0312-1 Rating: important References: * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218049 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-49933 * CVE-2023-49935 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49935 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49935 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities and has two security fixes can now be installed. ## Description: This update for slurm_23_02 fixes the following issues: Update to slurm 23.02.6: Security fixes: * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49935: Prevent message hash bypass in slurmd which can allow an attacker to reuse root-level MUNGE tokens and escalate permissions. (bsc#1218049) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-312=1 ## Package List: * HPC Module 12 (aarch64 x86_64) * libnss_slurm2_23_02-debuginfo-23.02.7-3.16.1 * slurm_23_02-cray-23.02.7-3.16.1 * slurm_23_02-pam_slurm-debuginfo-23.02.7-3.16.1 * slurm_23_02-23.02.7-3.16.1 * slurm_23_02-node-debuginfo-23.02.7-3.16.1 * slurm_23_02-auth-none-debuginfo-23.02.7-3.16.1 * slurm_23_02-auth-none-23.02.7-3.16.1 * slurm_23_02-sview-23.02.7-3.16.1 * slurm_23_02-plugin-ext-sensors-rrd-23.02.7-3.16.1 * slurm_23_02-munge-23.02.7-3.16.1 * slurm_23_02-plugin-ext-sensors-rrd-debuginfo-23.02.7-3.16.1 * slurm_23_02-sview-debuginfo-23.02.7-3.16.1 * slurm_23_02-munge-debuginfo-23.02.7-3.16.1 * slurm_23_02-lua-debuginfo-23.02.7-3.16.1 * slurm_23_02-cray-debuginfo-23.02.7-3.16.1 * slurm_23_02-pam_slurm-23.02.7-3.16.1 * libpmi0_23_02-debuginfo-23.02.7-3.16.1 * libslurm39-debuginfo-23.02.7-3.16.1 * slurm_23_02-devel-23.02.7-3.16.1 * slurm_23_02-sql-debuginfo-23.02.7-3.16.1 * libpmi0_23_02-23.02.7-3.16.1 * perl-slurm_23_02-debuginfo-23.02.7-3.16.1 * libnss_slurm2_23_02-23.02.7-3.16.1 * slurm_23_02-plugins-23.02.7-3.16.1 * slurm_23_02-slurmdbd-23.02.7-3.16.1 * slurm_23_02-plugins-debuginfo-23.02.7-3.16.1 * libslurm39-23.02.7-3.16.1 * slurm_23_02-torque-23.02.7-3.16.1 * slurm_23_02-debugsource-23.02.7-3.16.1 * slurm_23_02-slurmdbd-debuginfo-23.02.7-3.16.1 * slurm_23_02-debuginfo-23.02.7-3.16.1 * slurm_23_02-torque-debuginfo-23.02.7-3.16.1 * slurm_23_02-lua-23.02.7-3.16.1 * slurm_23_02-sql-23.02.7-3.16.1 * perl-slurm_23_02-23.02.7-3.16.1 * slurm_23_02-node-23.02.7-3.16.1 * HPC Module 12 (noarch) * slurm_23_02-doc-23.02.7-3.16.1 * slurm_23_02-webdoc-23.02.7-3.16.1 * slurm_23_02-config-23.02.7-3.16.1 * slurm_23_02-config-man-23.02.7-3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49935.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218049 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 08:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 08:30:11 -0000 Subject: SUSE-SU-2024:0311-1: important: Security update for slurm_22_05 Message-ID: <170686261146.17005.7322439135906099608@smelt2.prg2.suse.org> # Security update for slurm_22_05 Announcement ID: SUSE-SU-2024:0311-1 Rating: important References: * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities and has two security fixes can now be installed. ## Description: This update for slurm_22_05 fixes the following issues: Update to slurm 22.05.11: Security fixes: * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-311=1 ## Package List: * HPC Module 12 (aarch64 x86_64) * libslurm38-22.05.11-3.9.1 * slurm_22_05-auth-none-debuginfo-22.05.11-3.9.1 * slurm_22_05-devel-22.05.11-3.9.1 * slurm_22_05-plugins-debuginfo-22.05.11-3.9.1 * slurm_22_05-sql-debuginfo-22.05.11-3.9.1 * slurm_22_05-auth-none-22.05.11-3.9.1 * slurm_22_05-slurmdbd-debuginfo-22.05.11-3.9.1 * slurm_22_05-node-debuginfo-22.05.11-3.9.1 * slurm_22_05-plugins-22.05.11-3.9.1 * slurm_22_05-munge-22.05.11-3.9.1 * perl-slurm_22_05-debuginfo-22.05.11-3.9.1 * slurm_22_05-debuginfo-22.05.11-3.9.1 * perl-slurm_22_05-22.05.11-3.9.1 * slurm_22_05-slurmdbd-22.05.11-3.9.1 * slurm_22_05-munge-debuginfo-22.05.11-3.9.1 * slurm_22_05-22.05.11-3.9.1 * slurm_22_05-node-22.05.11-3.9.1 * libnss_slurm2_22_05-debuginfo-22.05.11-3.9.1 * libslurm38-debuginfo-22.05.11-3.9.1 * libnss_slurm2_22_05-22.05.11-3.9.1 * slurm_22_05-sql-22.05.11-3.9.1 * slurm_22_05-lua-22.05.11-3.9.1 * slurm_22_05-lua-debuginfo-22.05.11-3.9.1 * libpmi0_22_05-debuginfo-22.05.11-3.9.1 * libpmi0_22_05-22.05.11-3.9.1 * slurm_22_05-pam_slurm-22.05.11-3.9.1 * slurm_22_05-sview-debuginfo-22.05.11-3.9.1 * slurm_22_05-torque-22.05.11-3.9.1 * slurm_22_05-sview-22.05.11-3.9.1 * slurm_22_05-debugsource-22.05.11-3.9.1 * slurm_22_05-torque-debuginfo-22.05.11-3.9.1 * slurm_22_05-pam_slurm-debuginfo-22.05.11-3.9.1 * HPC Module 12 (noarch) * slurm_22_05-doc-22.05.11-3.9.1 * slurm_22_05-webdoc-22.05.11-3.9.1 * slurm_22_05-config-22.05.11-3.9.1 * slurm_22_05-config-man-22.05.11-3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 08:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 08:30:15 -0000 Subject: SUSE-SU-2024:0310-1: important: Security update for slurm_20_02 Message-ID: <170686261519.17005.2704503124734200306@smelt2.prg2.suse.org> # Security update for slurm_20_02 Announcement ID: SUSE-SU-2024:0310-1 Rating: important References: * bsc#1216869 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for slurm_20_02 fixes the following issues: Security fixes: * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-310=1 ## Package List: * HPC Module 12 (aarch64 x86_64) * slurm_20_02-plugins-20.02.7-3.20.1 * slurm_20_02-sql-20.02.7-3.20.1 * slurm_20_02-auth-none-debuginfo-20.02.7-3.20.1 * slurm_20_02-lua-debuginfo-20.02.7-3.20.1 * slurm_20_02-20.02.7-3.20.1 * slurm_20_02-debuginfo-20.02.7-3.20.1 * slurm_20_02-sview-debuginfo-20.02.7-3.20.1 * slurm_20_02-lua-20.02.7-3.20.1 * slurm_20_02-slurmdbd-debuginfo-20.02.7-3.20.1 * libnss_slurm2_20_02-debuginfo-20.02.7-3.20.1 * slurm_20_02-pam_slurm-20.02.7-3.20.1 * libslurm35-debuginfo-20.02.7-3.20.1 * slurm_20_02-node-debuginfo-20.02.7-3.20.1 * slurm_20_02-auth-none-20.02.7-3.20.1 * slurm_20_02-plugins-debuginfo-20.02.7-3.20.1 * slurm_20_02-config-20.02.7-3.20.1 * slurm_20_02-devel-20.02.7-3.20.1 * slurm_20_02-torque-20.02.7-3.20.1 * libslurm35-20.02.7-3.20.1 * slurm_20_02-munge-20.02.7-3.20.1 * slurm_20_02-slurmdbd-20.02.7-3.20.1 * slurm_20_02-sql-debuginfo-20.02.7-3.20.1 * slurm_20_02-node-20.02.7-3.20.1 * perl-slurm_20_02-20.02.7-3.20.1 * libpmi0_20_02-debuginfo-20.02.7-3.20.1 * slurm_20_02-torque-debuginfo-20.02.7-3.20.1 * slurm_20_02-doc-20.02.7-3.20.1 * perl-slurm_20_02-debuginfo-20.02.7-3.20.1 * slurm_20_02-debugsource-20.02.7-3.20.1 * slurm_20_02-config-man-20.02.7-3.20.1 * libpmi0_20_02-20.02.7-3.20.1 * slurm_20_02-munge-debuginfo-20.02.7-3.20.1 * slurm_20_02-sview-20.02.7-3.20.1 * libnss_slurm2_20_02-20.02.7-3.20.1 * slurm_20_02-pam_slurm-debuginfo-20.02.7-3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 08:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 08:30:18 -0000 Subject: SUSE-SU-2024:0309-1: important: Security update for slurm_20_11 Message-ID: <170686261884.17005.12037168076139576608@smelt2.prg2.suse.org> # Security update for slurm_20_11 Announcement ID: SUSE-SU-2024:0309-1 Rating: important References: * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for slurm_20_11 fixes the following issues: * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-309=1 ## Package List: * HPC Module 12 (aarch64 x86_64) * slurm_20_11-config-20.11.9-3.19.1 * libnss_slurm2_20_11-20.11.9-3.19.1 * slurm_20_11-devel-20.11.9-3.19.1 * slurm_20_11-munge-debuginfo-20.11.9-3.19.1 * slurm_20_11-sview-debuginfo-20.11.9-3.19.1 * slurm_20_11-plugins-debuginfo-20.11.9-3.19.1 * slurm_20_11-auth-none-20.11.9-3.19.1 * libpmi0_20_11-debuginfo-20.11.9-3.19.1 * slurm_20_11-lua-20.11.9-3.19.1 * slurm_20_11-sview-20.11.9-3.19.1 * slurm_20_11-webdoc-20.11.9-3.19.1 * libslurm36-debuginfo-20.11.9-3.19.1 * slurm_20_11-slurmdbd-20.11.9-3.19.1 * slurm_20_11-torque-debuginfo-20.11.9-3.19.1 * slurm_20_11-20.11.9-3.19.1 * slurm_20_11-pam_slurm-debuginfo-20.11.9-3.19.1 * slurm_20_11-node-debuginfo-20.11.9-3.19.1 * slurm_20_11-pam_slurm-20.11.9-3.19.1 * libnss_slurm2_20_11-debuginfo-20.11.9-3.19.1 * slurm_20_11-lua-debuginfo-20.11.9-3.19.1 * perl-slurm_20_11-20.11.9-3.19.1 * slurm_20_11-slurmdbd-debuginfo-20.11.9-3.19.1 * slurm_20_11-auth-none-debuginfo-20.11.9-3.19.1 * slurm_20_11-doc-20.11.9-3.19.1 * slurm_20_11-debugsource-20.11.9-3.19.1 * perl-slurm_20_11-debuginfo-20.11.9-3.19.1 * libslurm36-20.11.9-3.19.1 * slurm_20_11-sql-debuginfo-20.11.9-3.19.1 * libpmi0_20_11-20.11.9-3.19.1 * slurm_20_11-torque-20.11.9-3.19.1 * slurm_20_11-munge-20.11.9-3.19.1 * slurm_20_11-debuginfo-20.11.9-3.19.1 * slurm_20_11-node-20.11.9-3.19.1 * slurm_20_11-plugins-20.11.9-3.19.1 * slurm_20_11-sql-20.11.9-3.19.1 * slurm_20_11-config-man-20.11.9-3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0319-1: moderate: Security update for gdb Message-ID: <170687700474.5200.3664965477314250418@smelt2.prg2.suse.org> # Security update for gdb Announcement ID: SUSE-SU-2024:0319-1 Rating: moderate References: * bsc#1068950 * bsc#1081527 * bsc#1211052 * jsc#PED-6584 Cross-References: * CVE-2017-16829 * CVE-2018-7208 * CVE-2022-4806 CVSS scores: * CVE-2017-16829 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2017-16829 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2018-7208 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-7208 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-4806 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2022-4806 ( NVD ): 8.2 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves three vulnerabilities and contains one feature can now be installed. ## Description: This update for gdb fixes the following issues: * Drop libdebuginfod1 BuildRequires/Recommends. The former isn't needed because there's a build requirement on libdebuginfod-devel already, which will pull the shared library. And the latter, because it's bogus since RPM auto generated dependency will take care of that requirement. gdb was released in 13.2: * This version of GDB includes the following changes and enhancements: * Support for the following new targets has been added in both GDB and GDBserver: * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux* * GNU/Linux/CSKY (gdbserver) csky*-*linux* * The Windows native target now supports target async. * Floating-point support has now been added on LoongArch GNU/Linux. * New commands: * set print nibbles [on|off] * show print nibbles * This controls whether the 'print/t' command will display binary values in groups of four bits, known as "nibbles". The default is 'off'. Various styling-related commands. See the gdb/NEWS file for more details. Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. * Python API improvements: * New Python API for instruction disassembly. * The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee. * New Python type gdb.BreakpointLocation. * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address ' * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'. * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string. * New method gdb.Frame.language that returns the name of the frame's language. * gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation. * gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does. * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9]. * GDB/MI changes: * MI version 1 is deprecated, and will be removed in GDB 14. * The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno. * Miscellaneous improvements: * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF. * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior. * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit. * The "info breakpoints" now displays enabled breakpoint locations of disabled breakpoints as in the "y-" state. * The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling. * A new format "/b" has been introduce to provide the old behavior of "/r". * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new "set style tui-current-position" command. * It is now possible to use the "document" command to document user-defined commands. * Support for memory tag data for AArch64 MTE. * Support Removal notices: * DBX mode has been removed. * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3. * Support for the following commands has been removed: * set debug aix-solib on|off * show debug aix-solib * set debug solib-frv on|off * show debug solib-frv * Use the "set/show debug solib" commands instead. See the NEWS file for a more complete and detailed list of what this release includes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-319=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-319=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-319=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-319=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * gdbserver-debuginfo-13.2-2.23.1 * gdbserver-13.2-2.23.1 * gdb-debuginfo-13.2-2.23.1 * gdb-debugsource-13.2-2.23.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (s390x) * gdbserver-debuginfo-32bit-13.2-2.23.1 * gdbserver-32bit-13.2-2.23.1 * gdb-debuginfo-32bit-13.2-2.23.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * gdb-debuginfo-13.2-2.23.1 * gdb-13.2-2.23.1 * gdb-debugsource-13.2-2.23.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * gdb-debuginfo-13.2-2.23.1 * gdb-13.2-2.23.1 * gdb-debugsource-13.2-2.23.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * gdb-debuginfo-13.2-2.23.1 * gdb-13.2-2.23.1 * gdb-debugsource-13.2-2.23.1 ## References: * https://www.suse.com/security/cve/CVE-2017-16829.html * https://www.suse.com/security/cve/CVE-2018-7208.html * https://www.suse.com/security/cve/CVE-2022-4806.html * https://bugzilla.suse.com/show_bug.cgi?id=1068950 * https://bugzilla.suse.com/show_bug.cgi?id=1081527 * https://bugzilla.suse.com/show_bug.cgi?id=1211052 * https://jira.suse.com/browse/PED-6584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 12:30:08 -0000 Subject: SUSE-SU-2024:0317-1: moderate: Security update for openconnect Message-ID: <170687700894.5200.18098978840552931909@smelt2.prg2.suse.org> # Security update for openconnect Announcement ID: SUSE-SU-2024:0317-1 Rating: moderate References: * bsc#1140772 * bsc#1157446 * bsc#1170452 * bsc#1171862 * bsc#1215669 * jsc#PED-6742 * jsc#PED-7015 Cross-References: * CVE-2018-20319 * CVE-2020-12105 * CVE-2020-12823 CVSS scores: * CVE-2018-20319 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N * CVE-2020-12105 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-12105 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-12823 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2020-12823 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves three vulnerabilities, contains two features and has two security fixes can now be installed. ## Description: This update for openconnect fixes the following issues: * Update to release 9.12: * Explicitly reject overly long tun device names. * Increase maximum input size from stdin (#579). * Ignore 0.0.0.0 as NBNS address (!446, vpnc-scripts#58). * Fix stray (null) in URL path after Pulse authentication (4023bd95). * Fix config XML parsing mistake that left GlobalProtect ESP non-working in v9.10 (!475). * Fix case sensitivity in GPST header matching (!474). * Update to release 9.10: * Fix external browser authentication with KDE plasma-nm < 5.26. * Always redirect stdout to stderr when spawning external browser. * Increase default queue length to 32 packets. * Fix receiving multiple packets in one TLS frame, and single packets split across multiple TLS frames, for Array. * Handle idiosyncratic variation in search domain separators for all protocols * Support region selection field for Pulse authentication * Support modified configuration packet from Pulse 9.1R16 servers * Allow hidden form fields to be populated or converted to text fields on the command line * Support yet another strange way of encoding challenge-based 2FA for GlobalProtect * Add --sni option (and corresponding C and Java API functions) to allow domain-fronting connections in censored/filtered network environments * Parrot a GlobalProtect server's software version, if present, as the client version (!333) * Fix NULL pointer dereference that has left Android builds broken since v8.20 (!389). * Fix Fortinet authentication bug where repeated SVPNCOOKIE causes segfaults (#514, !418). * Support F5 VPNs which encode authentication forms only in JSON, not in HTML. * Support simultaneous IPv6 and Legacy IP ("dual-stack") for Fortinet . * Support "FTM-push" token mode for Fortinet VPNs . * Send IPv6-compatible version string in Pulse IF/T session establishment * Add --no-external-auth option to not advertise external-browser authentication * Many small improvements in server response parsing, and better logging messages and documentation. * Update to release 9.01: * Add support for AnyConnect "Session Token Re-use Anchor Protocol" (STRAP) * Add support for AnyConnect "external browser" SSO mode * Bugfix RSA SecurID token decryption and PIN entry forms, broken in v8.20 * Support Cisco's multiple-certificate authentication * Revert GlobalProtect default route handling change from v8.20 * Suppo split-exclude routes for Fortinet * Add webview callback and SAML/SSO support for AnyConnect, GlobalProtect * Update to release 8.20: * Support non-AEAD ciphersuites in DTLSv1.2 with AnyConnect. * Emulated a newer version of GlobalProtect official clients, 5.1.5-8; was 4.0.2-19 * Support Juniper login forms containing both password and 2FA token * Explicitly disable 3DES and RC4, unless enabled with \--allow-insecure- crypto * Allow protocols to delay tunnel setup and shutdown (!117) * Support for GlobalProtect IPv6 * SIGUSR1now causes OpenConnect to log detailed connection information and statistics * Allow --servercert to be specified multiple times in order to accept server certificates matching more than one possible fingerprint * Demangle default routes sent as split routes by GlobalProtect * Support more Juniper login forms, including some SSO forms * Restore compatibility with newer Cisco servers, by no longer sending them the X-AnyConnect-Platform header * Add support for PPP-based protocols, currently over TLS only. * Add support for two PPP-based protocols, F5 with \--protocol=f5 and Fortinet with --protocol=fortinet. * Add support for Array Networks SSL VPN. * Support TLSv1.3 with TPMv2 EC and RSA keys, add test cases for swtpm and hardware TPM. * Import the latest version of the vpnc-script (bsc#1140772) * This brings a lot of improvements for non-trivial network setups, IPv6 etc * Build with --without-gnutls-version-check * Update to version 8.10: * Install bash completion script to ${datadir}/bash- completion/completions/openconnect. * Improve compatibility of csd-post.sh trojan. * Fix potential buffer overflow with GnuTLS describing local certs (CVE-2020-12823, bsc#1171862, gl#openconnect/openconnect!108). * Introduce subpackage for bash-completion * Update to 8.09: * Add bash completion support. * Give more helpful error in case of Pulse servers asking for TNCC. * Sanitize non-canonical Legacy IP network addresses. * Fix OpenSSL validation for trusted but invalid certificates (CVE-2020-12105 bsc#1170452). * Convert tncc-wrapper.py to Python 3, and include modernized tncc-emulate.py as well. (!91) * Disable Nagle's algorithm for TLS sockets, to improve interactivity when tunnel runs over TCP rather than UDP. * GlobalProtect: more resilient handling of periodic HIP check and login arguments, and predictable naming of challenge forms. * Work around PKCS#11 tokens which forget to set CKF_LOGIN_REQUIRED. * Update to 8.0.8: * Fix check of pin-sha256: public key hashes to be case sensitive * Don't give non-functioning stderr to CSD trojan scripts. * Fix crash with uninitialised OIDC token. * Update to 8.0.7: * Don't abort Pulse connection when server-provided certificate MD5 doesn't match. * Fix off-by-one in check for bad GnuTLS versions, and add build and run time checks. * Don't abort connection if CSD wrapper script returns non-zero (for now). * Make --passtos work for protocols that use ESP, in addition to DTLS. * Convert tncc-wrapper.py to Python 3, and include modernized tncc-emulate.py as well. * Remove tncc-wrapper.py script as it is python2 only bsc#1157446 * No need to ship hipreport-android.sh as it is intented for android systems only * Update to 8.0.5: * Minor fixes to build on specific platforms * Includes fix for a buffer overflow with chunked HTTP handling (CVE-2019-16239, bsc#1151178) * Use python3 to generate the web data as now it is supported by upstream * Update to 8.0.3: * Fix Cisco DTLSv1.2 support for AES256-GCM-SHA384. * Fix recognition of OTP password fields. * Update to 8.02: * Fix GNU/Hurd build. * Discover vpnc-script in default packaged location on FreeBSD/OpenBSD. * Support split-exclude routes for GlobalProtect. * Fix GnuTLS builds without libtasn1. * Fix DTLS support with OpenSSL 1.1.1+. * Add Cisco-compatible DTLSv1.2 support. * Invoke script with reason=attempt-reconnect before doing so. * Update to 8.01: * Clear form submissions (which may include passwords) before freeing (CVE-2018-20319, bsc#1215669). * Allow form responses to be provided on command line. * Add support for SSL keys stored in TPM2. * Fix ESP rekey when replay protection is disabled. * Drop support for GnuTLS older than 3.2.10. * Fix --passwd-on-stdin for Windows to not forcibly open console. * Fix portability of shell scripts in test suite. * Add Google Authenticator TOTP support for Juniper. * Add RFC7469 key PIN support for cert hashes. * Add protocol method to securely log out the Juniper session. * Relax requirements for Juniper hostname packet response to support old gateways. * Add API functions to query the supported protocols. * Verify ESP sequence numbers and warn even if replay protection is disabled. * Add support for PAN GlobalProtect VPN protocol (--protocol=gp). * Reorganize listing of command-line options, and include information on supported protocols. * SIGTERM cleans up the session similarly to SIGINT. * Fix memset_s() arguments. * Fix OpenBSD build. * Explicitely enable all the features as needed to stop build if something is missing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-317=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-317=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-317=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-317=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-317=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openconnect-debuginfo-9.12-150400.15.3.1 * stoken-debuginfo-0.81-150400.13.2.1 * openconnect-9.12-150400.15.3.1 * stoken-debugsource-0.81-150400.13.2.1 * openconnect-debugsource-9.12-150400.15.3.1 * libstoken1-0.81-150400.13.2.1 * stoken-gui-0.81-150400.13.2.1 * stoken-devel-0.81-150400.13.2.1 * stoken-gui-debuginfo-0.81-150400.13.2.1 * libstoken1-debuginfo-0.81-150400.13.2.1 * stoken-0.81-150400.13.2.1 * libopenconnect5-9.12-150400.15.3.1 * openconnect-devel-9.12-150400.15.3.1 * libopenconnect5-debuginfo-9.12-150400.15.3.1 * openSUSE Leap 15.4 (noarch) * openconnect-bash-completion-9.12-150400.15.3.1 * openconnect-lang-9.12-150400.15.3.1 * openconnect-doc-9.12-150400.15.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * oath-toolkit-debugsource-2.6.2-150000.3.5.1 * openconnect-9.12-150400.15.3.1 * pam_oath-2.6.2-150000.3.5.1 * stoken-debugsource-0.81-150400.13.2.1 * pam_oath-debuginfo-2.6.2-150000.3.5.1 * libopenconnect5-9.12-150400.15.3.1 * oath-toolkit-debuginfo-2.6.2-150000.3.5.1 * liboath0-2.6.2-150000.3.5.1 * openconnect-debuginfo-9.12-150400.15.3.1 * libpskc-devel-2.6.2-150000.3.5.1 * liboath0-debuginfo-2.6.2-150000.3.5.1 * libstoken1-0.81-150400.13.2.1 * libstoken1-debuginfo-0.81-150400.13.2.1 * liboath-devel-2.6.2-150000.3.5.1 * openconnect-devel-9.12-150400.15.3.1 * libpskc0-2.6.2-150000.3.5.1 * openconnect-debugsource-9.12-150400.15.3.1 * stoken-gui-0.81-150400.13.2.1 * stoken-debuginfo-0.81-150400.13.2.1 * stoken-0.81-150400.13.2.1 * stoken-gui-debuginfo-0.81-150400.13.2.1 * stoken-devel-0.81-150400.13.2.1 * oath-toolkit-2.6.2-150000.3.5.1 * libpskc0-debuginfo-2.6.2-150000.3.5.1 * libopenconnect5-debuginfo-9.12-150400.15.3.1 * openSUSE Leap 15.5 (noarch) * openconnect-lang-9.12-150400.15.3.1 * oath-toolkit-xml-2.6.2-150000.3.5.1 * openconnect-doc-9.12-150400.15.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * oath-toolkit-debugsource-2.6.2-150000.3.5.1 * liboath0-debuginfo-2.6.2-150000.3.5.1 * oath-toolkit-debuginfo-2.6.2-150000.3.5.1 * liboath0-2.6.2-150000.3.5.1 * liboath-devel-2.6.2-150000.3.5.1 * Basesystem Module 15-SP5 (noarch) * oath-toolkit-xml-2.6.2-150000.3.5.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * oath-toolkit-debugsource-2.6.2-150000.3.5.1 * openconnect-debuginfo-9.12-150400.15.3.1 * stoken-debuginfo-0.81-150400.13.2.1 * openconnect-9.12-150400.15.3.1 * libpskc-devel-2.6.2-150000.3.5.1 * libpskc0-2.6.2-150000.3.5.1 * libstoken1-0.81-150400.13.2.1 * openconnect-debugsource-9.12-150400.15.3.1 * stoken-debugsource-0.81-150400.13.2.1 * stoken-devel-0.81-150400.13.2.1 * libpskc0-debuginfo-2.6.2-150000.3.5.1 * stoken-gui-0.81-150400.13.2.1 * stoken-gui-debuginfo-0.81-150400.13.2.1 * oath-toolkit-2.6.2-150000.3.5.1 * oath-toolkit-debuginfo-2.6.2-150000.3.5.1 * libstoken1-debuginfo-0.81-150400.13.2.1 * stoken-0.81-150400.13.2.1 * libopenconnect5-9.12-150400.15.3.1 * openconnect-devel-9.12-150400.15.3.1 * libopenconnect5-debuginfo-9.12-150400.15.3.1 * SUSE Package Hub 15 15-SP5 (noarch) * openconnect-lang-9.12-150400.15.3.1 * openconnect-doc-9.12-150400.15.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * oath-toolkit-debugsource-2.6.2-150000.3.5.1 * openconnect-debuginfo-9.12-150400.15.3.1 * stoken-debuginfo-0.81-150400.13.2.1 * openconnect-9.12-150400.15.3.1 * libpskc-devel-2.6.2-150000.3.5.1 * libpskc0-2.6.2-150000.3.5.1 * libstoken1-0.81-150400.13.2.1 * openconnect-debugsource-9.12-150400.15.3.1 * stoken-debugsource-0.81-150400.13.2.1 * stoken-devel-0.81-150400.13.2.1 * libpskc0-debuginfo-2.6.2-150000.3.5.1 * oath-toolkit-debuginfo-2.6.2-150000.3.5.1 * libstoken1-debuginfo-0.81-150400.13.2.1 * libopenconnect5-9.12-150400.15.3.1 * openconnect-devel-9.12-150400.15.3.1 * libopenconnect5-debuginfo-9.12-150400.15.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * openconnect-lang-9.12-150400.15.3.1 ## References: * https://www.suse.com/security/cve/CVE-2018-20319.html * https://www.suse.com/security/cve/CVE-2020-12105.html * https://www.suse.com/security/cve/CVE-2020-12823.html * https://bugzilla.suse.com/show_bug.cgi?id=1140772 * https://bugzilla.suse.com/show_bug.cgi?id=1157446 * https://bugzilla.suse.com/show_bug.cgi?id=1170452 * https://bugzilla.suse.com/show_bug.cgi?id=1171862 * https://bugzilla.suse.com/show_bug.cgi?id=1215669 * https://jira.suse.com/browse/PED-6742 * https://jira.suse.com/browse/PED-7015 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 12:30:11 -0000 Subject: SUSE-RU-2024:0316-1: moderate: Recommended update for go1.22 Message-ID: <170687701149.5200.11875375812833233355@smelt2.prg2.suse.org> # Recommended update for go1.22 Announcement ID: SUSE-RU-2024:0316-1 Rating: moderate References: * bsc#1218424 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for go1.22 fixes the following issues: * go1.22rc2 (released 2024-01-24) is a release candidate version of go1.22 cut from the master branch at the revision tagged go1.22rc2. (bsc#1218424) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-316=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-316=1 ## Package List: * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.22-doc-1.22rc2-150000.1.3.1 * go1.22-1.22rc2-150000.1.3.1 * go1.22-race-1.22rc2-150000.1.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.22-doc-1.22rc2-150000.1.3.1 * go1.22-1.22rc2-150000.1.3.1 * go1.22-race-1.22rc2-150000.1.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218424 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 12:30:14 -0000 Subject: SUSE-SU-2024:0315-1: important: Security update for slurm Message-ID: <170687701458.5200.12048487562373584190@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0315-1 Rating: important References: * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * HPC Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for slurm fixes the following issues: * CVE-2023-49933: Fixed a message extension attack that could bypass the message hash (bsc#1218046). * CVE-2023-49936: Fixed a NULL pointer dereference (bsc#1218050). * CVE-2023-49937: Fixed a double free that could lead to denial of service or code execution (bsc#1218051). * CVE-2023-49938: Fixed an incorrect access control issue that could allow an attacker to modify their extended group list (bsc#1218053). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 12 zypper in -t patch SUSE-SLE-Module-HPC-12-2024-315=1 ## Package List: * HPC Module 12 (aarch64 x86_64) * slurm-torque-17.02.11-6.59.1 * slurm-auth-none-debuginfo-17.02.11-6.59.1 * slurm-config-17.02.11-6.59.1 * slurm-plugins-debuginfo-17.02.11-6.59.1 * slurm-pam_slurm-17.02.11-6.59.1 * slurm-17.02.11-6.59.1 * libslurm31-debuginfo-17.02.11-6.59.1 * slurm-sql-debuginfo-17.02.11-6.59.1 * slurm-devel-17.02.11-6.59.1 * slurm-lua-debuginfo-17.02.11-6.59.1 * slurm-debugsource-17.02.11-6.59.1 * slurm-doc-17.02.11-6.59.1 * slurm-slurmdbd-17.02.11-6.59.1 * perl-slurm-debuginfo-17.02.11-6.59.1 * slurm-auth-none-17.02.11-6.59.1 * perl-slurm-17.02.11-6.59.1 * slurm-munge-debuginfo-17.02.11-6.59.1 * slurm-pam_slurm-debuginfo-17.02.11-6.59.1 * slurm-sql-17.02.11-6.59.1 * slurm-plugins-17.02.11-6.59.1 * libslurm31-17.02.11-6.59.1 * slurm-munge-17.02.11-6.59.1 * slurm-lua-17.02.11-6.59.1 * slurm-torque-debuginfo-17.02.11-6.59.1 * libpmi0-debuginfo-17.02.11-6.59.1 * slurm-debuginfo-17.02.11-6.59.1 * slurm-slurmdb-direct-17.02.11-6.59.1 * libpmi0-17.02.11-6.59.1 * slurm-slurmdbd-debuginfo-17.02.11-6.59.1 * slurm-sched-wiki-17.02.11-6.59.1 ## References: * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 12:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 12:30:18 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170687701867.5200.6112904182956077264@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * slurm-debugsource-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:30:06 -0000 Subject: SUSE-RU-2024:0322-1: moderate: Recommended update for aaa_base Message-ID: <170689140686.9726.241231342693979297@smelt2.prg2.suse.org> # Recommended update for aaa_base Announcement ID: SUSE-RU-2024:0322-1 Rating: moderate References: * bsc#1107342 * bsc#1215434 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for aaa_base fixes the following issues: * Set JAVA_HOME correctly (bsc#1107342, bsc#1215434) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-322=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-322=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-322=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-322=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-322=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-322=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-322=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-322=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-322=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-322=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-322=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-322=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-322=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-322=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-322=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-322=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-322=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-322=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-322=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-322=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-322=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-322=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-322=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-322=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-322=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Manager Proxy 4.3 (x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.9.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1107342 * https://bugzilla.suse.com/show_bug.cgi?id=1215434 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:30:11 -0000 Subject: SUSE-SU-2024:0321-1: important: Security update for java-11-openjdk Message-ID: <170689141198.9726.1611547470884577498@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2024:0321-1 Rating: important References: * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Updated to version 11.0.22 (January 2024 CPU): * CVE-2024-20918: Fixed an out of bounds access in the Hotspot JVM due to a missing bounds check (bsc#1218907). * CVE-2024-20919: Fixed a sandbox bypass in the Hotspot JVM class file verifier (bsc#1218903). * CVE-2024-20921: Fixed an incorrect optimization in the Hotspot JVM that could lead to corruption of JVM memory (bsc#1218905). * CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906). * CVE-2024-20945: Fixed a potential private key leak through debug logs (bsc#1218909). * CVE-2024-20952: Fixed an RSA padding issue and timing side-channel attack against TLS (bsc#1218911). Find the full release notes at: https://mail.openjdk.org/pipermail/jdk-updates-dev/2024-January/029215.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-321=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-321=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-321=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-321=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-321=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-321=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-321=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-321=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-321=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-321=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-321=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-321=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-321=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-321=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-321=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-321=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-321=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-321=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-321=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-321=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-321=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * SUSE Package Hub 15 15-SP5 (noarch) * java-11-openjdk-javadoc-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Manager Proxy 4.3 (x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * SUSE CaaS Platform 4.0 (x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-devel-11.0.22.0-150000.3.110.1 * java-11-openjdk-debugsource-11.0.22.0-150000.3.110.1 * java-11-openjdk-debuginfo-11.0.22.0-150000.3.110.1 * java-11-openjdk-jmods-11.0.22.0-150000.3.110.1 * java-11-openjdk-src-11.0.22.0-150000.3.110.1 * java-11-openjdk-demo-11.0.22.0-150000.3.110.1 * java-11-openjdk-11.0.22.0-150000.3.110.1 * java-11-openjdk-headless-11.0.22.0-150000.3.110.1 * openSUSE Leap 15.5 (noarch) * java-11-openjdk-javadoc-11.0.22.0-150000.3.110.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:30:15 -0000 Subject: SUSE-SU-2024:0320-1: important: Security update for xerces-c Message-ID: <170689141538.9726.15220210859017400675@smelt2.prg2.suse.org> # Security update for xerces-c Announcement ID: SUSE-SU-2024:0320-1 Rating: important References: * bsc#1159552 Cross-References: * CVE-2018-1311 CVSS scores: * CVE-2018-1311 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-1311 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for xerces-c fixes the following issues: * CVE-2018-1311: fixed use-after-free triggered during the scanning of external DTDs potentially leading to DOS. (bsc#1159552) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-320=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-320=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-320=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-320=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-320=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-320=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-320=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-320=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-320=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-320=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-320=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-320=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-320=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-320=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-320=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-doc-3.2.3-150300.3.6.1 * xerces-c-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * openSUSE Leap 15.3 (x86_64) * libxerces-c-3_2-32bit-3.2.3-150300.3.6.1 * libxerces-c-3_2-32bit-debuginfo-3.2.3-150300.3.6.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libxerces-c-3_2-64bit-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-64bit-3.2.3-150300.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-doc-3.2.3-150300.3.6.1 * xerces-c-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * openSUSE Leap 15.5 (x86_64) * libxerces-c-3_2-32bit-3.2.3-150300.3.6.1 * libxerces-c-3_2-32bit-debuginfo-3.2.3-150300.3.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libxerces-c-devel-3.2.3-150300.3.6.1 * libxerces-c-3_2-3.2.3-150300.3.6.1 * xerces-c-debuginfo-3.2.3-150300.3.6.1 * libxerces-c-3_2-debuginfo-3.2.3-150300.3.6.1 * xerces-c-debugsource-3.2.3-150300.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2018-1311.html * https://bugzilla.suse.com/show_bug.cgi?id=1159552 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:30:17 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170689141723.9726.1818478340658803965@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * slurm-debugsource-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:33:19 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:33:19 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170689159969.16042.14957267017660903332@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:36:20 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:36:20 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170689178098.15029.7147572596212408896@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * slurm-debugsource-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 16:39:22 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 16:39:22 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170689196299.16042.7386640711783023411@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 20:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 20:30:01 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170690580163.16146.14502632425811596690@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * slurm-debugsource-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 20:33:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 20:33:04 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170690598494.5474.12156372632013462839@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 2 20:36:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Feb 2024 20:36:07 -0000 Subject: SUSE-SU-2024:0314-1: important: Security update for slurm Message-ID: <170690616730.4993.2580975437227244019@smelt2.prg2.suse.org> # Security update for slurm Announcement ID: SUSE-SU-2024:0314-1 Rating: important References: * bsc#1208810 * bsc#1216207 * bsc#1216869 * bsc#1217711 * bsc#1218046 * bsc#1218050 * bsc#1218051 * bsc#1218053 Cross-References: * CVE-2023-41914 * CVE-2023-49933 * CVE-2023-49936 * CVE-2023-49937 * CVE-2023-49938 CVSS scores: * CVE-2023-41914 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-41914 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49933 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49933 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-49936 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49936 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-49937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-49937 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-49938 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-49938 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has three security fixes can now be installed. ## Description: This update for slurm fixes the following issues: Security fixes: * CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207) * CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046) * CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050) * CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051) * CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053) Other fixes: * Add missing service file for slurmrestd (bsc#1217711). * Fix slurm upgrading to incompatible versions (bsc#1216869). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-314=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-314=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-314=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-314=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-hdf5-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-hdf5-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-openlava-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-testsuite-20.11.9-150400.3.3.1 * slurm-sjstat-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-seff-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Package Hub 15 15-SP5 (ppc64le) * slurm-debugsource-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * slurm-sql-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-20.11.9-150400.3.3.1 * libslurm36-debuginfo-20.11.9-150400.3.3.1 * slurm-munge-debuginfo-20.11.9-150400.3.3.1 * libslurm36-20.11.9-150400.3.3.1 * perl-slurm-20.11.9-150400.3.3.1 * perl-slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-node-20.11.9-150400.3.3.1 * slurm-munge-20.11.9-150400.3.3.1 * slurm-debugsource-20.11.9-150400.3.3.1 * slurm-webdoc-20.11.9-150400.3.3.1 * slurm-devel-20.11.9-150400.3.3.1 * slurm-cray-debuginfo-20.11.9-150400.3.3.1 * slurm-node-debuginfo-20.11.9-150400.3.3.1 * slurm-plugins-debuginfo-20.11.9-150400.3.3.1 * libnss_slurm2-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-debuginfo-20.11.9-150400.3.3.1 * slurm-lua-20.11.9-150400.3.3.1 * slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-20.11.9-150400.3.3.1 * slurm-plugins-20.11.9-150400.3.3.1 * slurm-20.11.9-150400.3.3.1 * libnss_slurm2-20.11.9-150400.3.3.1 * slurm-auth-none-debuginfo-20.11.9-150400.3.3.1 * slurm-sql-20.11.9-150400.3.3.1 * slurm-auth-none-20.11.9-150400.3.3.1 * slurm-slurmdbd-20.11.9-150400.3.3.1 * slurm-sview-debuginfo-20.11.9-150400.3.3.1 * slurm-torque-debuginfo-20.11.9-150400.3.3.1 * slurm-doc-20.11.9-150400.3.3.1 * slurm-lua-debuginfo-20.11.9-150400.3.3.1 * slurm-slurmdbd-debuginfo-20.11.9-150400.3.3.1 * slurm-cray-20.11.9-150400.3.3.1 * libpmi0-20.11.9-150400.3.3.1 * slurm-config-20.11.9-150400.3.3.1 * slurm-sview-20.11.9-150400.3.3.1 * slurm-config-man-20.11.9-150400.3.3.1 * libpmi0-debuginfo-20.11.9-150400.3.3.1 * slurm-pam_slurm-debuginfo-20.11.9-150400.3.3.1 * slurm-rest-20.11.9-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-41914.html * https://www.suse.com/security/cve/CVE-2023-49933.html * https://www.suse.com/security/cve/CVE-2023-49936.html * https://www.suse.com/security/cve/CVE-2023-49937.html * https://www.suse.com/security/cve/CVE-2023-49938.html * https://bugzilla.suse.com/show_bug.cgi?id=1208810 * https://bugzilla.suse.com/show_bug.cgi?id=1216207 * https://bugzilla.suse.com/show_bug.cgi?id=1216869 * https://bugzilla.suse.com/show_bug.cgi?id=1217711 * https://bugzilla.suse.com/show_bug.cgi?id=1218046 * https://bugzilla.suse.com/show_bug.cgi?id=1218050 * https://bugzilla.suse.com/show_bug.cgi?id=1218051 * https://bugzilla.suse.com/show_bug.cgi?id=1218053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0325-1: important: Security update for java-17-openjdk Message-ID: <170713620371.30139.1479521478610050432@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2024:0325-1 Rating: important References: * bsc#1218903 * bsc#1218905 * bsc#1218907 * bsc#1218908 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20932 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20932 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: Updated to version 17.0.10 (January 2024 CPU): * CVE-2024-20918: Fixed an out of bounds access in the Hotspot JVM due to a missing bounds check (bsc#1218907). * CVE-2024-20919: Fixed a sandbox bypass in the Hotspot JVM class file verifier (bsc#1218903). * CVE-2024-20921: Fixed an incorrect optimization in the Hotspot JVM that could lead to corruption of JVM memory (bsc#1218905). * CVE-2024-20932: Fixed an incorrect handling of ZIP files with duplicate entries (bsc#1218908). * CVE-2024-20945: Fixed a potential private key leak through debug logs (bsc#1218909). * CVE-2024-20952: Fixed an RSA padding issue and timing side-channel attack against TLS (bsc#1218911). Find the full release notes at: https://mail.openjdk.org/pipermail/jdk-updates-dev/2024-January/029089.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-325=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-325=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-325=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-325=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-325=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-325=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-325=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-325=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-325=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-325=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-325=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * java-17-openjdk-jmods-17.0.10.0-150400.3.36.1 * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-src-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * openSUSE Leap 15.4 (noarch) * java-17-openjdk-javadoc-17.0.10.0-150400.3.36.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-jmods-17.0.10.0-150400.3.36.1 * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-src-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * openSUSE Leap 15.5 (noarch) * java-17-openjdk-javadoc-17.0.10.0-150400.3.36.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Manager Proxy 4.3 (x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-17-openjdk-demo-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-17.0.10.0-150400.3.36.1 * java-17-openjdk-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-debugsource-17.0.10.0-150400.3.36.1 * java-17-openjdk-debuginfo-17.0.10.0-150400.3.36.1 * java-17-openjdk-headless-17.0.10.0-150400.3.36.1 * java-17-openjdk-devel-debuginfo-17.0.10.0-150400.3.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20932.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218908 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0324-1: moderate: Recommended update for scap-security-guide Message-ID: <170713620747.30139.9529657537375531140@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2024:0324-1 Rating: moderate References: * bsc#1217832 * jsc#ECO-3319 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains one feature and has one fix can now be installed. ## Description: This update for scap-security-guide fixes the following issues: * updated to 0.1.71 (jsc#ECO-3319) * Add RHEL 9 STIG * Add support for Debian 12 * Update PCI-DSS profile for RHEL * lots of bugfixes and improvements for SLE * switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-324=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-324=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-324=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * scap-security-guide-0.1.71-9.21.1 * scap-security-guide-debian-0.1.71-9.21.1 * scap-security-guide-ubuntu-0.1.71-9.21.1 * scap-security-guide-redhat-0.1.71-9.21.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * scap-security-guide-0.1.71-9.21.1 * scap-security-guide-debian-0.1.71-9.21.1 * scap-security-guide-ubuntu-0.1.71-9.21.1 * scap-security-guide-redhat-0.1.71-9.21.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * scap-security-guide-0.1.71-9.21.1 * scap-security-guide-debian-0.1.71-9.21.1 * scap-security-guide-ubuntu-0.1.71-9.21.1 * scap-security-guide-redhat-0.1.71-9.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 12:30:08 -0000 Subject: SUSE-SU-2024:0323-1: critical: Security update for python-uamqp Message-ID: <170713620891.30139.11021067774560851530@smelt2.prg2.suse.org> # Security update for python-uamqp Announcement ID: SUSE-SU-2024:0323-1 Rating: critical References: * bsc#1219409 Cross-References: * CVE-2024-21646 CVSS scores: * CVE-2024-21646 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21646 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-uamqp fixes the following issues: * CVE-2024-21646: Fix integer overflow which may cause remote code execution (bsc#1219409). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-323=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-323=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-323=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-323=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-323=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-uamqp-debuginfo-1.5.3-150100.4.10.1 * python3-uamqp-1.5.3-150100.4.10.1 * python-uamqp-debugsource-1.5.3-150100.4.10.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python3-uamqp-debuginfo-1.5.3-150100.4.10.1 * python3-uamqp-1.5.3-150100.4.10.1 * python-uamqp-debugsource-1.5.3-150100.4.10.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python3-uamqp-debuginfo-1.5.3-150100.4.10.1 * python3-uamqp-1.5.3-150100.4.10.1 * python-uamqp-debugsource-1.5.3-150100.4.10.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-uamqp-debuginfo-1.5.3-150100.4.10.1 * python3-uamqp-1.5.3-150100.4.10.1 * python-uamqp-debugsource-1.5.3-150100.4.10.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-uamqp-debuginfo-1.5.3-150100.4.10.1 * python3-uamqp-1.5.3-150100.4.10.1 * python-uamqp-debugsource-1.5.3-150100.4.10.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21646.html * https://bugzilla.suse.com/show_bug.cgi?id=1219409 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 14:44:45 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 14:44:45 -0000 Subject: SUSE-SU-2023:2882-1: important: Security update for perl Message-ID: <170714428591.9837.16364581268003899936@smelt2.prg2.suse.org> # Security update for perl Announcement ID: SUSE-SU-2023:2882-1 Rating: important References: * bsc#1210999 Cross-References: * CVE-2023-31484 CVSS scores: * CVE-2023-31484 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2023-31484 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for perl fixes the following issues: * CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2882=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2023-2882=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2023-2882=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2882=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2882=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-2882=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-2882=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-2882=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-2882=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2882=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2882=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-2882=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-2882=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2882=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2882=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2882=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2882=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2882=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2882=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2882=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2882=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2882=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2882=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2882=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-2882=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-2882=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-2882=1 ## Package List: * openSUSE Leap 15.3 (x86_64) * perl-32bit-5.26.1-150300.17.14.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-32bit-5.26.1-150300.17.14.1 * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * openSUSE Leap 15.3 (noarch) * perl-doc-5.26.1-150300.17.14.1 * openSUSE Leap 15.3 (aarch64_ilp32) * perl-64bit-5.26.1-150300.17.14.1 * perl-base-64bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-64bit-5.26.1-150300.17.14.1 * perl-64bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-64bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-64bit-5.26.1-150300.17.14.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * openSUSE Leap 15.4 (x86_64) * perl-32bit-5.26.1-150300.17.14.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-32bit-5.26.1-150300.17.14.1 * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * openSUSE Leap 15.4 (noarch) * perl-doc-5.26.1-150300.17.14.1 * openSUSE Leap 15.5 (x86_64) * perl-32bit-5.26.1-150300.17.14.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-32bit-5.26.1-150300.17.14.1 * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * openSUSE Leap 15.5 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * Basesystem Module 15-SP4 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * Basesystem Module 15-SP5 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * Development Tools Module 15-SP4 (noarch) * perl-doc-5.26.1-150300.17.14.1 * Development Tools Module 15-SP5 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Package Hub 15 15-SP4 (x86_64) * perl-debugsource-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-32bit-5.26.1-150300.17.14.1 * SUSE Package Hub 15 15-SP5 (x86_64) * perl-debugsource-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-32bit-5.26.1-150300.17.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Real Time 15 SP3 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * SUSE Manager Proxy 4.2 (x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Manager Server 4.2 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-core-DB_File-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Enterprise Storage 7.1 (noarch) * perl-doc-5.26.1-150300.17.14.1 * SUSE Enterprise Storage 7.1 (x86_64) * perl-base-32bit-5.26.1-150300.17.14.1 * perl-32bit-debuginfo-5.26.1-150300.17.14.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * perl-base-debuginfo-5.26.1-150300.17.14.1 * perl-debuginfo-5.26.1-150300.17.14.1 * perl-debugsource-5.26.1-150300.17.14.1 * perl-5.26.1-150300.17.14.1 * perl-base-5.26.1-150300.17.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31484.html * https://bugzilla.suse.com/show_bug.cgi?id=1210999 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0344-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Message-ID: <170715060201.22288.801539496121578352@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0344-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_24 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-344=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-344=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-3-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-3-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 16:30:04 -0000 Subject: SUSE-SU-2024:0339-1: important: Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP4) Message-ID: <170715060400.22288.12070833732545600874@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 17 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0339-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_15_65 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-339=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-5_14_21-150400_15_65-rt-2-150400.2.1 * kernel-livepatch-5_14_21-150400_15_65-rt-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_17-debugsource-2-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0331-1: important: Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4) Message-ID: <170715060597.22288.13290965108560686406@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0331-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_15_11 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-331=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-332=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-333=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-334=1 SUSE- SLE-Module-Live-Patching-15-SP4-2024-335=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-336=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-337=1 SUSE- SLE-Module-Live-Patching-15-SP4-2024-338=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-345=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-346=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-341=1 SUSE-2024-342=1 SUSE-2024-343=1 SUSE-2024-340=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-341=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-342=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-343=1 SUSE-SLE-Module-Live-Patching-15-SP5-2024-340=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-SLE15-SP4-RT_Update_5-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_15_8-rt-12-150400.2.2 * kernel-livepatch-SLE15-SP4-RT_Update_6-debugsource-9-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_11-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_15_56-rt-3-150400.2.1 * kernel-livepatch-5_14_21-150400_15_11-rt-11-150400.2.2 * kernel-livepatch-5_14_21-150400_15_46-rt-5-150400.2.1 * kernel-livepatch-5_14_21-150400_15_56-rt-debuginfo-3-150400.2.1 * kernel-livepatch-5_14_21-150400_15_40-rt-6-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_3-debugsource-11-150400.2.2 * kernel-livepatch-SLE15-SP4-RT_Update_9-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_15_23-rt-debuginfo-9-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_13-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_15_28-rt-9-150400.2.1 * kernel-livepatch-5_14_21-150400_15_18-rt-10-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_8-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_15_37-rt-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_15_46-rt-debuginfo-5-150400.2.1 * kernel-livepatch-5_14_21-150400_15_8-rt-debuginfo-12-150400.2.2 * kernel-livepatch-5_14_21-150400_15_37-rt-6-150400.2.1 * kernel-livepatch-5_14_21-150400_15_23-rt-9-150400.2.1 * kernel-livepatch-5_14_21-150400_15_18-rt-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_2-debugsource-12-150400.2.2 * kernel-livepatch-5_14_21-150400_15_11-rt-debuginfo-11-150400.2.2 * kernel-livepatch-5_14_21-150400_15_53-rt-4-150400.2.1 * kernel-livepatch-5_14_21-150400_15_40-rt-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_15_53-rt-debuginfo-4-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_7-debugsource-9-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_14-debugsource-3-150400.2.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-6-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-7-150500.3.1 * kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-5-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_11-rt-7-150500.3.1 * kernel-livepatch-5_14_21-150500_13_5-rt-6-150500.2.1 * kernel-livepatch-5_14_21-150500_11-rt-debuginfo-7-150500.3.1 * kernel-livepatch-5_14_21-150500_13_11-rt-5-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-3-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-6-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-7-150500.3.1 * kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-5-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_11-rt-7-150500.3.1 * kernel-livepatch-5_14_21-150500_13_5-rt-6-150500.2.1 * kernel-livepatch-5_14_21-150500_11-rt-debuginfo-7-150500.3.1 * kernel-livepatch-5_14_21-150500_13_11-rt-5-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-3-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 16:30:09 -0000 Subject: SUSE-SU-2024:0329-1: moderate: Security update for python Message-ID: <170715060927.22288.200775058479250860@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2024:0329-1 Rating: moderate References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python fixes the following issues: * CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-329=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-329=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-debuginfo-2.7.18-150000.60.1 * python-idle-2.7.18-150000.60.1 * python-base-2.7.18-150000.60.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.60.1 * python-devel-2.7.18-150000.60.1 * python-tk-2.7.18-150000.60.1 * python-tk-debuginfo-2.7.18-150000.60.1 * libpython2_7-1_0-2.7.18-150000.60.1 * python-2.7.18-150000.60.1 * python-debugsource-2.7.18-150000.60.1 * python-xml-debuginfo-2.7.18-150000.60.1 * python-base-debugsource-2.7.18-150000.60.1 * python-gdbm-2.7.18-150000.60.1 * python-base-debuginfo-2.7.18-150000.60.1 * python-demo-2.7.18-150000.60.1 * python-xml-2.7.18-150000.60.1 * python-curses-2.7.18-150000.60.1 * python-gdbm-debuginfo-2.7.18-150000.60.1 * python-curses-debuginfo-2.7.18-150000.60.1 * openSUSE Leap 15.5 (x86_64) * python-base-32bit-2.7.18-150000.60.1 * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.60.1 * libpython2_7-1_0-32bit-2.7.18-150000.60.1 * python-base-32bit-debuginfo-2.7.18-150000.60.1 * python-32bit-2.7.18-150000.60.1 * python-32bit-debuginfo-2.7.18-150000.60.1 * openSUSE Leap 15.5 (noarch) * python-doc-2.7.18-150000.60.1 * python-doc-pdf-2.7.18-150000.60.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python-debuginfo-2.7.18-150000.60.1 * python-base-2.7.18-150000.60.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.60.1 * python-devel-2.7.18-150000.60.1 * libpython2_7-1_0-2.7.18-150000.60.1 * python-2.7.18-150000.60.1 * python-debugsource-2.7.18-150000.60.1 * python-xml-debuginfo-2.7.18-150000.60.1 * python-base-debugsource-2.7.18-150000.60.1 * python-gdbm-2.7.18-150000.60.1 * python-base-debuginfo-2.7.18-150000.60.1 * python-xml-2.7.18-150000.60.1 * python-curses-2.7.18-150000.60.1 * python-gdbm-debuginfo-2.7.18-150000.60.1 * python-curses-debuginfo-2.7.18-150000.60.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 16:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 16:30:11 -0000 Subject: SUSE-SU-2024:0328-1: important: Security update for runc Message-ID: <170715061121.22288.18437863215250975728@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2024:0328-1 Rating: important References: * bsc#1218894 Cross-References: * CVE-2024-21626 CVSS scores: * CVE-2024-21626 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for runc fixes the following issues: * Update to runc v1.1.12 (bsc#1218894) The following CVE was already fixed with the previous release. * CVE-2024-21626: Fixed container breakout. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 12 zypper in -t patch SUSE-SLE-Module-Containers-12-2024-328=1 ## Package List: * Containers Module 12 (ppc64le s390x x86_64) * runc-debuginfo-1.1.12-16.46.1 * runc-1.1.12-16.46.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21626.html * https://bugzilla.suse.com/show_bug.cgi?id=1218894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 16:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 16:30:13 -0000 Subject: SUSE-SU-2024:0327-1: important: Security update for bouncycastle, jsch Message-ID: <170715061315.22288.16905029894743112915@smelt2.prg2.suse.org> # Security update for bouncycastle, jsch Announcement ID: SUSE-SU-2024:0327-1 Rating: important References: * bsc#1218134 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for bouncycastle, jsch fixes the following issues: * Updated jsch to version 0.2.15: * CVE-2023-48795: Fixed a prefix truncation issue that could lead to disclosure of sensitive information (bsc#1218134). * Updated bouncycastle to version 1.77. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-327=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-327=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-327=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-327=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-327=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-327=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-327=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-327=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-327=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-327=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-327=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-327=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-327=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-327=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-327=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Enterprise Storage 7.1 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * openSUSE Leap 15.5 (noarch) * bouncycastle-mail-1.77-150200.3.24.1 * bouncycastle-1.77-150200.3.24.1 * bouncycastle-tls-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-jmail-1.77-150200.3.24.1 * bouncycastle-javadoc-1.77-150200.3.24.1 * jsch-javadoc-0.2.15-150200.11.13.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * jsch-demo-0.2.15-150200.11.13.1 * Development Tools Module 15-SP5 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * bouncycastle-1.77-150200.3.24.1 * bouncycastle-util-1.77-150200.3.24.1 * bouncycastle-pkix-1.77-150200.3.24.1 * bouncycastle-pg-1.77-150200.3.24.1 * jsch-0.2.15-150200.11.13.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218134 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 20:30:05 -0000 Subject: SUSE-SU-2024:0348-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) Message-ID: <170716500505.8999.16318455969818027360@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0348-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_18 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-348=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-348=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-4-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-4-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-4-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-4-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 5 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Feb 2024 20:30:07 -0000 Subject: SUSE-SU-2024:0347-1: important: Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) Message-ID: <170716500719.8999.15579116268761177103@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0347-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_27 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-347=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-349=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-349=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-5_14_21-150400_15_62-rt-2-150400.2.1 * kernel-livepatch-5_14_21-150400_15_62-rt-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_16-debugsource-2-150400.2.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-2-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-2-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-2-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-2-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-2-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0351-1: important: Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP4) Message-ID: <170722260273.3917.15846325350276973520@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0351-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_15_59 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-351=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-5_14_21-150400_15_59-rt-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4-RT_Update_15-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_15_59-rt-2-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0362-1: important: Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP1) Message-ID: <170723700274.12220.17388901109709440455@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP1) Announcement ID: SUSE-SU-2024:0362-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-150100_197_142 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-362=1 SUSE-SLE-Live- Patching-12-SP5-2024-361=1 SUSE-SLE-Live-Patching-12-SP5-2024-367=1 SUSE-SLE- Live-Patching-12-SP5-2024-368=1 SUSE-SLE-Live-Patching-12-SP5-2024-360=1 * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-359=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_183-default-3-2.1 * kgraft-patch-4_12_14-122_156-default-9-2.1 * kgraft-patch-4_12_14-122_153-default-9-2.1 * kgraft-patch-4_12_14-122_165-default-6-2.1 * kgraft-patch-4_12_14-122_159-default-8-2.1 * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_142-default-9-150100.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 16:30:04 -0000 Subject: SUSE-SU-2024:0358-1: important: Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) Message-ID: <170723700497.12220.2718727558853259625@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0358-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_133 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-358=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-357=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-365=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-356=1 SUSE- SLE-Module-Live-Patching-15-SP2-2024-355=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-354=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-353=1 SUSE-2024-366=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-366=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-353=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_39-debugsource-5-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_40-debugsource-4-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_41-debugsource-4-150200.2.1 * kernel-livepatch-5_3_18-150200_24_157-default-6-150200.2.1 * kernel-livepatch-5_3_18-150200_24_145-default-debuginfo-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_154-default-7-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_34-debugsource-10-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_38-debugsource-6-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_37-debugsource-7-150200.2.1 * kernel-livepatch-5_3_18-150200_24_163-default-debuginfo-4-150200.2.1 * kernel-livepatch-5_3_18-150200_24_166-default-4-150200.2.1 * kernel-livepatch-5_3_18-150200_24_154-default-debuginfo-7-150200.2.1 * kernel-livepatch-5_3_18-150200_24_160-default-debuginfo-5-150200.2.1 * kernel-livepatch-5_3_18-150200_24_163-default-4-150200.2.1 * kernel-livepatch-5_3_18-150200_24_157-default-debuginfo-6-150200.2.1 * kernel-livepatch-5_3_18-150200_24_160-default-5-150200.2.1 * kernel-livepatch-5_3_18-150200_24_145-default-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_166-default-debuginfo-4-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_133-default-4-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_36-debugsource-4-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_33-debugsource-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-default-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-default-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-default-7-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_133-preempt-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-preempt-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-preempt-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-preempt-7-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_133-default-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-default-7-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 16:30:07 -0000 Subject: SUSE-SU-2024:0352-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) Message-ID: <170723700742.12220.5677099826126839172@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0352-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_19 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-352=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-352=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-5-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_3-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-5-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-5-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_3-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-5-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 16:30:12 -0000 Subject: SUSE-RU-2024:0363-1: moderate: Recommended update for s390-tools Message-ID: <170723701204.12220.12034515079699887328@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2024:0363-1 Rating: moderate References: * bsc#1214466 * bsc#1214534 * bsc#1216257 * bsc#1217838 * bsc#1217923 * bsc#1219227 * jsc#PED-4604 * jsc#PED-578 * jsc#PED-5783 * jsc#PED-6373 * jsc#PED-6539 * jsc#PED-6649 * jsc#PED-6785 * jsc#PED-7136 * jsc#PED-7138 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains nine features and has six fixes can now be installed. ## Description: This update for s390-tools fixes the following issues: * Applied patch for (jsc#PED-6539, jsc#PED-6373) * Updated read_values.c (bsc#1214466, bsc#1214534) * Updated SUSE's tools and their corresponding man pages (bsc#1216257) * Updated cputype script * IBM s390-tools version 2.30 build errors and warnings (bsc#1217838) * [Build 44.1] SCC registration failed: RuntimeError: ExecuteError (bsc#1217923) * [SLEM][6.0][Build10.15][s390x] Many kernel errors and systemd-coredump in journal log (bsc#1219227) * Impl: DASD autoquiesce support - s390-tools part (jsc#PED-4604) * Impl: [Post GA] Provide s390-tools on x86_64 to enable Secure Execution in the Cloud (jsc#PED-578) * Impl: Userspace Tool for IBK Request Generation and Insertion (s390-tools) (jsc#PED-5783) * Impl: Support AP related data in SE Header (s390-tools) (jsc#PED-6649) * Impl: Secure Execution - Secure guest tool to bind and associate APQNs (s390-tools) (jsc#PED-6785) * Impl: Provide s390-tools on x86_64 to enable Secure Execution in the Cloud (jsc#PED-7136) * Impl: Provide s390-tools on x86_64 to enable Secure Execution in the Cloud (jsc#PED-7138) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-363=1 openSUSE-SLE-15.5-2024-363=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-363=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-363=1 ## Package List: * openSUSE Leap 15.5 (s390x x86_64) * s390-tools-debugsource-2.30.0-150500.9.10.1 * s390-tools-debuginfo-2.30.0-150500.9.10.1 * s390-tools-2.30.0-150500.9.10.1 * openSUSE Leap 15.5 (s390x) * s390-tools-hmcdrvfs-2.30.0-150500.9.10.1 * s390-tools-zdsfs-debuginfo-2.30.0-150500.9.10.1 * s390-tools-chreipl-fcp-mpath-2.30.0-150500.9.10.1 * libekmfweb1-devel-2.30.0-150500.9.10.1 * s390-tools-hmcdrvfs-debuginfo-2.30.0-150500.9.10.1 * libekmfweb1-2.30.0-150500.9.10.1 * libekmfweb1-debuginfo-2.30.0-150500.9.10.1 * libkmipclient1-2.30.0-150500.9.10.1 * s390-tools-zdsfs-2.30.0-150500.9.10.1 * libkmipclient1-devel-2.30.0-150500.9.10.1 * osasnmpd-debuginfo-2.30.0-150500.9.10.1 * libkmipclient1-debuginfo-2.30.0-150500.9.10.1 * osasnmpd-2.30.0-150500.9.10.1 * SUSE Linux Enterprise Micro 5.5 (s390x) * libkmipclient1-debuginfo-2.30.0-150500.9.10.1 * libekmfweb1-2.30.0-150500.9.10.1 * libekmfweb1-debuginfo-2.30.0-150500.9.10.1 * libkmipclient1-2.30.0-150500.9.10.1 * SUSE Linux Enterprise Micro 5.5 (s390x x86_64) * s390-tools-debugsource-2.30.0-150500.9.10.1 * s390-tools-debuginfo-2.30.0-150500.9.10.1 * s390-tools-2.30.0-150500.9.10.1 * Basesystem Module 15-SP5 (s390x) * s390-tools-hmcdrvfs-2.30.0-150500.9.10.1 * s390-tools-zdsfs-debuginfo-2.30.0-150500.9.10.1 * s390-tools-chreipl-fcp-mpath-2.30.0-150500.9.10.1 * libekmfweb1-devel-2.30.0-150500.9.10.1 * s390-tools-hmcdrvfs-debuginfo-2.30.0-150500.9.10.1 * libekmfweb1-2.30.0-150500.9.10.1 * libekmfweb1-debuginfo-2.30.0-150500.9.10.1 * libkmipclient1-2.30.0-150500.9.10.1 * s390-tools-zdsfs-2.30.0-150500.9.10.1 * osasnmpd-debuginfo-2.30.0-150500.9.10.1 * libkmipclient1-debuginfo-2.30.0-150500.9.10.1 * osasnmpd-2.30.0-150500.9.10.1 * Basesystem Module 15-SP5 (s390x x86_64) * s390-tools-debugsource-2.30.0-150500.9.10.1 * s390-tools-debuginfo-2.30.0-150500.9.10.1 * s390-tools-2.30.0-150500.9.10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214466 * https://bugzilla.suse.com/show_bug.cgi?id=1214534 * https://bugzilla.suse.com/show_bug.cgi?id=1216257 * https://bugzilla.suse.com/show_bug.cgi?id=1217838 * https://bugzilla.suse.com/show_bug.cgi?id=1217923 * https://bugzilla.suse.com/show_bug.cgi?id=1219227 * https://jira.suse.com/browse/PED-4604 * https://jira.suse.com/browse/PED-578 * https://jira.suse.com/browse/PED-5783 * https://jira.suse.com/browse/PED-6373 * https://jira.suse.com/browse/PED-6539 * https://jira.suse.com/browse/PED-6649 * https://jira.suse.com/browse/PED-6785 * https://jira.suse.com/browse/PED-7136 * https://jira.suse.com/browse/PED-7138 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0378-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) Message-ID: <170725140330.14537.3798204159449727142@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0378-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_28 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-378=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-378=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-379=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-379=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_19-debugsource-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-3-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_19-debugsource-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-3-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_5-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-4-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_5-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-4-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 20:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 20:30:06 -0000 Subject: SUSE-SU-2024:0373-1: important: Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5) Message-ID: <170725140622.14537.15070940724160201300@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:0373-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_147 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-373=1 SUSE-SLE-Live- Patching-12-SP5-2024-374=1 SUSE-SLE-Live-Patching-12-SP5-2024-375=1 SUSE-SLE- Live-Patching-12-SP5-2024-372=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_176-default-4-2.1 * kgraft-patch-4_12_14-122_162-default-7-2.1 * kgraft-patch-4_12_14-122_147-default-11-2.2 * kgraft-patch-4_12_14-122_173-default-5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 20:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 20:30:09 -0000 Subject: SUSE-SU-2024:0377-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP1) Message-ID: <170725140913.14537.6056269250894224394@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP1) Announcement ID: SUSE-SU-2024:0377-1 Rating: important References: * bsc#1210619 Cross-References: * CVE-2023-1829 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-150100_197_168 fixes one issue. The following security issue was fixed: * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-377=1 * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-370=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_189-default-2-2.1 * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_168-default-2-150100.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 6 20:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Feb 2024 20:30:10 -0000 Subject: SUSE-SU-2024:0376-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) Message-ID: <170725141088.14537.16692913555203069409@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:0376-1 Rating: important References: * bsc#1210619 * bsc#1218255 Cross-References: * CVE-2023-1829 * CVE-2023-6932 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_172 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-369=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-371=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-376=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_165-default-2-150100.2.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_43-debugsource-2-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-2-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-2-150200.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_186-default-2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 08:30:03 -0000 Subject: SUSE-SU-2024:0395-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) Message-ID: <170729460362.22586.17639559353268061709@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0395-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_31 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-395=1 SUSE-2024-396=1 SUSE-2024-397=1 SUSE-2024-398=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-398=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-395=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-396=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-397=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-402=1 SUSE-2024-403=1 SUSE-2024-405=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-402=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-403=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-405=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_63-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_14-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_60-default-debuginfo-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_11-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_63-default-debuginfo-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_12-debugsource-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_15-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_60-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-6-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_63-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_14-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_60-default-debuginfo-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_11-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_63-default-debuginfo-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_12-debugsource-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_15-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_60-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-6-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_12-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-3-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-debuginfo-7-150500.3.1 * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_0-debugsource-7-150500.3.1 * kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-6-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_6-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-7-150500.3.1 * kernel-livepatch-SLE15-SP5_Update_2-debugsource-6-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_12-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-3-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-debuginfo-7-150500.3.1 * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_0-debugsource-7-150500.3.1 * kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-6-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_6-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-7-150500.3.1 * kernel-livepatch-SLE15-SP5_Update_2-debugsource-6-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 08:30:06 -0000 Subject: SUSE-SU-2024:0394-1: important: Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) Message-ID: <170729460675.22586.3388333672972653502@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0394-1 Rating: important References: * bsc#1210619 Cross-References: * CVE-2023-1829 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_147 fixes one issue. The following security issue was fixed: * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-394=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-394=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_147-default-2-150300.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-2-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_40-debugsource-2-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-2-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 08:30:08 -0000 Subject: SUSE-SU-2024:0393-1: important: Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) Message-ID: <170729460882.22586.10518015720388965224@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0393-1 Rating: important References: * bsc#1210619 * bsc#1218255 Cross-References: * CVE-2023-1829 * CVE-2023-6932 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_144 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-393=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-393=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_39-debugsource-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-debuginfo-2-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_144-preempt-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-preempt-debuginfo-2-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_144-default-2-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 08:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 08:30:11 -0000 Subject: SUSE-SU-2024:0389-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) Message-ID: <170729461133.22586.2256376872534598485@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0389-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_112 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-400=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-389=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-387=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-388=1 SUSE-2024-390=1 SUSE-2024-404=1 SUSE-2024-391=1 SUSE-2024-392=1 SUSE-2024-401=1 SUSE-2024-406=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-388=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-390=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-404=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-391=1 SUSE- SLE-Module-Live-Patching-15-SP3-2024-392=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-401=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-406=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_35-debugsource-9-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_36-debugsource-9-150200.2.1 * kernel-livepatch-5_3_18-150200_24_148-default-debuginfo-9-150200.2.1 * kernel-livepatch-5_3_18-150200_24_151-default-9-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_33-debugsource-11-150200.2.2 * kernel-livepatch-5_3_18-150200_24_142-default-debuginfo-11-150200.2.2 * kernel-livepatch-5_3_18-150200_24_148-default-9-150200.2.1 * kernel-livepatch-5_3_18-150200_24_142-default-11-150200.2.2 * kernel-livepatch-5_3_18-150200_24_151-default-debuginfo-9-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_121-default-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-default-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-default-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-default-debuginfo-11-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_31-debugsource-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-default-11-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_29-debugsource-11-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_32-debugsource-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-default-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_37-debugsource-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-default-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-default-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_138-default-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_118-default-debuginfo-9-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_28-debugsource-12-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_34-debugsource-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_38-debugsource-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_118-default-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-default-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-debuginfo-3-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_112-preempt-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_118-preempt-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-preempt-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-preempt-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-preempt-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-preempt-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-preempt-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-preempt-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_141-preempt-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-preempt-debuginfo-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_121-preempt-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-preempt-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_141-preempt-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_118-preempt-9-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_118-default-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-default-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_112-default-11-150300.2.2 * kernel-livepatch-5_3_18-150300_59_121-default-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-default-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-default-6-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 08:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 08:30:13 -0000 Subject: SUSE-SU-2024:0380-1: important: Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP5) Message-ID: <170729461343.22586.10096537766566889018@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 40 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:0380-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_150 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-380=1 SUSE-SLE- Module-Live-Patching-15-SP1-2024-384=1 SUSE-SLE-Module-Live- Patching-15-SP1-2024-385=1 SUSE-SLE-Module-Live-Patching-15-SP1-2024-381=1 SUSE- SLE-Module-Live-Patching-15-SP1-2024-382=1 SUSE-SLE-Module-Live- Patching-15-SP1-2024-386=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-383=1 SUSE-SLE-Live- Patching-12-SP5-2024-399=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_145-default-9-150100.2.1 * kernel-livepatch-4_12_14-150100_197_154-default-5-150100.2.1 * kernel-livepatch-4_12_14-150100_197_151-default-6-150100.2.1 * kernel-livepatch-4_12_14-150100_197_157-default-4-150100.2.1 * kernel-livepatch-4_12_14-150100_197_148-default-7-150100.2.1 * kernel-livepatch-4_12_14-150100_197_137-default-9-150100.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_150-default-11-2.2 * kgraft-patch-4_12_14-122_179-default-3-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 12:30:05 -0000 Subject: SUSE-SU-2024:0410-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2) Message-ID: <170730900519.23526.6890897439170139961@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:0410-1 Rating: important References: * bsc#1210619 Cross-References: * CVE-2023-1829 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_175 fixes one issue. The following security issue was fixed: * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-410=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_175-default-2-150200.2.1 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-2-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_44-debugsource-2-150200.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 12:30:07 -0000 Subject: SUSE-SU-2024:0409-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Message-ID: <170730900700.23526.12161717562476740342@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0409-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_36 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-409=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-407=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-407=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP2_Update_42-debugsource-3-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-3-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-3-150200.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_7-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_7-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-2-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 12:30:09 -0000 Subject: SUSE-RU-2024:0408-1: moderate: Recommended update for podman Message-ID: <170730900924.23526.9390151316192710072@smelt2.prg2.suse.org> # Recommended update for podman Announcement ID: SUSE-RU-2024:0408-1 Rating: moderate References: * bsc#1217828 Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for podman fixes the following issues: * Update to version 4.8.3: * Update RELEASE_NOTES.md * update module golang.org/x/crypto [security] * Error on HyperV VM start when gvproxy has failed to start * Refactor network backend dependencies: * podman requires either netavark or cni-plugins. On ALP, require netavark, otherwise prefer netavark but don't force it. * This fixes missing cni-plugins in some scenarios * Default to netavark everywhere where it's available * Update to version 4.8.2: * Update RELEASE_NOTES.md * Kube Play - set ReportWriter when building an image * Fix user-mode net init flag on first time install * Default to the new networking backend, netavark, on openSUSE (bsc#1217828) * Update to version 4.8.1: * Handle symlinks when checking DB vs runtime configs * libpod: Detect whether we have a private UTS namespace on FreeBSD * pkg/bindings: add new APIVersionError error type * fix podman-remote exec regression with v4.8 * sqlite: fix issue in ValidateDBConfig() * sqlite: fix missing Commit() in RemovePodContainers() * sqlite: set busy timeout to 100s * Fix locking error in WSL machine rm -f * Gating test fixes * If API calls for kube play --replace, then replace pod * Fix wsl.conf generation when user-mode-networking is disabled * Update to version 4.8.0: * Bump to Buildah v1.33.2 * [CI:DOCS] Update release notes * machine applehv: create better error on start failure * Cirrus: Update operating branch * rootless_tutorial: modernize * Update to libhvee 0.5.0 * vmtypes names cannot be used as machine names * Add support for --compat-auth-file in login/logout * Update tests for a c/common error message change * Update c/image and c/common to latest, c/buildah to main * CI: test overlay and vfs * [CI:DOCS] Add link to podman py docs * Test fixes for debian * pasta tests: remove some skips * VM images: bump to 2023-11-16 * fix(deps): update module k8s.io/kubernetes to v1.28.4 [security] * [CI:DOCS] Machine test timeout env var * Quadlet - add support for UID and GID Mapping * Quadlet - Allow using symlink on the base search paths * [skip-ci] Update dessant/lock-threads action to v5 * Avoid empty SSH keys on applehv * qemu,parseUSB: minor refactor * fix(deps): update module github.com/gorilla/handlers to v1.5.2 * docs: fix relabeling command * Pass secrets from the host down to internal podman containers * (Temporary) Emergency CI fix: quay search is broken * Update podman-stats.1.md.in * [CI:BUILD] packit: handle builds for RC releases * Quadlet test - add case for multi = sign in mount * set RLIMIT_NOFILE soft limit to match the hard limit on mac * rootless: use functionalities from c/storage * CI: e2e: fix a smattering of test bugs that slipped in * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.13.1 * vendor: update c/storage * Improve the documentation of quadlet * Fix socket mapping socket mapping nits * fix(deps): update module golang.org/x/tools to v0.15.0 * fix(deps): update github.com/containers/libhvee digest to 9651e31 * [skip-ci] Update github/issue-labeler action to v3.3 * Document --userns=auto behaviour for rootless users * machine: qemu: add usb host passthrough * fix(deps): update module golang.org/x/net to v0.18.0 * fix(deps): update module github.com/onsi/gomega to v1.30.0 * Refactor Ignition configuration for virt providers * [CI:BUILD] rpm: disable GOPROXY * Automatic code cleanups [JetBrains] * Refactor key machine objects * systests: add [NNN] prefix in logs, NNN = filename * systests: add a last-minute check for db backend * applehv: allow virtiofs to mount to root * Run codespell on podman * update completion scripts for cobra v1.8.0 * Fix man page display of podman-kube-generate * Try to fix the broken formatting of man podman-kube-apply(1). * fix(deps): update module golang.org/x/text to v0.14.0 * docs: make CNI removal explicit * fix(deps): update module github.com/gorilla/mux to v1.8.1 * fix(deps): update module github.com/spf13/cobra to v1.8.0 * fix(deps): update module golang.org/x/sync to v0.5.0 * fix(deps): update module github.com/mattn/go-sqlite3 to v1.14.18 * Podman push --help should reveal default compression * Update container-device-interface (CDI) to v0.6.2 * fix: adjust helper string in machine_common * fix: adjust helper string in machine_common * remote,test: remove .dockerignore which is a symlink * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.2 * fix: adjust helper string in machine_common * vendor: update github.com/coreos/go-systemd/v22 to latest main * CI: default to sqlite * vendor: update c/common * check system connections before machine init * Consume OCI images for machine image * freebsd: drop dead code * libpod: make removePodCgroup linux specific * containers: drop special handling for ErrCgroupV1Rootless * compose: fix compose provider debug message * image: replace GetStoreImage with ResolveReference * vendor: bump c/image to 373c52a9466f * Refactor machine socket mapping * AppleHV: Fix machine rm error message * Add status messages to podman --remote commit * End-of-Life policy for github issues * fix(deps): update module github.com/shirou/gopsutil/v3 to v3.23.10 * Support passing of Ulimits as -1 to mean max * fix(deps): update github.com/docker/go-connections digest to 0b8c1f4 * fix(deps): update github.com/crc-org/vfkit digest to f3c783d * Log gvproxy and server9 to file on log-level=debug * Change to using gopsutil for cross-OS process ops * Initial addition of 9p code to Podman * libpod: fix /etc/hostname with --uts=host * systests: stty test: retry once on flake * systests: pasta: avoid hangs * Fix secrets scanning GHA Workflow * [skip-ci] Update dawidd6/action-send-mail action to v3.9.0 * docs: clarify systemd cgroup mount * podman build --remote URI Dockerfile shoud not be treated as file * Small fixes for wacko CI environments * Do not add powercap mask if no paths are masked * compose: try all possible providers before throwing an error * podman kube play --replace should force removal of pods and containers * Sort kube options alphabetically * container.conf: support attributed string slices * CI: podman farm tests cleanup * Mask /sys/devices/virtual/powercap * Update module github.com/google/uuid to v1.4.0 * fix(deps): update module github.com/docker/docker to v24.0.7+incompatible * fix(deps): update module go.etcd.io/bbolt to v1.3.8 * CI: systest: safer random_rfc1918_subnet * CI: e2e: safer GetPort() * Fix broken code block markup in Introduction.rst * chore(deps): update module google.golang.org/grpc to v1.57.1 [security] * chore: remove npipe const and use vmtype const for checking * Update module github.com/onsi/gomega to v1.29.0 * CI: try to fix more networking flakes * fix: check wsl npipe when executing podman compose * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.1 * Quadlet - explicit support for read-only-tmpfs * compat API: fix image-prune --all * Makefile - allow more control over Ginkgo parameters * Add e2e tests for farm build * vendor c/{buildah,common}: appendable containers.conf strings, Part 1 * Add podman farm build command * Add emulation package * Use buildah default isolation when working with podman play kube * docs(API): Fix compat network (dis-)connect * test/e2e: do not import buildah * pkg/specgen: remove config_unsupported.go * pkg/parallel/ctr: add !remote tag * pkg/domain/filters: add !remote tag * pkg/ps: add !remote tag * pkg/systemd/generate: add !remote tag * libpod: add !remote tag * pkg/autoupdate: add !remote tag * vendor latest c/common * libpod: remove build support non linux/freebsd * Fix typo * test/apiv2: adapt apiv2 test on cgroups v1 environment * ginkgo setup: retry cache pulls * Support size option when creating tmpfs volumes * not mounted layers should be reported as info not error * CI: stop using registry.k8s.io * fix(deps): update module github.com/vbatts/git-validation to v1.2.1 * test fixes for c/common tag chnages * vendor latest c/common * hyperV: Update lastUp time * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.0 * lint: disable testifylint * lint: fix warnings found by perfsprint * lint: fix warnings found by inamedparam * lint: fix warnings found by protogetter * libpod: skip DBUS_SESSION_BUS_ADDRESS in conmon * Use node hostname in kube play when hostNetwork=true * cirrus setup: special-case perl unicode * network: document ports and macvlan interaction * quadlet: document cgroupv2 requirement * [skip-ci] Update actions/checkout digest to b4ffde6 * Revert "Emergency workaround for CI breakage" * remote: exec: do not leak session IDs on errors * fix(deps): update github.com/containers/storage digest to 79aa304 * fix(deps): update module k8s.io/kubernetes to v1.28.3 * System tests: fix broken silence127 * Add TERM iff TERM not defined in container when podman exec -t * Emergency workaround for CI breakage * Kill gvproxy when machine rm -f * Fix path for omvf vars on Darwin/arm64 * Allow systemd specifiers in User and Group Quadlet keys * libpod: rename confusing import name * use FindInitBinary() for init binary * vendor latest c/common * exec: do not leak session IDs on errors * systests: cp test: lots of cleanup * Define better error message for container name conflicts with external storage. * Quadlet - support ImageName for .image files * test/system: ignore 127 if it is the expected rc * test/apiv2/20-containers.at: fix NanoCPUs tests on cgroups v1 * image history: fix walking layers * fix(api): Ensure compatibality for network connect * [CI:DOCS] Add cross-build target info. * machine set: document --rootful better * libpod: restart+userns cleanup netns correctly * Minor log and doc fixes * Quadlet man page - discuss volume removal explicitly * Quadlet - add support for KubeDownForce * System Test - Quadlet kube oneshot * Fix output of podman --remote top * buildah-bud: test relative TMPDIR * Fix handling of --read-only-tmpfs flag * Vendor common and buildah main * remote,build: wire unsetlabels * test: build with TMPDIR as relative * docs: add unsetlabel * vendor: bump buildah to v1.32.1-0.20231012130144-244170240d85 * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.6.2 * fix: pull error response docker rest api compatibility * Show client info even if remote connection fails * fix(deps): update github.com/containers/libhvee digest to e51be96 * Run codespell * SetLock for all virt providers * Machine: Teardown on init failure * healthcheck: make sure to always show health_status events * Apply suggestions from code review * [CI:DOCS]rtd: implement v2 build file * Quadlet - support oneshot .kube files * libpod: fix deadlock while parallel container create * fix(deps): update module golang.org/x/net to v0.17.0 * api: add `compatMode` paramenter to libpod's pull endpoint * api: break out compat image pull * fix(deps): update module github.com/cpuguy83/go-md2man/v2 to v2.0.3 * use sqlite as default database * vendor latest c/common * fix(deps): update module github.com/nxadm/tail to v1.4.11 * Check for image with /libpod/containers/create * container: always check if mountpoint is mounted * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.13.0 * vendor: update c/storage * api: drop debug statement * Quadlet - add support for global arguments * Add system test * fix(deps): update module golang.org/x/tools to v0.14.0 * Don't ignore containerfiles outside of build context * fix(deps): update github.com/containers/libhvee digest to fcf1cc2 * fix(deps): update module golang.org/x/term to v0.13.0 * Update module golang.org/x/sys to v0.13.0 * [CI:DOCS] Add updating version on podman.io to release process * containers.conf: add `privileged` field to containers table * Implement secrets/credential scanning * Cirrus: Execute Windows podman-machine e2e tests * vendor: bump c/storage * Update module golang.org/x/sync to v0.4.0 * [CI:DOCS] update swagger version on docs.podman.io * Create Qemu command wrapper * Adjust to path name change for resolved unit * Revert "Fix WSL systemd detection" * [CI:BUILD] rpm/copr: gvforwarder recommends for RHEL * [CI:DOCS] update kube play delete endpoint docs * [CI:DOCS] Remove dead link from README * test/system: --env-file test fixes * Revert "feat(env): support multiline in env-file" * Revert "docs(env-file): improve document description" * Revert "fix(env): parsing --env incorrect in cli" * Filter health_check and exec events for logging in console * inspect: ignore ENOENT during device lookup * test, manifest: test push retry * Fix locale issues with WSL version detection * vendor: update module github.com/docker/distribution to v2.8.3+incompatible * vendor: bump c/common to v0.56.1-0.20231002091908-745eaa498509 * Update github.com/containers/libhvee digest to e9b1811 * windows: Use prebuilt gvproxy/win-sshproxy binaries * Volume create - fast exit when ignore is set and volume exists * Update golang.org/x/exp digest to 9212866 * Update github.com/opencontainers/runtime-spec digest to c0e9043 * remove selinux tag as not needed anymore * [skip-ci] Improve podmansh(1) * Build applehv for Intel Macs * Revert "GHA Workflow: Faster discussion-locking" * update vfkit vendored code * Add DefaultMode to kube play * Fix broken podman images filters * Remove `c.ExtraFiles` line in machine * podman: run --replace prints only the new container id * New machines should show Never as LastUp * podman machine: disable zincati update service * Revert "cirrus setup: install en_US.UTF-8 locale" * Cirrus: CI VM images w/ newer automation-library * CI VMs: bump to f39 + f38 * [CI:DOCS] Update podman load doc * Update mac installer to latest gvproxy release * Fix WSL systemd detection * Add documentation for the vrf option on netavark * fix(deps): update github.com/containers/common digest to 9342cdd * fix: typos in links, path and code example * e2e: ExitCleanly(): manual special cases * e2e: ExitCleanly(): the final fron^Wcommit * [CI:DOCS] Add win-sshproxy target to winmake * wsl: enable machine init tests * Update docs/source/markdown/options/rdt-class.md * move IntelRdtClosID to HostConfig * use default when user does not provide rdt-class * Add documentation for Intel RDT support * Add test for Intel RDT support * Add Intel RDT support * [CI:DOCS] Fix podman form update --help examples * Quadlet container mount - support non key=val options * test/e2e: default to netavark * [skip-ci] Update dawidd6/action-send-mail action to v3.9.0 * fix(deps): update module github.com/containers/gvisor-tap-vsock to v0.7.1 * fix(deps): update github.com/containers/common digest to 4619314 * applehv: enable machine tests for start * applehv: machine tests for stop and rm * Update machine tests README * Add podman socket info to machine inspect * Fix podman machine info test for hyperV * libpod: pass entire environment to conmon * e2e: ExitCleanly(): manual fixes to get tests working * e2e: ExitCleanly(): a few more * FCOS+podman-next: correct GHA conditional syntax * pkg/machine/e2e: wsl stop * wsl: machine tests for inspect * wsl: machine tests for ssh * fix(deps): update github.com/containers/common digest to e18cda8 * wsl: machine start test * wsl machine tests: set * wsl: machine tests * Skip proxy test for hyperV * Enable machine e2e test for applehv * hyperV: Respect rootful option on machine init * [CI:BUILD] FCOS image: enable nightly build * e2e: use safe fedora-minimal image * hyperv: machine e2e tests for set command * podman build: correct default pull policy * fix handling of static/volume dir * unbreak CI: useradd not found * hyperv: set more realistic starting state * hyperv: use StopWithForce with remove * Fix all ports exposed by kube play * Fix setting timezone on HyperV * fix(deps): update github.com/containers/gvisor-tap-vsock digest to 97028a6 * Fix farm update to check for connections * Adjust machine CPU tests * Bump version on main * [CI:BUILD] Packit: show SHORT_SHA in `podman --version` for COPR builds * Vendor c/common * pod rm: do not log error if anonymous volume is still used * e2e: ExitCleanly(): manual fixes to get tests passing * e2e: ExitCleanly(): a few more * fixes for pkg/machine/e2e on hyperv * test: fix rootless propagation test * [CI:BUILD] packit: tag @containers/packit-build team on copr build failures * Enable disk resizing for applehv * Various updates for hyperv and machine e2e tests * test: update fedoraMinimal version * specgen, rootless: fix mount of cgroup without a netns * Automatically remove anonymous volumes when removing a container * Use ActiveServiceDestination in ssh remoteConnectionUsername * fix(deps): update github.com/containers/gvisor-tap-vsock digest to 9298405 * e2e: ExitCleanly(): generate_kube_test.go * e2e: generate kube -> kube generate * e2e: ExitCleanly(): generate_kube_test.go * windows cannot "do" extra files * e2e: ExitCleanly(): Fixes for breaking tests * play kube -> kube play * e2e: ExitCleanly(): play_kube_test.go * introduce pkg/strongunits * Makefile equiv Powershell script * pass --syslog to the cleanup process * vendor of containers/common * fix --authfile auto-update test * compat API: speed up network list * Change priority for cli-flags for remotely operating Podman * libpod: remove unused ContainerState() fucntion * [CI:BUILD] Packit: Enable failure notifications for cockpit tests * e2e: ExitCleanly(): more low-hanging fruit * e2e: ExitCleanly(): more low-hanging fruit * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.12.1 * Enable machine e2e tests for WSL * systests: tighter checks for unwanted warnings * GHA Workflow: Faster discussion-locking * [CI:BUILD] FCOS + podman-next image: pull in wasm * [CI:BUILD] rpm: remove gvproxy subpackage * [CI:DOCS] Tweak podman to Podman in a few farm man pages * Docs on sig-proxy are wrong, we support TTY * e2e: ExitCleanly(): low-hanging fruit, part 2 * e2e: ExitCleanly(): low-hanging fruit, part 1 * Buildtag out unix commands for common OS files * systests: clean up after tests; fix missing path in logs * [CI:BUILD] followup PR for fcos with podman-next * Implement gvproxy networking using cmdline wrapper * fix, test: rmi should work with images w/o layers * vendor: bump c/common to v0.56.1-0.20230919073449-d1d9d38d8282 * Quadlet Image test - rearrange test function * e2e: continuing ExitCleanly() work: manual tweaks * e2e: continuing ExitCleanly() work * [CI:DOCS] Improve podman-tag man page * [CI:DOCS] Improve podman-build man page * [CI:DOCS] Include precheck to release process * [CI:DOCS] consistentize filter options in man pages * Quadlet - add support for .image units * \--env-host: use default from containers.conf * error when --module is specified on the command level * man page crossrefs: add --filter autocompletes * Fix specification of unix:///run * Add label! filter and tests to containers and pods * Add test for legacy address without two slashes * Use url with scheme and path for the unix address * Use crun only on selected archs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-408=1 SUSE-2024-408=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-408=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-408=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * podman-debuginfo-4.8.3-150500.3.6.1 * podman-remote-debuginfo-4.8.3-150500.3.6.1 * podmansh-4.8.3-150500.3.6.1 * podman-4.8.3-150500.3.6.1 * podman-remote-4.8.3-150500.3.6.1 * openSUSE Leap 15.5 (noarch) * podman-docker-4.8.3-150500.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * podman-debuginfo-4.8.3-150500.3.6.1 * podman-remote-debuginfo-4.8.3-150500.3.6.1 * podmansh-4.8.3-150500.3.6.1 * podman-4.8.3-150500.3.6.1 * podman-remote-4.8.3-150500.3.6.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * podman-docker-4.8.3-150500.3.6.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * podman-debuginfo-4.8.3-150500.3.6.1 * podman-remote-debuginfo-4.8.3-150500.3.6.1 * podmansh-4.8.3-150500.3.6.1 * podman-4.8.3-150500.3.6.1 * podman-remote-4.8.3-150500.3.6.1 * Containers Module 15-SP5 (noarch) * podman-docker-4.8.3-150500.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217828 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 16:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 16:30:01 -0000 Subject: SUSE-SU-2024:0418-1: important: Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1) Message-ID: <170732340192.26181.8447547688798494117@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP1) Announcement ID: SUSE-SU-2024:0418-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-150100_197_134 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-418=1 SUSE-SLE- Module-Live-Patching-15-SP1-2024-415=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-417=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-417=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64) * kernel-livepatch-4_12_14-150100_197_134-default-11-150100.2.2 * kernel-livepatch-4_12_14-150100_197_160-default-3-150100.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_8-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_8-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-2-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 16:30:04 -0000 Subject: SUSE-SU-2024:0414-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) Message-ID: <170732340427.26181.3715950216207908152@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0414-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_46 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-412=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-414=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-413=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-414=1 SUSE-2024-413=1 SUSE-2024-412=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_46-default-debuginfo-11-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_8-debugsource-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_46-default-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_66-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_55-default-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_13-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_10-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_55-default-debuginfo-10-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_46-default-debuginfo-11-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_8-debugsource-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_46-default-11-150400.2.2 * kernel-livepatch-5_14_21-150400_24_66-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_55-default-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_13-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_10-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_55-default-debuginfo-10-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 16:30:06 -0000 Subject: SUSE-SU-2024:0411-1: important: Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) Message-ID: <170732340635.26181.682914205688584577@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0411-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_130 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-411=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-416=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-416=1 SUSE-2024-411=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_115-default-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_130-default-5-150300.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_130-default-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-default-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-default-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_130-default-debuginfo-5-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_30-debugsource-10-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_35-debugsource-5-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_130-preempt-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_130-preempt-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-preempt-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-preempt-10-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 7 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Feb 2024 20:30:02 -0000 Subject: SUSE-SU-2024:0421-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP4) Message-ID: <170733780252.12743.5551989845907403710@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0421-1 Rating: important References: * bsc#1216044 * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-5178 * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-5178 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5178 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_41 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). * CVE-2023-5178: Fixed a use-after-free vulnerability in queue intialization setup (bsc#1215768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-420=1 SUSE-2024-421=1 SUSE-2024-422=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-422=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-420=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-421=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-419=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-419=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_41-default-12-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_18-debugsource-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_16-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_7-debugsource-12-150400.2.2 * kernel-livepatch-5_14_21-150400_24_81-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_41-default-debuginfo-12-150400.2.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_41-default-12-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_18-debugsource-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_16-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_7-debugsource-12-150400.2.2 * kernel-livepatch-5_14_21-150400_24_81-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_41-default-debuginfo-12-150400.2.2 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-6-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_1-debugsource-6-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-6-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_1-debugsource-6-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5178.html * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1216044 * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0427-1: moderate: Recommended update for supportutils Message-ID: <170739540736.30681.1483736271415436464@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2024:0427-1 Rating: moderate References: * bsc#1183663 * bsc#1193173 * bsc#1196293 * bsc#1211547 * bsc#1216049 * bsc#1216388 * bsc#1216390 * bsc#1216522 * bsc#1216827 * bsc#1217287 * bsc#1218201 * bsc#1218282 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has 12 fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Update to version 3.1.28 * Correctly detects Xen Dom0 (bsc#1218201) * Fixed smart disk error (bsc#1218282) * Remove supportutils requires for util-linux-systemd and kmod (bsc#1193173) * Added missing klp information to kernel-livepatch.txt (bsc#1216390) * Fixed plugins creating empty files when using supportconfig.rc (bsc#1216388) * Provides long listing for /etc/sssd/sssd.conf (bsc#1211547) * Optimize lsof usage (bsc#1183663) * Collects chrony or ntp as needed (bsc#1196293) * Fixed podman display issue (bsc#1217287) * Added nvme-stas configuration to nvme.txt (bsc#1216049) * Added timed command to fs-files.txt (bsc#1216827) * Collects zypp history file issue#166 (bsc#1216522) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-427=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-427=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-427=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-427=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-427=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-427=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-427=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-427=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-427=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-427=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-427=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-427=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-427=1 * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-427=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-427=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-427=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-427=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-427=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-427=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-427=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-427=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-427=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-427=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-427=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-427=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-427=1 ## Package List: * openSUSE Leap 15.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * openSUSE Leap Micro 5.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * openSUSE Leap Micro 5.4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * openSUSE Leap 15.5 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * Basesystem Module 15-SP5 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Real Time 15 SP4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Manager Proxy 4.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Manager Server 4.3 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Enterprise Storage 7.1 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * supportutils-3.1.28-150300.7.35.24.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * supportutils-3.1.28-150300.7.35.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1183663 * https://bugzilla.suse.com/show_bug.cgi?id=1193173 * https://bugzilla.suse.com/show_bug.cgi?id=1196293 * https://bugzilla.suse.com/show_bug.cgi?id=1211547 * https://bugzilla.suse.com/show_bug.cgi?id=1216049 * https://bugzilla.suse.com/show_bug.cgi?id=1216388 * https://bugzilla.suse.com/show_bug.cgi?id=1216390 * https://bugzilla.suse.com/show_bug.cgi?id=1216522 * https://bugzilla.suse.com/show_bug.cgi?id=1216827 * https://bugzilla.suse.com/show_bug.cgi?id=1217287 * https://bugzilla.suse.com/show_bug.cgi?id=1218201 * https://bugzilla.suse.com/show_bug.cgi?id=1218282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0426-1: moderate: Recommended update for supportutils Message-ID: <170739541090.30681.3445028041630434653@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2024:0426-1 Rating: moderate References: * bsc#1183663 * bsc#1193173 * bsc#1196293 * bsc#1211547 * bsc#1216049 * bsc#1216388 * bsc#1216390 * bsc#1216522 * bsc#1216827 * bsc#1217287 * bsc#1218201 * bsc#1218282 Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that has 12 fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Update to version 3.1.28 * Correctly detects Xen Dom0 (bsc#1218201) * Fixed smart disk error (bsc#1218282) * Remove supportutils requires for util-linux-systemd and kmod (bsc#1193173) * Added missing klp information to kernel-livepatch.txt (bsc#1216390) * Fixed plugins creating empty files when using supportconfig.rc (bsc#1216388) * Provides long listing for /etc/sssd/sssd.conf (bsc#1211547) * Optimize lsof usage (bsc#1183663) * Collects chrony or ntp as needed (bsc#1196293) * Fixed podman display issue (bsc#1217287) * Added nvme-stas configuration to nvme.txt (bsc#1216049) * Added timed command to fs-files.txt (bsc#1216827) * Collects zypp history file issue#166 (bsc#1216522) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-426=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-426=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-426=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-426=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-426=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-426=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * supportutils-3.1.28-150000.5.53.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * supportutils-3.1.28-150000.5.53.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * supportutils-3.1.28-150000.5.53.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * supportutils-3.1.28-150000.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * supportutils-3.1.28-150000.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * supportutils-3.1.28-150000.5.53.1 * SUSE CaaS Platform 4.0 (noarch) * supportutils-3.1.28-150000.5.53.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1183663 * https://bugzilla.suse.com/show_bug.cgi?id=1193173 * https://bugzilla.suse.com/show_bug.cgi?id=1196293 * https://bugzilla.suse.com/show_bug.cgi?id=1211547 * https://bugzilla.suse.com/show_bug.cgi?id=1216049 * https://bugzilla.suse.com/show_bug.cgi?id=1216388 * https://bugzilla.suse.com/show_bug.cgi?id=1216390 * https://bugzilla.suse.com/show_bug.cgi?id=1216522 * https://bugzilla.suse.com/show_bug.cgi?id=1216827 * https://bugzilla.suse.com/show_bug.cgi?id=1217287 * https://bugzilla.suse.com/show_bug.cgi?id=1218201 * https://bugzilla.suse.com/show_bug.cgi?id=1218282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 12:30:12 -0000 Subject: SUSE-RU-2024:0425-1: moderate: Recommended update for python-argcomplete Message-ID: <170739541288.30681.2763193302120395072@smelt2.prg2.suse.org> # Recommended update for python-argcomplete Announcement ID: SUSE-RU-2024:0425-1 Rating: moderate References: * bsc#1219305 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for python-argcomplete fixes the following issues: * Use update-alternatives for package binaries to avoid conflict with python311 stack (bsc#1219305) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-425=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-425=1 ## Package List: * openSUSE Leap 15.5 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * Basesystem Module 15-SP5 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219305 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 12:30:15 -0000 Subject: SUSE-RU-2024:0424-1: moderate: Recommended update for python3-M2Crypto Message-ID: <170739541576.30681.5016308465928371441@smelt2.prg2.suse.org> # Recommended update for python3-M2Crypto Announcement ID: SUSE-RU-2024:0424-1 Rating: moderate References: * bsc#1205042 * bsc#1212757 * bsc#1217782 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has three fixes can now be installed. ## Description: This update for python3-M2Crypto fixes the following issues: * Packaging changes (bsc#1217782, bsc#1212757) * Set OpenSSL 3.0 as the default openssl in Tumbleweed (bsc#1205042) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-424=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-424=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-424=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-424=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-424=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-424=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-424=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-424=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-424=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-424=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * openSUSE Leap 15.4 (noarch) * python3-M2Crypto-doc-0.38.0-150400.10.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * openSUSE Leap 15.5 (noarch) * python3-M2Crypto-doc-0.38.0-150400.10.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-M2Crypto-debuginfo-0.38.0-150400.10.1 * python3-M2Crypto-debugsource-0.38.0-150400.10.1 * python3-M2Crypto-0.38.0-150400.10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205042 * https://bugzilla.suse.com/show_bug.cgi?id=1212757 * https://bugzilla.suse.com/show_bug.cgi?id=1217782 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 12:30:17 -0000 Subject: SUSE-SU-2024:0423-1: important: Security update for libavif Message-ID: <170739541738.30681.1662512435913085508@smelt2.prg2.suse.org> # Security update for libavif Announcement ID: SUSE-SU-2024:0423-1 Rating: important References: * bsc#1218303 Cross-References: * CVE-2023-6704 CVSS scores: * CVE-2023-6704 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-6704 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libavif fixes the following issues: * CVE-2023-6704: Fixed use after free by not storing colorproperties until alpha item is found (bsc#1218303). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-423=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-423=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-423=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-423=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-423=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-423=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-423=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-423=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-423=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-423=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-423=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif-devel-0.9.3-150400.3.3.1 * gdk-pixbuf-loader-libavif-debuginfo-0.9.3-150400.3.3.1 * gdk-pixbuf-loader-libavif-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * avif-tools-debuginfo-0.9.3-150400.3.3.1 * avif-tools-0.9.3-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libavif13-32bit-debuginfo-0.9.3-150400.3.3.1 * libavif13-32bit-0.9.3-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libavif13-64bit-debuginfo-0.9.3-150400.3.3.1 * libavif13-64bit-0.9.3-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif-devel-0.9.3-150400.3.3.1 * gdk-pixbuf-loader-libavif-debuginfo-0.9.3-150400.3.3.1 * gdk-pixbuf-loader-libavif-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * avif-tools-debuginfo-0.9.3-150400.3.3.1 * avif-tools-0.9.3-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libavif13-32bit-debuginfo-0.9.3-150400.3.3.1 * libavif13-32bit-0.9.3-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Manager Proxy 4.3 (x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libavif-debugsource-0.9.3-150400.3.3.1 * libavif13-0.9.3-150400.3.3.1 * libavif13-debuginfo-0.9.3-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6704.html * https://bugzilla.suse.com/show_bug.cgi?id=1218303 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 16:30:15 -0000 Subject: SUSE-SU-2024:0429-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) Message-ID: <170740981555.27070.10812502552422229418@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0429-1 Rating: important References: * bsc#1218255 Cross-References: * CVE-2023-6932 CVSS scores: * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_100 fixes one issue. The following security issue was fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-429=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-429=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_100-default-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-2-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_100-default-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-2-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 16:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 16:30:17 -0000 Subject: SUSE-SU-2024:0428-1: important: Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) Message-ID: <170740981799.27070.423325845074882533@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0428-1 Rating: important References: * bsc#1217522 * bsc#1218255 Cross-References: * CVE-2023-6176 * CVE-2023-6932 CVSS scores: * CVE-2023-6176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6176 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6932 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6932 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_97 fixes several issues. The following security issues were fixed: * CVE-2023-6932: Fixed a use-after-free vulnerability in the ipv4 igmp component that could lead to local privilege escalation (bsc#1218255). * CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217522). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-428=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-428=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_97-default-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_20-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-2-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_97-default-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_20-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-2-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6176.html * https://www.suse.com/security/cve/CVE-2023-6932.html * https://bugzilla.suse.com/show_bug.cgi?id=1217522 * https://bugzilla.suse.com/show_bug.cgi?id=1218255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 16:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 16:30:19 -0000 Subject: SUSE-RU-2024:0432-1: moderate: Recommended update for obs-service-kiwi_metainfo_helper Message-ID: <170740981955.27070.12262340636031247559@smelt2.prg2.suse.org> # Recommended update for obs-service-kiwi_metainfo_helper Announcement ID: SUSE-RU-2024:0432-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 An update that can now be installed. ## Description: This update for obs-service-kiwi_metainfo_helper fixes the following issues: * Replace %ARCH% with the architecture in images for supporting subscriptions in SCC based on architectures * cpio on SLE12 does not support -D option, emulate it ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-432=1 ## Package List: * openSUSE Leap 15.5 (noarch) * obs-service-kiwi_metainfo_helper-0.6-150000.1.21.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 16:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 16:30:21 -0000 Subject: SUSE-OU-2024:0431-1: moderate: Optional update for Message-ID: <170740982117.27070.7062955323368667972@smelt2.prg2.suse.org> # Optional update for Announcement ID: SUSE-OU-2024:0431-1 Rating: moderate References: * bsc#1199654 * bsc#1218626 * jsc#MSC-375 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that contains one feature and has two fixes can now be installed. ## Description: This optional update for provides: * Deliver missing wxWidgets-3_0 to SUSE Package Hub 15 SP4 and solve installation issues on Filezilla and python3-wxPython. (bsc#1199654) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-431=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-431=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-431=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwx_gtk2u_aui-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu_net-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_aui-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_stc-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_media-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_richtext-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_xrc-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_propgrid-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_baseu_xml-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_richtext-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_stc-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-plugin-sound_sdlu-3_0-3.0.5.1-150200.11.5.21 * libwx_gtk2u_qa-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_propgrid-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_qa-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_gl-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_html-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_gl-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_baseu_xml-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_baseu_net-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-devel-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_xrc-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_ribbon-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_media-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_ribbon-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-plugin-sound_sdlu-3_0-debuginfo-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-devel-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_adv-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_adv-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_html-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-debugsource-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-3.0.5.1-150200.11.5.21 * openSUSE Leap 15.5 (x86_64) * libwx_gtk2u_html-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_aui-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-plugin-sound_sdlu-3_0-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_propgrid-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_adv-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_baseu_net-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_adv-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_richtext-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_baseu_net-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-devel-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_gl-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_qa-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_media-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_richtext-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_ribbon-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu_xml-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_xrc-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-plugin-sound_sdlu-3_0-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_stc-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_media-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_xrc-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_gl-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_qa-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-devel-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_ribbon-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_aui-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_propgrid-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_html-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * libwx_gtk2u_stc-suse3_0_5-32bit-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu_xml-suse3_0_5-32bit-3.0.5.1-150200.11.5.21 * openSUSE Leap 15.5 (noarch) * wxWidgets-lang-3.0.5.1-150200.11.5.21 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libwx_gtk2u_aui-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu_net-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_aui-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_stc-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_media-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_richtext-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_xrc-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_propgrid-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_baseu_xml-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_richtext-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_stc-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-plugin-sound_sdlu-3_0-3.0.5.1-150200.11.5.21 * libwx_gtk2u_qa-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_propgrid-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_qa-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_gl-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_html-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_gl-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_baseu_xml-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_baseu_net-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-devel-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_xrc-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_ribbon-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_media-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_ribbon-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-plugin-sound_sdlu-3_0-debuginfo-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-devel-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_adv-suse3_0_5-3.0.5.1-150200.11.5.21 * libwx_gtk2u_adv-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_gtk2u_html-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-debugsource-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-3.0.5.1-150200.11.5.21 * SUSE Package Hub 15 15-SP5 (noarch) * wxWidgets-lang-3.0.5.1-150200.11.5.21 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libwx_gtk2u_core-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-debuginfo-3.0.5.1-150200.11.5.21 * libwx_baseu-suse3_0_5-3.0.5.1-150200.11.5.21 * wxWidgets-3_0-debugsource-3.0.5.1-150200.11.5.21 * libwx_gtk2u_core-suse3_0_5-3.0.5.1-150200.11.5.21 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1199654 * https://bugzilla.suse.com/show_bug.cgi?id=1218626 * https://jira.suse.com/browse/MSC-375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 16:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 16:30:22 -0000 Subject: SUSE-SU-2024:0430-1: moderate: Security update for cosign Message-ID: <170740982292.27070.9662057901287616117@smelt2.prg2.suse.org> # Security update for cosign Announcement ID: SUSE-SU-2024:0430-1 Rating: moderate References: * bsc#1218207 * jsc#SLE-23879 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for cosign fixes the following issues: Updated to 2.2.3 (jsc#SLE-23879): Bug Fixes: * Fix race condition on verification with multiple signatures attached to image (#3486) * fix(clean): Fix clean cmd for private registries (#3446) * Fixed BYO PKI verification (#3427) Features: * Allow for option in cosign attest and attest-blob to upload attestation as supported in Rekor (#3466) * Add support for OpenVEX predicate type (#3405) Documentation: * Resolves #3088: `version` sub-command expected behaviour documentation and testing (#3447) * add examples for cosign attach signature cmd (#3468) Misc: * Remove CertSubject function (#3467) * Use local rekor and fulcio instances in e2e tests (#3478) * bumped embedded golang.org/x/crypto/ssh to fix the Terrapin attack CVE-2023-48795 (bsc#1218207) Updated to 2.2.2 (jsc#SLE-23879): v2.2.2 adds a new container with a shell, gcr.io/projectsigstore/cosign:vx.y.z-dev, in addition to the existing container gcr.io/projectsigstore/cosign:vx.y.z without a shell. For private deployments, we have also added an alias for \--insecure-skip-log, --private-infrastructure. Bug Fixes: * chore(deps): bump github.com/sigstore/sigstore from 1.7.5 to 1.7.6 (#3411) which fixes a bug with using Azure KMS * Don't require CT log keys if using a key/sk (#3415) * Fix copy without any flag set (#3409) * Update cosign generate cmd to not include newline (#3393) * Fix idempotency error with signing (#3371) Features: * Add --yes flag cosign import-key-pair to skip the overwrite confirmation. (#3383) * Use the timeout flag value in verify* commands. (#3391) * add --private-infrastructure flag (#3369) Container Updates: * Bump builder image to use go1.21.4 and add new cosign image tags with shell (#3373) Documentation: * Update SBOM_SPEC.md (#3358) * CVE-2023-48795: Fixed the Terrapin attack in embedded golang.org/x/crypto/ssh (bsc#1218207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-430=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-430=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-430=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * cosign-2.2.3-150400.3.17.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cosign-debuginfo-2.2.3-150400.3.17.1 * cosign-2.2.3-150400.3.17.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * cosign-2.2.3-150400.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218207 * https://jira.suse.com/browse/SLE-23879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 16:30:28 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 16:30:28 -0000 Subject: SUSE-RU-2024:0108-2: moderate: Recommended update for apache2-mod_jk Message-ID: <170740982801.27070.2448595002608366757@smelt2.prg2.suse.org> # Recommended update for apache2-mod_jk Announcement ID: SUSE-RU-2024:0108-2 Rating: moderate References: * bsc#1206261 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for apache2-mod_jk fixes the following issues: * Fix a typo to restrict the symbols to export by the module (bsc#1206261) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-108=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-108=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-108=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-108=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-108=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-108=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-108=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-108=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-108=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-108=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-108=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Manager Proxy 4.3 (x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache2-mod_jk-debuginfo-1.2.49-150100.6.9.1 * apache2-mod_jk-1.2.49-150100.6.9.1 * apache2-mod_jk-debugsource-1.2.49-150100.6.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206261 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 20:30:02 -0000 Subject: SUSE-SU-2024:0437-1: moderate: Security update for python Message-ID: <170742420218.31606.10193084454763832423@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2024:0437-1 Rating: moderate References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python fixes the following issues: * CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-437=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-437=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-437=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-437=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * python-debuginfo-2.7.18-33.29.1 * python-tk-debuginfo-2.7.18-33.29.1 * libpython2_7-1_0-2.7.18-33.29.1 * python-gdbm-2.7.18-33.29.1 * python-curses-debuginfo-2.7.18-33.29.1 * python-devel-2.7.18-33.29.1 * python-base-debuginfo-2.7.18-33.29.1 * python-gdbm-debuginfo-2.7.18-33.29.1 * libpython2_7-1_0-debuginfo-2.7.18-33.29.1 * python-demo-2.7.18-33.29.1 * python-tk-2.7.18-33.29.1 * python-debugsource-2.7.18-33.29.1 * python-xml-2.7.18-33.29.1 * python-2.7.18-33.29.1 * python-base-debugsource-2.7.18-33.29.1 * python-xml-debuginfo-2.7.18-33.29.1 * python-base-2.7.18-33.29.1 * python-curses-2.7.18-33.29.1 * python-idle-2.7.18-33.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python-doc-2.7.18-33.29.1 * python-doc-pdf-2.7.18-33.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * python-base-32bit-2.7.18-33.29.1 * python-base-debuginfo-32bit-2.7.18-33.29.1 * libpython2_7-1_0-32bit-2.7.18-33.29.1 * python-debuginfo-32bit-2.7.18-33.29.1 * python-32bit-2.7.18-33.29.1 * libpython2_7-1_0-debuginfo-32bit-2.7.18-33.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * python-debuginfo-2.7.18-33.29.1 * python-tk-debuginfo-2.7.18-33.29.1 * libpython2_7-1_0-2.7.18-33.29.1 * python-gdbm-2.7.18-33.29.1 * python-curses-debuginfo-2.7.18-33.29.1 * python-devel-2.7.18-33.29.1 * python-base-debuginfo-2.7.18-33.29.1 * python-gdbm-debuginfo-2.7.18-33.29.1 * libpython2_7-1_0-debuginfo-2.7.18-33.29.1 * python-demo-2.7.18-33.29.1 * python-tk-2.7.18-33.29.1 * python-debugsource-2.7.18-33.29.1 * python-xml-2.7.18-33.29.1 * python-2.7.18-33.29.1 * python-base-debugsource-2.7.18-33.29.1 * python-xml-debuginfo-2.7.18-33.29.1 * python-base-2.7.18-33.29.1 * python-curses-2.7.18-33.29.1 * python-idle-2.7.18-33.29.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python-doc-2.7.18-33.29.1 * python-doc-pdf-2.7.18-33.29.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * python-base-32bit-2.7.18-33.29.1 * python-base-debuginfo-32bit-2.7.18-33.29.1 * libpython2_7-1_0-32bit-2.7.18-33.29.1 * python-debuginfo-32bit-2.7.18-33.29.1 * python-32bit-2.7.18-33.29.1 * libpython2_7-1_0-debuginfo-32bit-2.7.18-33.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * python-debuginfo-2.7.18-33.29.1 * python-tk-debuginfo-2.7.18-33.29.1 * libpython2_7-1_0-2.7.18-33.29.1 * python-gdbm-2.7.18-33.29.1 * python-curses-debuginfo-2.7.18-33.29.1 * python-devel-2.7.18-33.29.1 * python-base-debuginfo-2.7.18-33.29.1 * python-gdbm-debuginfo-2.7.18-33.29.1 * python-xml-debuginfo-2.7.18-33.29.1 * libpython2_7-1_0-debuginfo-2.7.18-33.29.1 * python-demo-2.7.18-33.29.1 * python-tk-2.7.18-33.29.1 * python-xml-2.7.18-33.29.1 * python-2.7.18-33.29.1 * python-base-debugsource-2.7.18-33.29.1 * python-debugsource-2.7.18-33.29.1 * python-base-2.7.18-33.29.1 * python-curses-2.7.18-33.29.1 * python-idle-2.7.18-33.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python-doc-2.7.18-33.29.1 * python-doc-pdf-2.7.18-33.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * python-base-32bit-2.7.18-33.29.1 * python-base-debuginfo-32bit-2.7.18-33.29.1 * libpython2_7-1_0-32bit-2.7.18-33.29.1 * python-debuginfo-32bit-2.7.18-33.29.1 * python-32bit-2.7.18-33.29.1 * libpython2_7-1_0-debuginfo-32bit-2.7.18-33.29.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * python-base-debuginfo-2.7.18-33.29.1 * python-base-debugsource-2.7.18-33.29.1 * python-devel-2.7.18-33.29.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0436-1: moderate: Security update for python36 Message-ID: <170742420393.31606.8762495129103126126@smelt2.prg2.suse.org> # Security update for python36 Announcement ID: SUSE-SU-2024:0436-1 Rating: moderate References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python36 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-436=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-436=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-436=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-436=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * python36-devel-3.6.15-52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * python36-debuginfo-3.6.15-52.1 * libpython3_6m1_0-3.6.15-52.1 * python36-3.6.15-52.1 * python36-base-debuginfo-3.6.15-52.1 * libpython3_6m1_0-debuginfo-3.6.15-52.1 * python36-base-3.6.15-52.1 * python36-debugsource-3.6.15-52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libpython3_6m1_0-32bit-3.6.15-52.1 * libpython3_6m1_0-debuginfo-32bit-3.6.15-52.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * python36-debuginfo-3.6.15-52.1 * libpython3_6m1_0-3.6.15-52.1 * python36-3.6.15-52.1 * python36-base-debuginfo-3.6.15-52.1 * libpython3_6m1_0-debuginfo-3.6.15-52.1 * python36-base-3.6.15-52.1 * python36-debugsource-3.6.15-52.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libpython3_6m1_0-32bit-3.6.15-52.1 * libpython3_6m1_0-debuginfo-32bit-3.6.15-52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * python36-debuginfo-3.6.15-52.1 * libpython3_6m1_0-3.6.15-52.1 * python36-3.6.15-52.1 * python36-base-debuginfo-3.6.15-52.1 * libpython3_6m1_0-debuginfo-3.6.15-52.1 * python36-base-3.6.15-52.1 * python36-debugsource-3.6.15-52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libpython3_6m1_0-32bit-3.6.15-52.1 * libpython3_6m1_0-debuginfo-32bit-3.6.15-52.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 20:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 20:30:06 -0000 Subject: SUSE-SU-2024:0435-1: moderate: Security update for netpbm Message-ID: <170742420606.31606.6828212302410181292@smelt2.prg2.suse.org> # Security update for netpbm Announcement ID: SUSE-SU-2024:0435-1 Rating: moderate References: * bsc#1022790 * bsc#1022791 Cross-References: * CVE-2017-5849 CVSS scores: * CVE-2017-5849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2017-5849 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for netpbm fixes the following issues: * CVE-2017-5849: Fixed out-of-bound read and write issue that can occur in function putgreytile() and put1bitbwtile() (bsc#1022790, bsc#1022791). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-435=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-435=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-435=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * netpbm-10.80.1-150000.3.14.1 * netpbm-debugsource-10.80.1-150000.3.14.1 * libnetpbm11-10.80.1-150000.3.14.1 * libnetpbm11-debuginfo-10.80.1-150000.3.14.1 * libnetpbm-devel-10.80.1-150000.3.14.1 * netpbm-vulnerable-debuginfo-10.80.1-150000.3.14.1 * netpbm-debuginfo-10.80.1-150000.3.14.1 * netpbm-vulnerable-10.80.1-150000.3.14.1 * openSUSE Leap 15.5 (x86_64) * libnetpbm11-32bit-10.80.1-150000.3.14.1 * libnetpbm11-32bit-debuginfo-10.80.1-150000.3.14.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * netpbm-10.80.1-150000.3.14.1 * netpbm-debugsource-10.80.1-150000.3.14.1 * libnetpbm11-10.80.1-150000.3.14.1 * libnetpbm11-debuginfo-10.80.1-150000.3.14.1 * netpbm-debuginfo-10.80.1-150000.3.14.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * netpbm-debugsource-10.80.1-150000.3.14.1 * netpbm-debuginfo-10.80.1-150000.3.14.1 * libnetpbm-devel-10.80.1-150000.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5849.html * https://bugzilla.suse.com/show_bug.cgi?id=1022790 * https://bugzilla.suse.com/show_bug.cgi?id=1022791 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 20:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 20:30:08 -0000 Subject: SUSE-SU-2024:0434-1: moderate: Security update for netpbm Message-ID: <170742420842.31606.4608927340176582221@smelt2.prg2.suse.org> # Security update for netpbm Announcement ID: SUSE-SU-2024:0434-1 Rating: moderate References: * bsc#1022790 * bsc#1022791 Cross-References: * CVE-2017-5849 CVSS scores: * CVE-2017-5849 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2017-5849 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for netpbm fixes the following issues: * CVE-2017-5849: Fixed out-of-bound read and write issue that can occur in function putgreytile() and put1bitbwtile() (bsc#1022790, bsc#1022791). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-434=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-434=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-434=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-434=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * netpbm-10.66.3-8.10.1 * libnetpbm11-10.66.3-8.10.1 * netpbm-debugsource-10.66.3-8.10.1 * libnetpbm11-debuginfo-10.66.3-8.10.1 * netpbm-debuginfo-10.66.3-8.10.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libnetpbm11-32bit-10.66.3-8.10.1 * libnetpbm11-debuginfo-32bit-10.66.3-8.10.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * netpbm-10.66.3-8.10.1 * libnetpbm11-10.66.3-8.10.1 * netpbm-debugsource-10.66.3-8.10.1 * libnetpbm11-debuginfo-10.66.3-8.10.1 * netpbm-debuginfo-10.66.3-8.10.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libnetpbm11-32bit-10.66.3-8.10.1 * libnetpbm11-debuginfo-32bit-10.66.3-8.10.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * netpbm-10.66.3-8.10.1 * libnetpbm11-10.66.3-8.10.1 * netpbm-debugsource-10.66.3-8.10.1 * libnetpbm11-debuginfo-10.66.3-8.10.1 * netpbm-debuginfo-10.66.3-8.10.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libnetpbm11-32bit-10.66.3-8.10.1 * libnetpbm11-debuginfo-32bit-10.66.3-8.10.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * netpbm-debugsource-10.66.3-8.10.1 * netpbm-debuginfo-10.66.3-8.10.1 * libnetpbm-devel-10.66.3-8.10.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5849.html * https://bugzilla.suse.com/show_bug.cgi?id=1022790 * https://bugzilla.suse.com/show_bug.cgi?id=1022791 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 8 20:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Feb 2024 20:30:09 -0000 Subject: SUSE-RU-2024:0433-1: moderate: Recommended update for source-highlight Message-ID: <170742420990.31606.11303078325499241744@smelt2.prg2.suse.org> # Recommended update for source-highlight Announcement ID: SUSE-RU-2024:0433-1 Rating: moderate References: * jsc#PED-6584 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for source-highlight fixes the following issues: Version update to 3.1.9: * changed esc.style to work better with dark theme terminals * updated C and C++ to more recent standards * fixed zsh.lang * added new Python keywords * added Rust * added ixpe * added vim * ships it to missing service packs like SUSE Linux Enterprise 15 SP3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-433=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-433=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-433=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-433=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-433=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-433=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-433=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-433=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-433=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-433=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-433=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-433=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-433=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-433=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * source-highlight-cgi-debuginfo-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-3.1.9-150000.3.7.1 * source-highlight-cgi-3.1.9-150000.3.7.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * source-highlight-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * openSUSE Leap 15.5 (x86_64) * libsource-highlight4-32bit-3.1.9-150000.3.7.1 * libsource-highlight4-32bit-debuginfo-3.1.9-150000.3.7.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * source-highlight-debugsource-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * source-highlight-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * source-highlight-debugsource-3.1.9-150000.3.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libsource-highlight4-debuginfo-3.1.9-150000.3.7.1 * libsource-highlight-devel-3.1.9-150000.3.7.1 * libsource-highlight4-3.1.9-150000.3.7.1 ## References: * https://jira.suse.com/browse/PED-6584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 08:30:03 -0000 Subject: SUSE-SU-2024:0438-1: moderate: Security update for python3 Message-ID: <170746740305.305.13421161195096013855@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2024:0438-1 Rating: moderate References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * Web and Scripting Module 12 An update that solves one vulnerability can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 12 zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2024-438=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-438=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-438=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-438=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-438=1 ## Package List: * Web and Scripting Module 12 (aarch64 ppc64le s390x x86_64) * python3-debuginfo-3.4.10-25.119.1 * python3-base-3.4.10-25.119.1 * python3-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-3.4.10-25.119.1 * libpython3_4m1_0-3.4.10-25.119.1 * python3-curses-3.4.10-25.119.1 * python3-base-debugsource-3.4.10-25.119.1 * python3-base-debuginfo-3.4.10-25.119.1 * python3-debugsource-3.4.10-25.119.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * python3-debuginfo-3.4.10-25.119.1 * python3-devel-3.4.10-25.119.1 * python3-dbm-debuginfo-3.4.10-25.119.1 * python3-dbm-3.4.10-25.119.1 * python3-base-debugsource-3.4.10-25.119.1 * python3-base-debuginfo-3.4.10-25.119.1 * python3-debugsource-3.4.10-25.119.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (ppc64le s390x x86_64) * python3-devel-debuginfo-3.4.10-25.119.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * python3-debuginfo-3.4.10-25.119.1 * python3-base-3.4.10-25.119.1 * python3-tk-debuginfo-3.4.10-25.119.1 * python3-3.4.10-25.119.1 * python3-devel-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-3.4.10-25.119.1 * libpython3_4m1_0-3.4.10-25.119.1 * python3-tk-3.4.10-25.119.1 * python3-curses-3.4.10-25.119.1 * python3-base-debugsource-3.4.10-25.119.1 * python3-base-debuginfo-3.4.10-25.119.1 * python3-debugsource-3.4.10-25.119.1 * python3-curses-debuginfo-3.4.10-25.119.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * python3-base-debuginfo-32bit-3.4.10-25.119.1 * python3-devel-debuginfo-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.119.1 * libpython3_4m1_0-32bit-3.4.10-25.119.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * python3-debuginfo-3.4.10-25.119.1 * python3-base-3.4.10-25.119.1 * python3-tk-debuginfo-3.4.10-25.119.1 * python3-3.4.10-25.119.1 * python3-devel-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-3.4.10-25.119.1 * libpython3_4m1_0-3.4.10-25.119.1 * python3-tk-3.4.10-25.119.1 * python3-curses-3.4.10-25.119.1 * python3-base-debugsource-3.4.10-25.119.1 * python3-base-debuginfo-3.4.10-25.119.1 * python3-debugsource-3.4.10-25.119.1 * python3-curses-debuginfo-3.4.10-25.119.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le s390x x86_64) * python3-devel-debuginfo-3.4.10-25.119.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * python3-base-debuginfo-32bit-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.119.1 * libpython3_4m1_0-32bit-3.4.10-25.119.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * python3-debuginfo-3.4.10-25.119.1 * python3-base-3.4.10-25.119.1 * python3-tk-debuginfo-3.4.10-25.119.1 * python3-3.4.10-25.119.1 * python3-devel-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-3.4.10-25.119.1 * libpython3_4m1_0-3.4.10-25.119.1 * python3-tk-3.4.10-25.119.1 * python3-curses-3.4.10-25.119.1 * python3-devel-debuginfo-3.4.10-25.119.1 * python3-base-debugsource-3.4.10-25.119.1 * python3-base-debuginfo-3.4.10-25.119.1 * python3-debugsource-3.4.10-25.119.1 * python3-curses-debuginfo-3.4.10-25.119.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * python3-base-debuginfo-32bit-3.4.10-25.119.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.119.1 * libpython3_4m1_0-32bit-3.4.10-25.119.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 12:30:02 -0000 Subject: SUSE-RU-2024:0440-1: moderate: Recommended update for scap-security-guide Message-ID: <170748180213.23487.15660834314525806355@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2024:0440-1 Rating: moderate References: * jsc#ECO-3319 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: * updated to 0.1.71 (jsc#ECO-3319) * Add RHEL 9 STIG * Add support for Debian 12 * Update PCI-DSS profile for RHEL * lots of bugfixes and improvements for SLE * removed left over file, patch upstreamed in 0.1.69 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-440=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-440=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-440=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-440=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-440=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-440=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-440=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-440=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-440=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-440=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-440=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-440=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-440=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-440=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-440=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-440=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-440=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-440=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-440=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-440=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-440=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.5 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * scap-security-guide-0.1.71-150000.1.75.1 * Basesystem Module 15-SP5 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Manager Proxy 4.3 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Manager Server 4.3 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE Enterprise Storage 7.1 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 * SUSE CaaS Platform 4.0 (noarch) * scap-security-guide-redhat-0.1.71-150000.1.75.1 * scap-security-guide-ubuntu-0.1.71-150000.1.75.1 * scap-security-guide-0.1.71-150000.1.75.1 * scap-security-guide-debian-0.1.71-150000.1.75.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0439-1: important: Security update for python-Pillow Message-ID: <170748180396.23487.210825737101225009@smelt2.prg2.suse.org> # Security update for python-Pillow Announcement ID: SUSE-SU-2024:0439-1 Rating: important References: * bsc#1219048 Cross-References: * CVE-2023-50447 CVSS scores: * CVE-2023-50447 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-50447 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP4 * SUSE OpenStack Cloud 9 * SUSE OpenStack Cloud Crowbar 9 An update that solves one vulnerability can now be installed. ## Description: This update for python-Pillow fixes the following issues: * CVE-2023-50447: Fixed arbitrary code execution via the environment parameter. (bsc#1219048) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE OpenStack Cloud 9 zypper in -t patch SUSE-OpenStack-Cloud-9-2024-439=1 * SUSE OpenStack Cloud Crowbar 9 zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2024-439=1 ## Package List: * SUSE OpenStack Cloud 9 (x86_64) * python-Pillow-5.2.0-3.23.1 * python-Pillow-debuginfo-5.2.0-3.23.1 * python-Pillow-debugsource-5.2.0-3.23.1 * SUSE OpenStack Cloud Crowbar 9 (x86_64) * python-Pillow-5.2.0-3.23.1 * python-Pillow-debuginfo-5.2.0-3.23.1 * python-Pillow-debugsource-5.2.0-3.23.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50447.html * https://bugzilla.suse.com/show_bug.cgi?id=1219048 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0444-1: important: Security update for suse-build-key Message-ID: <170749620250.17641.9133602943303361932@smelt2.prg2.suse.org> # Security update for suse-build-key Announcement ID: SUSE-SU-2024:0444-1 Rating: important References: * bsc#1219123 * bsc#1219189 * jsc#PED-2777 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has two security fixes can now be installed. ## Description: This update for suse-build-key fixes the following issues: This update runs a import-suse-build-key script. The previous libzypp-post-script based installation is replaced with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777). \- suse-build-key- import.service \- suse-build-key-import.timer It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys. After successful import the timer is disabled. To manually import them you can also run: # rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc # rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc Bugfix added since last update: * run rpm commands in import script only when libzypp is not active. bsc#1219189 bsc#1219123 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-444=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-444=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-444=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-444=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-444=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-444=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-444=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-444=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-444=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-444=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-444=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-444=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-444=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-444=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-444=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-444=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-444=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-444=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-444=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-444=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-444=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-444=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-444=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-444=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-444=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-444=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-444=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Manager Proxy 4.3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Manager Server 4.3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Enterprise Storage 7.1 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * suse-build-key-12.0-150000.8.40.1 * openSUSE Leap Micro 5.3 (noarch) * suse-build-key-12.0-150000.8.40.1 * openSUSE Leap Micro 5.4 (noarch) * suse-build-key-12.0-150000.8.40.1 * openSUSE Leap 15.5 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * suse-build-key-12.0-150000.8.40.1 * Basesystem Module 15-SP5 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * suse-build-key-12.0-150000.8.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * suse-build-key-12.0-150000.8.40.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219123 * https://bugzilla.suse.com/show_bug.cgi?id=1219189 * https://jira.suse.com/browse/PED-2777 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 16:30:05 -0000 Subject: SUSE-RU-2024:0443-1: moderate: Recommended update for go1.22 Message-ID: <170749620509.17641.3005445662467588290@smelt2.prg2.suse.org> # Recommended update for go1.22 Announcement ID: SUSE-RU-2024:0443-1 Rating: moderate References: * bsc#1218424 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for go1.22 fixes the following issues: This is go1.22 (released 2024-02-06), a major release of Go. (bsc#1218424 go1.22 release tracking) go1.22.x minor releases will be provided through February 2024. See https://github.com/golang/go/wiki/Go-Release-Cycle go1.22 arrives six months after go1.21. Most of its changes are in the implementation of the toolchain, runtime, and libraries. As always, the release maintains the Go 1 promise of compatibility. We expect almost all Go programs to continue to compile and run as before. * Language change: go1.22 makes two changes to for loops. Previously, the variables declared by a for loop were created once and updated by each iteration. In go1.22, each iteration of the loop creates new variables, to avoid accidental sharing bugs. The transition support tooling described in the proposal continues to work in the same way it did in Go 1.21. * Language change: For loops may now range over integers * Language change: go1.22 includes a preview of a language change we are considering for a future version of Go: range-over-function iterators. Building with GOEXPERIMENT=rangefunc enables this feature. * go command: Commands in workspaces can now use a vendor directory containing the dependencies of the workspace. The directory is created by go work vendor, and used by build commands when the -mod flag is set to vendor, which is the default when a workspace vendor directory is present. Note that the vendor directory's contents for a workspace are different from those of a single module: if the directory at the root of a workspace also contains one of the modules in the workspace, its vendor directory can contain the dependencies of either the workspace or of the module, but not both. * go get is no longer supported outside of a module in the legacy GOPATH mode (that is, with GO111MODULE=off). Other build commands, such as go build and go test, will continue to work indefinitely for legacy GOPATH programs. * go mod init no longer attempts to import module requirements from configuration files for other vendoring tools (such as Gopkg.lock). * go test -cover now prints coverage summaries for covered packages that do not have their own test files. Prior to Go 1.22 a go test -cover run for such a package would report: ? mymod/mypack [no test files] and now with go1.22, functions in the package are treated as uncovered: mymod/mypack coverage: 0.0% of statements Note that if a package contains no executable code at all, we can't report a meaningful coverage percentage; for such packages the go tool will continue to report that there are no test files. * trace: The trace tool's web UI has been gently refreshed as part of the work to support the new tracer, resolving several issues and improving the readability of various sub-pages. The web UI now supports exploring traces in a thread-oriented view. The trace viewer also now displays the full duration of all system calls. These improvements only apply for viewing traces produced by programs built with go1.22 or newer. A future release will bring some of these improvements to traces produced by older version of Go. * vet: References to loop variables The behavior of the vet tool has changed to match the new semantics (see above) of loop variables in go1.22. When analyzing a file that requires go1.22 or newer (due to its go.mod file or a per-file build constraint), vetcode> no longer reports references to loop variables from within a function literal that might outlive the iteration of the loop. In Go 1.22, loop variables are created anew for each iteration, so such references are no longer at risk of using a variable after it has been updated by the loop. * vet: New warnings for missing values after append The vet tool now reports calls to append that pass no values to be appended to the slice, such as slice = append(slice). Such a statement has no effect, and experience has shown that is nearly always a mistake. * vet: New warnings for deferring time.Since The vet tool now reports a non- deferred call to time.Since(t) within a defer statement. This is equivalent to calling time.Now().Sub(t) before the defer statement, not when the deferred function is called. In nearly all cases, the correct code requires deferring the time.Since call. * vet: New warnings for mismatched key-value pairs in log/slog calls The vet tool now reports invalid arguments in calls to functions and methods in the structured logging package, log/slog, that accept alternating key/value pairs. It reports calls where an argument in a key position is neither a string nor a slog.Attr, and where a final key is missing its value. * runtime: The runtime now keeps type-based garbage collection metadata nearer to each heap object, improving the CPU performance (latency or throughput) of Go programs by 1-3%. This change also reduces the memory overhead of the majority Go programs by approximately 1% by deduplicating redundant metadata. Some programs may see a smaller improvement because this change adjusts the size class boundaries of the memory allocator, so some objects may be moved up a size class. A consequence of this change is that some objects' addresses that were previously always aligned to a 16 byte (or higher) boundary will now only be aligned to an 8 byte boundary. Some programs that use assembly instructions that require memory addresses to be more than 8-byte aligned and rely on the memory allocator's previous alignment behavior may break, but we expect such programs to be rare. Such programs may be built with GOEXPERIMENT=noallocheaders to revert to the old metadata layout and restore the previous alignment behavior, but package owners should update their assembly code to avoid the alignment assumption, as this workaround will be removed in a future release. * runtime: On the windows/amd64 port, programs linking or loading Go libraries built with -buildmode=c-archive or -buildmode=c-shared can now use the SetUnhandledExceptionFilter Win32 function to catch exceptions not handled by the Go runtime. Note that this was already supported on the windows/386 port. * compiler: Profile-guided Optimization (PGO) builds can now devirtualize a higher proportion of calls than previously possible. Most programs from a representative set of Go programs now see between 2 and 14% improvement from enabling PGO. * compiler: The compiler now interleaves devirtualization and inlining, so interface method calls are better optimized. * compiler: go1.22 also includes a preview of an enhanced implementation of the compiler's inlining phase that uses heuristics to boost inlinability at call sites deemed "important" (for example, in loops) and discourage inlining at call sites deemed "unimportant" (for example, on panic paths). Building with GOEXPERIMENT=newinliner enables the new call-site heuristics; see issue #61502 for more info and to provide feedback. * linker: The linker's -s and -w flags are now behave more consistently across all platforms. The -w flag suppresses DWARF debug information generation. The -s flag suppresses symbol table generation. The -s flag also implies the -w flag, which can be negated with -w=0. That is, -s -w=0 will generate a binary with DWARF debug information generation but without the symbol table. * linker: On ELF platforms, the -B linker flag now accepts a special form: with -B gobuildid, the linker will generate a GNU build ID (the ELF NT_GNU_BUILD_ID note) derived from the Go build ID. * linker: On Windows, when building with -linkmode=internal, the linker now preserves SEH information from C object files by copying the .pdata and .xdata sections into the final binary. This helps with debugging and profiling binaries using native tools, such as WinDbg. Note that until now, C functions' SEH exception handlers were not being honored, so this change may cause some programs to behave differently. -linkmode=external is not affected by this change, as external linkers already preserve SEH information. * bootstrap: As mentioned in the Go 1.20 release notes, go1.22 now requires the final point release of Go 1.20 or later for bootstrap. We expect that Go 1.24 will require the final point release of go1.22 or later for bootstrap. * core library: New math/rand/v2 package: go1.22 includes the first ?v2? package in the standard library, math/rand/v2. The changes compared to math/rand are detailed in proposal go#61716. The most important changes are: * The Read method, deprecated in math/rand, was not carried forward for math/rand/v2. (It remains available in math/rand.) The vast majority of calls to Read should use crypto/rand?s Read instead. Otherwise a custom Read can be constructed using the Uint64 method. * The global generator accessed by top-level functions is unconditionally randomly seeded. Because the API guarantees no fixed sequence of results, optimizations like per-thread random generator states are now possible. * The Source interface now has a single Uint64 method; there is no Source64 interface. * Many methods now use faster algorithms that were not possible to adopt in math/rand because they changed the output streams. * The Intn, Int31, Int31n, Int63, and Int64n top-level functions and methods from math/rand are spelled more idiomatically in math/rand/v2: IntN, Int32, Int32N, Int64, and Int64N. There are also new top-level functions and methods Uint32, Uint32N, Uint64, Uint64N, Uint, and UintN. * The new generic function N is like Int64N or Uint64N but works for any integer type. For example a random duration from 0 up to 5 minutes is rand.N(5*time.Minute). * The Mitchell & Reeds LFSR generator provided by math/rand?s Source has been replaced by two more modern pseudo-random generator sources: ChaCha8 PCG. ChaCha8 is a new, cryptographically strong random number generator roughly similar to PCG in efficiency. ChaCha8 is the algorithm used for the top- level functions in math/rand/v2. As of go1.22, math/rand's top-level functions (when not explicitly seeded) and the Go runtime also use ChaCha8 for randomness. * We plan to include an API migration tool in a future release, likely Go 1.23. * core library: New go/version package: The new go/version package implements functions for validating and comparing Go version strings. * core library: Enhanced routing patterns: HTTP routing in the standard library is now more expressive. The patterns used by net/http.ServeMux have been enhanced to accept methods and wildcards. This change breaks backwards compatibility in small ways, some obvious?patterns with "{" and "}" behave differently? and some less so?treatment of escaped paths has been improved. The change is controlled by a GODEBUG field named httpmuxgo121. Set httpmuxgo121=1 to restore the old behavior. * Minor changes to the library As always, there are various minor changes and updates to the library, made with the Go 1 promise of compatibility in mind. There are also various performance improvements, not enumerated here. * archive/tar: The new method Writer.AddFS adds all of the files from an fs.FS to the archive. * archive/zip: The new method Writer.AddFS adds all of the files from an fs.FS to the archive. * bufio: When a SplitFunc returns ErrFinalToken with a nil token, Scanner will now stop immediately. Previously, it would report a final empty token before stopping, which was usually not desired. Callers that do want to report a final empty token can do so by returning []byte{} rather than nil. * cmp: The new function Or returns the first in a sequence of values that is not the zero value. * crypto/tls: ConnectionState.ExportKeyingMaterial will now return an error unless TLS 1.3 is in use, or the extended_master_secret extension is supported by both the server and client. crypto/tls has supported this extension since Go 1.20. This can be disabled with the tlsunsafeekm=1 GODEBUG setting. * crypto/tls: By default, the minimum version offered by crypto/tls servers is now TLS 1.2 if not specified with config.MinimumVersion, matching the behavior of crypto/tls clients. This change can be reverted with the tls10server=1 GODEBUG setting. * crypto/tls: By default, cipher suites without ECDHE support are no longer offered by either clients or servers during pre-TLS 1.3 handshakes. This change can be reverted with the tlsrsakex=1 GODEBUG setting. * crypto/x509: The new CertPool.AddCertWithConstraint method can be used to add customized constraints to root certificates to be applied during chain building. * crypto/x509: On Android, root certificates will now be loaded from /data/misc/keychain/certs-added as well as /system/etc/security/cacerts. * crypto/x509: A new type, OID, supports ASN.1 Object Identifiers with individual components larger than 31 bits. A new field which uses this type, Policies, is added to the Certificate struct, and is now populated during parsing. Any OIDs which cannot be represented using a asn1.ObjectIdentifier will appear in Policies, but not in the old PolicyIdentifiers field. When calling CreateCertificate, the Policies field is ignored, and policies are taken from the PolicyIdentifiers field. Using the x509usepolicies=1 GODEBUG setting inverts this, populating certificate policies from the Policies field, and ignoring the PolicyIdentifiers field. We may change the default value of x509usepolicies in Go 1.23, making Policies the default field for marshaling. * database/sql: The new Null[T] type provide a way to scan nullable columns for any column types. * debug/elf: Constant R_MIPS_PC32 is defined for use with MIPS64 systems. Additional R_LARCH_* constants are defined for use with LoongArch systems. * encoding: The new methods AppendEncode and AppendDecode added to each of the Encoding types in the packages encoding/base32, encoding/base64, and encoding/hex simplify encoding and decoding from and to byte slices by taking care of byte slice buffer management. * encoding: The methods base32.Encoding.WithPadding and base64.Encoding.WithPadding now panic if the padding argument is a negative value other than NoPadding. * encoding/json: Marshaling and encoding functionality now escapes '\b' and '\f' characters as \b and \f instead of \u0008 and \u000c. * go/ast: The following declarations related to syntactic identifier resolution are now deprecated: Ident.Obj, Object, Scope, File.Scope, File.Unresolved, Importer, Package, NewPackage. In general, identifiers cannot be accurately resolved without type information. Consider, for example, the identifier K in T{K: ""}: it could be the name of a local variable if T is a map type, or the name of a field if T is a struct type. New programs should use the go/types package to resolve identifiers; see Object, Info.Uses, and Info.Defs for details. * go/ast: The new ast.Unparen function removes any enclosing parentheses from an expression. * go/types: The new Alias type represents type aliases. Previously, type aliases were not represented explicitly, so a reference to a type alias was equivalent to spelling out the aliased type, and the name of the alias was lost. The new representation retains the intermediate Alias. This enables improved error reporting (the name of a type alias can be reported), and allows for better handling of cyclic type declarations involving type aliases. In a future release, Alias types will also carry type parameter information. The new function Unalias returns the actual type denoted by an Alias type (or any other Type for that matter). * go/types: Because Alias types may break existing type switches that do not know to check for them, this functionality is controlled by a GODEBUG field named gotypesalias. With gotypesalias=0, everything behaves as before, and Alias types are never created. With gotypesalias=1, Alias types are created and clients must expect them. The default is gotypesalias=0. In a future release, the default will be changed to gotypesalias=1. Clients of go/types are urged to adjust their code as soon as possible to work with gotypesalias=1 to eliminate problems early. * go/types: The Info struct now exports the FileVersions map which provides per-file Go version information. * go/types: The new helper method PkgNameOf returns the local package name for the given import declaration. * go/types: The implementation of SizesFor has been adjusted to compute the same type sizes as the compiler when the compiler argument for SizesFor is "gc". The default Sizes implementation used by the type checker is now types.SizesFor("gc", "amd64"). * go/types: The start position (Pos) of the lexical environment block (Scope) that represents a function body has changed: it used to start at the opening curly brace of the function body, but now starts at the function's func token. * html/template: Javascript template literals may now contain Go template actions, and parsing a template containing one will no longer return ErrJSTemplate. Similarly the GODEBUG setting jstmpllitinterp no longer has any effect. * io: The new SectionReader.Outer method returns the ReaderAt, offset, and size passed to NewSectionReader. * log/slog: The new SetLogLoggerLevel function controls the level for the bridge between the `slog` and `log` packages. It sets the minimum level for calls to the top-level `slog` logging functions, and it sets the level for calls to `log.Logger` that go through `slog`. * math/big: The new method Rat.FloatPrec computes the number of fractional decimal digits required to represent a rational number accurately as a floating-point number, and whether accurate decimal representation is possible in the first place. * net: When io.Copy copies from a TCPConn to a UnixConn, it will now use Linux's splice(2) system call if possible, using the new method TCPConn.WriteTo. * net: The Go DNS Resolver, used when building with "-tags=netgo", now searches for a matching name in the Windows hosts file, located at %SystemRoot%\System32\drivers\etc\hosts, before making a DNS query. * net/http: The new functions ServeFileFS, FileServerFS, and NewFileTransportFS are versions of the existing ServeFile, FileServer, and NewFileTransport, operating on an fs.FS. * net/http: The HTTP server and client now reject requests and responses containing an invalid empty Content-Length header. The previous behavior may be restored by setting GODEBUG field httplaxcontentlength=1. * net/http: The new method Request.PathValue returns path wildcard values from a request and the new method Request.SetPathValue sets path wildcard values on a request. * net/http/cgi: When executing a CGI process, the PATH_INFO variable is now always set to the empty string or a value starting with a / character, as required by RFC 3875. It was previously possible for some combinations of Handler.Root and request URL to violate this requirement. * net/netip: The new AddrPort.Compare method compares two AddrPorts. * os: On Windows, the Stat function now follows all reparse points that link to another named entity in the system. It was previously only following IO_REPARSE_TAG_SYMLINK and IO_REPARSE_TAG_MOUNT_POINT reparse points. * os: On Windows, passing O_SYNC to OpenFile now causes write operations to go directly to disk, equivalent to O_SYNC on Unix platforms. * os: On Windows, the ReadDir, File.ReadDir, File.Readdir, and File.Readdirnames functions now read directory entries in batches to reduce the number of system calls, improving performance up to 30%. * os: When io.Copy copies from a File to a net.UnixConn, it will now use Linux's sendfile(2) system call if possible, using the new method File.WriteTo. * os/exec: On Windows, LookPath now ignores empty entries in %PATH%, and returns ErrNotFound (instead of ErrNotExist) if no executable file extension is found to resolve an otherwise-unambiguous name. * os/exec: On Windows, Command and Cmd.Start no longer call LookPath if the path to the executable is already absolute and has an executable file extension. In addition, Cmd.Start no longer writes the resolved extension back to the Path field, so it is now safe to call the String method concurrently with a call to Start. * reflect: The Value.IsZero method will now return true for a floating-point or complex negative zero, and will return true for a struct value if a blank field (a field named _) somehow has a non-zero value. These changes make IsZero consistent with comparing a value to zero using the language == operator. * reflect: The PtrTo function is deprecated, in favor of PointerTo. * reflect: The new function TypeFor returns the Type that represents the type argument T. Previously, to get the reflect.Type value for a type, one had to use reflect.TypeOf((*T)(nil)).Elem(). This may now be written as reflect.TypeForT. * runtime/metrics: Four new histogram metrics /sched/pauses/stopping/gc:seconds, /sched/pauses/stopping/other:seconds, /sched/pauses/total/gc:seconds, and /sched/pauses/total/other:seconds provide additional details about stop-the-world pauses. The "stopping" metrics report the time taken from deciding to stop the world until all goroutines are stopped. The "total" metrics report the time taken from deciding to stop the world until it is started again. * runtime/metrics: The /gc/pauses:seconds metric is deprecated, as it is equivalent to the new /sched/pauses/total/gc:seconds metric. * runtime/metrics: /sync/mutex/wait/total:seconds now includes contention on runtime-internal locks in addition to sync.Mutex and sync.RWMutex. * runtime/pprof: Mutex profiles now scale contention by the number of goroutines blocked on the mutex. This provides a more accurate representation of the degree to which a mutex is a bottleneck in a Go program. For instance, if 100 goroutines are blocked on a mutex for 10 milliseconds, a mutex profile will now record 1 second of delay instead of 10 milliseconds of delay. * runtime/pprof: Mutex profiles also now include contention on runtime- internal locks in addition to sync.Mutex and sync.RWMutex. Contention on runtime-internal locks is always reported at runtime._LostContendedRuntimeLock. A future release will add complete stack traces in these cases. * runtime/pprof: CPU profiles on Darwin platforms now contain the process's memory map, enabling the disassembly view in the pprof tool. * runtime/trace: The execution tracer has been completely overhauled in this release, resolving several long-standing issues and paving the way for new use-cases for execution traces. * runtime/trace: Execution traces now use the operating system's clock on most platforms (Windows excluded) so it is possible to correlate them with traces produced by lower-level components. Execution traces no longer depend on the reliability of the platform's clock to produce a correct trace. Execution traces are now partitioned regularly on-the-fly and as a result may be processed in a streamable way. Execution traces now contain complete durations for all system calls. Execution traces now contain information about the operating system threads that goroutines executed on. The latency impact of starting and stopping execution traces has been dramatically reduced. Execution traces may now begin or end during the garbage collection mark phase. * runtime/trace: To allow Go developers to take advantage of these improvements, an experimental trace reading package is available at golang.org/x/exp/trace. Note that this package only works on traces produced by programs built with go1.22 at the moment. Please try out the package and provide feedback on the corresponding proposal issue. * runtime/trace: If you experience any issues with the new execution tracer implementation, you may switch back to the old implementation by building your Go program with GOEXPERIMENT=noexectracer2. If you do, please file an issue, otherwise this option will be removed in a future release. * slices: The new function Concat concatenates multiple slices. * slices: Functions that shrink the size of a slice (Delete, DeleteFunc, Compact, CompactFunc, and Replace) now zero the elements between the new length and the old length. * slices: Insert now always panics if the argument i is out of range. Previously it did not panic in this situation if there were no elements to be inserted. * syscall: The syscall package has been frozen since Go 1.4 and was marked as deprecated in Go 1.11, causing many editors to warn about any use of the package. However, some non-deprecated functionality requires use of the syscall package, such as the os/exec.Cmd.SysProcAttr field. To avoid unnecessary complaints on such code, the syscall package is no longer marked as deprecated. The package remains frozen to most new functionality, and new code remains encouraged to use golang.org/x/sys/unix or golang.org/x/sys/windows where possible. * syscall: On Linux, the new SysProcAttr.PidFD field allows obtaining a PID FD when starting a child process via StartProcess or os/exec. * syscall: On Windows, passing O_SYNC to Open now causes write operations to go directly to disk, equivalent to O_SYNC on Unix platforms. * testing/slogtest: The new Run function uses sub-tests to run test cases, providing finer-grained control. * Ports: Darwin: On macOS on 64-bit x86 architecture (the darwin/amd64 port), the Go toolchain now generates position-independent executables (PIE) by default. Non-PIE binaries can be generated by specifying the -buildmode=exe build flag. On 64-bit ARM-based macOS (the darwin/arm64 port), the Go toolchain already generates PIE by default. go1.22 is the last release that will run on macOS 10.15 Catalina. Go 1.23 will require macOS 11 Big Sur or later. * Ports: Arm: The GOARM environment variable now allows you to select whether to use software or hardware floating point. Previously, valid GOARM values were 5, 6, or 7. Now those same values can be optionally followed by ,softfloat or ,hardfloat to select the floating-point implementation. This new option defaults to softfloat for version 5 and hardfloat for versions 6 and 7. * Ports: Loong64: The loong64 port now supports passing function arguments and results using registers. The linux/loong64 port now supports the address sanitizer, memory sanitizer, new-style linker relocations, and the plugin build mode. * OpenBSD go1.22 adds an experimental port to OpenBSD on big-endian 64-bit PowerPC (openbsd/ppc64). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-443=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-443=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.22-1.22.0-150000.1.6.1 * go1.22-race-1.22.0-150000.1.6.1 * go1.22-doc-1.22.0-150000.1.6.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.22-1.22.0-150000.1.6.1 * go1.22-race-1.22.0-150000.1.6.1 * go1.22-doc-1.22.0-150000.1.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218424 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 16:39:09 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 16:39:09 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170749674984.20695.5470490485997802257@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 20:30:00 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 20:30:00 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170751060098.4669.8290591974894346635@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 20:33:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 20:33:02 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170751078237.13588.10567492667884010870@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 20:36:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 20:36:03 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170751096368.13588.15227785280658579773@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 9 20:39:04 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Feb 2024 20:39:04 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170751114495.13880.8014198598420706425@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 12:30:03 -0000 Subject: SUSE-RU-2024:0446-1: moderate: Recommended update for suse-migration-services Message-ID: <170774100327.4995.12356452441747429500@smelt2.prg2.suse.org> # Recommended update for suse-migration-services Announcement ID: SUSE-RU-2024:0446-1 Rating: moderate References: * bsc#1219004 Affected Products: * openSUSE Leap 15.5 An update that has one fix can now be installed. ## Description: This update for suse-migration-services fixes the following issues: * Address nose tests deprecation issues The Python 3.8 CI testing is failing with an error because we haven't addressed the nose tests support deprecation by renaming the setup() method to setup_method(). * Bind mount the configured certs location bsc#1219004 When the migration is running ensure that the correct certs directory is bind mounted from the /system-root into the ISO boot's runtime environment, by retrieving the configured server.certlocation setting from the /system- root/etc/regionserverclnt.cfg file. Default to the new cert location if a cert location cannot be determined. Log a message when no certs are present in the cert location, checking in the system being migrated, and after the bind mount of that path into the ISO runtime environment. Add unit tests for new get_regionsrv_certs_path() function and tweak some existing tests, that depend upon mocking calls to builtin.open(), so that they mock any calls to get_regionsrv_certs_path() so as to avoid triggering additional open() calls that would break those tests. * Remove target information that was confusing customers. Clarify SP4 support timeline * Added mailmap Don't lose contributions of the past ;) * Update kiwi config files to match current build versions * Clarify supported versions of SLES * Added block marker to listings to increase readability * Fixing variablelists that caused validation errors ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-446=1 ## Package List: * openSUSE Leap 15.5 (noarch) * suse-migration-pre-checks-2.0.38-150000.1.65.1 * suse-migration-services-2.0.38-150000.1.65.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219004 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170774100378.4995.11857426429774259048@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 12:33:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 12:33:04 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170774118498.5391.12826709897238641023@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 12:36:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 12:36:05 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170774136570.5767.803297917833347486@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 12:39:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 12:39:06 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170774154676.5439.1403468483128049442@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 16:30:00 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 16:30:00 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170775540085.13328.15582878628760987390@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 16:33:01 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 16:33:01 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170775558192.30068.11293346404243610635@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 16:36:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 16:36:03 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170775576300.29479.757450411609145683@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 16:39:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 16:39:05 -0000 Subject: SUSE-SU-2024:0442-1: important: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, cont Message-ID: <170775594545.30068.15892284444892305054@smelt2.prg2.suse.org> # Security update for cdi-apiserver-container, cdi-cloner-container, cdi- controller-container, cdi-importer-container, cdi-operator-container, cdi- uploadproxy-container, cdi-uploadserver-container, cont Announcement ID: SUSE-SU-2024:0442-1 Rating: important References: Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller- container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy- container, cdi-uploadserver-container, containerized-data-importer fixes the following issues: * Set ExclusiveArch conditionally depending on the distro * rebuild with current go release. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-442=1 SUSE-2024-442=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-442=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-442=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-1.58.0-150500.6.9.1 * containerized-data-importer-operator-1.58.0-150500.6.9.1 * containerized-data-importer-cloner-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-controller-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 * containerized-data-importer-importer-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-importer-1.58.0-150500.6.9.1 * containerized-data-importer-uploadserver-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 * containerized-data-importer-operator-debuginfo-1.58.0-150500.6.9.1 * containerized-data-importer-api-1.58.0-150500.6.9.1 * containerized-data-importer-api-debuginfo-1.58.0-150500.6.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 * Containers Module 15-SP5 (x86_64) * containerized-data-importer-manifests-1.58.0-150500.6.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 12 20:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Feb 2024 20:30:04 -0000 Subject: SUSE-SU-2024:0441-1: moderate: Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t Message-ID: <170776980485.19730.14230403116665768227@smelt2.prg2.suse.org> # Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t Announcement ID: SUSE-SU-2024:0441-1 Rating: moderate References: * bsc#1218174 Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one security fix can now be installed. ## Description: This update for kubevirt, virt-api-container, virt-controller-container, virt- exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator- container, virt-pr-helper-container fixes the following issues: Update to version 1.1.1: Release notes are on https://github.com/kubevirt/kubevirt/releases/tag/v1.1.1 * Fix seccomp profile for post-copy migration * Fix firmware path for aarch64 (/usr/share/AAVMF) * Fix test with initially invalid DataVolume (bsc#1218174) The containers were also rebuilt against updated go version. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-441=1 openSUSE-SLE-15.5-2024-441=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-441=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-441=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kubevirt-virt-controller-1.1.1-150500.8.9.1 * kubevirt-virt-exportproxy-debuginfo-1.1.1-150500.8.9.1 * obs-service-kubevirt_containers_meta-1.1.1-150500.8.9.1 * kubevirt-virt-api-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virt-exportproxy-1.1.1-150500.8.9.1 * kubevirt-virt-handler-1.1.1-150500.8.9.1 * kubevirt-virt-api-1.1.1-150500.8.9.1 * kubevirt-virt-launcher-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virt-operator-1.1.1-150500.8.9.1 * kubevirt-virt-exportserver-1.1.1-150500.8.9.1 * kubevirt-container-disk-debuginfo-1.1.1-150500.8.9.1 * kubevirt-tests-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virt-launcher-1.1.1-150500.8.9.1 * kubevirt-container-disk-1.1.1-150500.8.9.1 * kubevirt-pr-helper-conf-1.1.1-150500.8.9.1 * kubevirt-virt-operator-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virt-exportserver-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virt-handler-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virt-controller-debuginfo-1.1.1-150500.8.9.1 * kubevirt-virtctl-debuginfo-1.1.1-150500.8.9.1 * kubevirt-manifests-1.1.1-150500.8.9.1 * kubevirt-virtctl-1.1.1-150500.8.9.1 * kubevirt-tests-1.1.1-150500.8.9.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kubevirt-virtctl-debuginfo-1.1.1-150500.8.9.1 * kubevirt-manifests-1.1.1-150500.8.9.1 * kubevirt-virtctl-1.1.1-150500.8.9.1 * Containers Module 15-SP5 (x86_64) * kubevirt-virtctl-debuginfo-1.1.1-150500.8.9.1 * kubevirt-manifests-1.1.1-150500.8.9.1 * kubevirt-virtctl-1.1.1-150500.8.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218174 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:05 -0000 Subject: SUSE-RU-2024:0453-1: moderate: Recommended update for spack Message-ID: <170781318551.2637.14034205248963445600@smelt2.prg2.suse.org> # Recommended update for spack Announcement ID: SUSE-RU-2024:0453-1 Rating: moderate References: * bsc#1219480 Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 An update that has one fix can now be installed. ## Description: This update for spack fixes the following issues: spack was updated to version 0.21.1 (bsc#1219480): * Version 0.21.1: * Add support for reading buildcaches created by Spack v0.22 * Bugfixes: * `spack graph`: fix coloring with environments * `spack info`: sort variants in --variants-by-name * `Spec.format`: error on old style format strings * ASP-based solver: * fix infinite recursion when computing concretization errors * don't error for type mismatch on preferences * don't emit spurious debug output. * Improve the error message for deprecated preferences * Fix multi-word aliases * Add a warning for unconfigured compiler * environment: fix an issue with deconcretization/reconcretization of specs * buildcache: don't error if a patch is missing, when installing from binaries * Version 0.21.0: * New features: * Better error messages with condition chaining: In v0.18, we added better error messages that could tell you what problem happened, but they couldn't tell you why it happened. 0.21 adds condition chaining to the solver, and Spack can now trace back through the conditions that led to an error and build a tree of causes potential causes and where they came from. * OCI build caches: You can now use an arbitrary OCI registry as a build cache: * For Dockerhub: `$ spack mirror add my_registry oci://user/image` * For another registry (GHCR): `$ spack mirror add my_registry oci://ghcr.io/haampie/spack-test` Then set the login credentials: `$ spack mirror set --push --oci-username ... --oci-password ... my_registry` and push to it: `$ spack buildcache push my_registry [specs...]` You can optionally add a base image to get runnable images: `$ spack buildcache push --base-image leap:15.5 my_registry python` Pushed ... as [image]:python-3.11.2-65txfcpqbmpawclvtasuog4yzmxwaoia.spack $ docker run --rm -it [image]:python-3.11.2-65txfcpqbmpawclvtasuog4yzmxwaoia.spack` This creates a container image from the Spack installations on the host system, without the need to run `spack install` from a `Dockerfile` or `sif` file. It also addresses the inconvenience of losing binaries of dependencies when `RUN spack install` fails inside `docker build`. Further, the container image layers and build cache tarballs are the same files. This means that `spack install` and `docker pull` use the exact same underlying binaries. If you previously used `spack install` inside of docker build, this feature helps you save storage by a factor two. \+ Multiple versions of build dependencies: Increasingly, complex package builds require multiple versions of some build dependencies. For example, Python packages frequently require very specific versions of `setuptools`, `cython`, while different physics packages require different versions of Python to build. The concretizer enforced that every solve was unified, i.e., so that there was only one version of every package. The concretizer now supports "duplicate" nodes for build dependencies, but enforces unification through transitive link and run dependencies. This will allow it to better resolve complex dependency graphs in ecosystems like Python. \+ Cherry- picking virtual dependencies: You can now select only a subset of virtual dependencies from a spec that may provide more. For example, to make mpich your mpi provider, you can be explicit by writing: `hdf5 ^[virtuals=mpi] mpich` Or, to use, e.g., `intel-parallel-studio` for blas along with an external `lapack` like `openblas`, you could write: `strumpack ^[virtuals=mpi] intel-parallel-studio+mkl ^[virtuals=lapack] openblas`` The `virtuals=mpi` is an edge attribute, and dependency edges in Spack graphs now track which virtuals they satisfied. \+ The `spack deconcretize` command gives you control over what you want to update in an already concrete environment. As an example, with an environment built with meson, and you want to update your meson version, you can run: `$spack deconcretize meson` and have everything that depends on meson rebuilt the next time you run spack concretize. In the future, we'll handle this in a single command, but for now you can use this to drop bits of your lockfile and resolve your dependencies again. \+ UI Improvements: The `spack info` received a rework to make the output more appealing. It is now on par with the rest of Spack's UI. `spack info` now makes much better use of terminal space and shows variants, their values, and their descriptions more clearly. Conditional variants are grouped separately so you can more easily understand how packages are structured. `spack checksum` now allows you to filter versions from your editor, or by version range. It also notifies you about potential download URL changes. \+ Environments can include definitions: Spack did not previously support using `include:` with The definitions section of an environment, but now it does. You can use this to curate lists of specs and more easily reuse them across environments. \+ Aliases: You can now add aliases to Spack commands in `config.yaml`, e.g. this might enshrine your favorite args to `spack find` as `spack f`: `config: aliases: f: find -lv` * Improved autoloading of modules: In this release, you can start using `hide_implicits: true` instead, which exposes only explicitly installed packages to the user, while still autoloading dependencies. On top of that, you can safely use `hash_length: 0`, as this config now only applies to the modules exposed to the user -- you don't have to worry about file name clashes for hidden dependencies. Note: for Tcl this feature requires Modules 4.7 or higher * Other new commands and directives: * `spack env activate` without arguments now loads a default environment that you do not have to create. * `spack find -H` / `--hashes`: a new shortcut for piping spack find output to other commands. * Add `spack checksum --verify`, fix `--add`. * New `default_args` context manager factors out common args for directives. * `spack compiler find --[no]-mixed-toolchain` lets you easily mix clang and gfortran on Linux * Performance improvements: * `spack external find execution` is now much faster. * `spack location -i` is now much faster on success. * Drop redundant rpaths post install. * ASP-based solver: avoid cycles in clingo using hidden directive. * Fix multiple quadratic complexity issues in environments * Other new features of note: * archspec: update to v0.2.2, support for Sapphire Rapids, Power10, Neoverse V2. * Propagate variants across nodes that don't have that variant * Implement fish shell completion. * Can now distinguish between source/binary mirror; don't ping mirror.spack.io as much. * Improve status reporting on `spack install` (add [n/total] display...). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-453=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-453=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-453=1 ## Package List: * openSUSE Leap 15.4 (noarch) * spack-0.21.1-150400.12.1 * spack-info-0.21.1-150400.12.1 * spack-man-0.21.1-150400.12.1 * spack-recipes-0.21.1-150400.12.1 * openSUSE Leap 15.5 (noarch) * spack-0.21.1-150400.12.1 * spack-info-0.21.1-150400.12.1 * spack-man-0.21.1-150400.12.1 * spack-recipes-0.21.1-150400.12.1 * HPC Module 15-SP5 (noarch) * spack-0.21.1-150400.12.1 * spack-info-0.21.1-150400.12.1 * spack-man-0.21.1-150400.12.1 * spack-recipes-0.21.1-150400.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219480 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:07 -0000 Subject: SUSE-RU-2024:0452-1: moderate: Recommended update for spack Message-ID: <170781318705.2637.16687716586447492241@smelt2.prg2.suse.org> # Recommended update for spack Announcement ID: SUSE-RU-2024:0452-1 Rating: moderate References: * bsc#1219480 Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 An update that has one fix can now be installed. ## Description: This update for spack fixes the following issues: spack was updated to version 0.21.1 (bsc#1219480): * Version 0.21.1: * Add support for reading buildcaches created by Spack v0.22 * Bugfixes: * `spack graph`: fix coloring with environments * `spack info`: sort variants in --variants-by-name * `Spec.format`: error on old style format strings * ASP-based solver: * fix infinite recursion when computing concretization errors * don't error for type mismatch on preferences * don't emit spurious debug output. * Improve the error message for deprecated preferences * Fix multi-word aliases * Add a warning for unconfigured compiler * environment: fix an issue with deconcretization/reconcretization of specs * buildcache: don't error if a patch is missing, when installing from binaries * Version 0.21.0: * New features: * Better error messages with condition chaining: In v0.18, we added better error messages that could tell you what problem happened, but they couldn't tell you why it happened. 0.21 adds condition chaining to the solver, and Spack can now trace back through the conditions that led to an error and build a tree of causes potential causes and where they came from. * OCI build caches: You can now use an arbitrary OCI registry as a build cache: * For Dockerhub: `$ spack mirror add my_registry oci://user/image` * For another registry (GHCR): `$ spack mirror add my_registry oci://ghcr.io/haampie/spack-test` Then set the login credentials: `$ spack mirror set --push --oci-username ... --oci-password ... my_registry` and push to it: `$ spack buildcache push my_registry [specs...]` You can optionally add a base image to get runnable images: `$ spack buildcache push --base-image leap:15.5 my_registry python` Pushed ... as [image]:python-3.11.2-65txfcpqbmpawclvtasuog4yzmxwaoia.spack $ docker run --rm -it [image]:python-3.11.2-65txfcpqbmpawclvtasuog4yzmxwaoia.spack` This creates a container image from the Spack installations on the host system, without the need to run `spack install` from a `Dockerfile` or `sif` file. It also addresses the inconvenience of losing binaries of dependencies when `RUN spack install` fails inside `docker build`. Further, the container image layers and build cache tarballs are the same files. This means that `spack install` and `docker pull` use the exact same underlying binaries. If you previously used `spack install` inside of docker build, this feature helps you save storage by a factor two. \+ Multiple versions of build dependencies: Increasingly, complex package builds require multiple versions of some build dependencies. For example, Python packages frequently require very specific versions of `setuptools`, `cython`, while different physics packages require different versions of Python to build. The concretizer enforced that every solve was unified, i.e., so that there was only one version of every package. The concretizer now supports "duplicate" nodes for build dependencies, but enforces unification through transitive link and run dependencies. This will allow it to better resolve complex dependency graphs in ecosystems like Python. \+ Cherry- picking virtual dependencies: You can now select only a subset of virtual dependencies from a spec that may provide more. For example, to make mpich your mpi provider, you can be explicit by writing: `hdf5 ^[virtuals=mpi] mpich` Or, to use, e.g., `intel-parallel-studio` for blas along with an external `lapack` like `openblas`, you could write: `strumpack ^[virtuals=mpi] intel-parallel-studio+mkl ^[virtuals=lapack] openblas`` The `virtuals=mpi` is an edge attribute, and dependency edges in Spack graphs now track which virtuals they satisfied. \+ The `spack deconcretize` command gives you control over what you want to update in an already concrete environment. As an example, with an environment built with meson, and you want to update your meson version, you can run: `$spack deconcretize meson` and have everything that depends on meson rebuilt the next time you run spack concretize. In the future, we'll handle this in a single command, but for now you can use this to drop bits of your lockfile and resolve your dependencies again. \+ UI Improvements: The `spack info` received a rework to make the output more appealing. It is now on par with the rest of Spack's UI. `spack info` now makes much better use of terminal space and shows variants, their values, and their descriptions more clearly. Conditional variants are grouped separately so you can more easily understand how packages are structured. `spack checksum` now allows you to filter versions from your editor, or by version range. It also notifies you about potential download URL changes. \+ Environments can include definitions: Spack did not previously support using `include:` with The definitions section of an environment, but now it does. You can use this to curate lists of specs and more easily reuse them across environments. \+ Aliases: You can now add aliases to Spack commands in `config.yaml`, e.g. this might enshrine your favorite args to `spack find` as `spack f`: `config: aliases: f: find -lv` * Improved autoloading of modules: In this release, you can start using `hide_implicits: true` instead, which exposes only explicitly installed packages to the user, while still autoloading dependencies. On top of that, you can safely use `hash_length: 0`, as this config now only applies to the modules exposed to the user -- you don't have to worry about file name clashes for hidden dependencies. Note: for Tcl this feature requires Modules 4.7 or higher * Other new commands and directives: * `spack env activate` without arguments now loads a default environment that you do not have to create. * `spack find -H` / `--hashes`: a new shortcut for piping spack find output to other commands. * Add `spack checksum --verify`, fix `--add`. * New `default_args` context manager factors out common args for directives. * `spack compiler find --[no]-mixed-toolchain` lets you easily mix clang and gfortran on Linux * Performance improvements: * `spack external find execution` is now much faster. * `spack location -i` is now much faster on success. * Drop redundant rpaths post install. * ASP-based solver: avoid cycles in clingo using hidden directive. * Fix multiple quadratic complexity issues in environments * Other new features of note: * archspec: update to v0.2.2, support for Sapphire Rapids, Power10, Neoverse V2. * Propagate variants across nodes that don't have that variant * Implement fish shell completion. * Can now distinguish between source/binary mirror; don't ping mirror.spack.io as much. * Improve status reporting on `spack install` (add [n/total] display...). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-452=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-452=1 ## Package List: * openSUSE Leap 15.3 (noarch) * spack-info-0.21.1-150300.12.1 * spack-recipes-0.21.1-150300.12.1 * spack-0.21.1-150300.12.1 * spack-man-0.21.1-150300.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * spack-info-0.21.1-150300.12.1 * spack-recipes-0.21.1-150300.12.1 * spack-man-0.21.1-150300.12.1 * spack-0.21.1-150300.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219480 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:08 -0000 Subject: SUSE-RU-2024:0451-1: moderate: Recommended update for golang-github-vpenso-prometheus_slurm_exporter Message-ID: <170781318858.2637.11967785128655760119@smelt2.prg2.suse.org> # Recommended update for golang-github-vpenso-prometheus_slurm_exporter Announcement ID: SUSE-RU-2024:0451-1 Rating: moderate References: * jsc#PED-7818 * jsc#PED-7833 Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that contains two features can now be installed. ## Description: This update for golang-github-vpenso-prometheus_slurm_exporter fixes the following issues: * Ship package `golang-github-vpenso-prometheus_slurm_exporter` in HPC Module (x86_64, aarch64) * Fix to make GPU data gathering works with all Slurm versions since 18.08. * Add a sysconfig settings to make daemon command line args easily. * Fix service file names to match upstream: * `prometheus-slurm_exporter.service` was renamed to `prometheus-slurm- exporter.service` * `rcprometheus-slurm_exporter` was renamed to `rcprometheus-slurm-exporter` * To support updates, the old name is still kept as sym-link. * Added README.SUSE to inform about sysconfig file. * Multiple fixes to the README file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-451=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-451=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-451=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-451=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-451=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-451=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-451=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 * HPC Module 15-SP5 (aarch64 x86_64) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * golang-github-vpenso-prometheus_slurm_exporter-0.20-150300.3.8.1 ## References: * https://jira.suse.com/browse/PED-7818 * https://jira.suse.com/browse/PED-7833 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:09 -0000 Subject: SUSE-RU-2024:0450-1: moderate: Recommended update for imb Message-ID: <170781318999.2637.13961679489373248816@smelt2.prg2.suse.org> # Recommended update for imb Announcement ID: SUSE-RU-2024:0450-1 Rating: moderate References: * jsc#PED-7111 Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that contains one feature can now be installed. ## Description: This update for imb fixes the following issues: * Update to version 2021.7 * Change default value for mem_alloc_type to device * License update * Bug fixes * Currently not provided in SUSE: IMB-MPI1-GPU benchmark: Dynamically loading from LD_LIBRARY_PATH cuda or level zero library. * Drop support for openmpi[123] (jsc#PED-7111) * Prepare support for openmpi5 * Add build support for gcc11/12. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-450=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-450=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-450=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-450=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-450=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-450=1 ## Package List: * openSUSE Leap 15.4 (noarch) * imb-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * imb_2021_7-gnu-mpich-hpc-debuginfo-2021.7-150400.3.6.1 * imb-mvapich2-2021.7-150400.3.6.1 * imb-openmpi4-debuginfo-2021.7-150400.3.6.1 * imb-openmpi4-2021.7-150400.3.6.1 * imb-mvapich2-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debuginfo-2021.7-150400.3.6.1 * imb-mpich-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debuginfo-2021.7-150400.3.6.1 * imb-mpich-debuginfo-2021.7-150400.3.6.1 * imb-openmpi4-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debugsource-2021.7-150400.3.6.1 * imb-mpich-2021.7-150400.3.6.1 * imb-mvapich2-debuginfo-2021.7-150400.3.6.1 * openSUSE Leap 15.5 (noarch) * imb-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * imb_2021_7-gnu-mpich-hpc-debuginfo-2021.7-150400.3.6.1 * imb-mvapich2-2021.7-150400.3.6.1 * imb-openmpi4-debuginfo-2021.7-150400.3.6.1 * imb-openmpi4-2021.7-150400.3.6.1 * imb-mvapich2-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debuginfo-2021.7-150400.3.6.1 * imb-mpich-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debuginfo-2021.7-150400.3.6.1 * imb-mpich-debuginfo-2021.7-150400.3.6.1 * imb-openmpi4-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debugsource-2021.7-150400.3.6.1 * imb-mpich-2021.7-150400.3.6.1 * imb-mvapich2-debuginfo-2021.7-150400.3.6.1 * HPC Module 15-SP5 (noarch) * imb-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * HPC Module 15-SP5 (aarch64 x86_64) * imb_2021_7-gnu-openmpi3-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * imb-openmpi4-debugsource-2021.7-150400.3.6.1 * imb-mvapich2-2021.7-150400.3.6.1 * imb-openmpi4-debuginfo-2021.7-150400.3.6.1 * imb-openmpi4-2021.7-150400.3.6.1 * imb-mpich-2021.7-150400.3.6.1 * imb-mpich-debuginfo-2021.7-150400.3.6.1 * imb-mpich-debugsource-2021.7-150400.3.6.1 * imb-mvapich2-debugsource-2021.7-150400.3.6.1 * imb-mvapich2-debuginfo-2021.7-150400.3.6.1 * SUSE Package Hub 15 15-SP5 (noarch) * imb-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * imb-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * imb_2021_7-gnu-openmpi3-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * imb-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb-gnu-openmpi4-hpc-2021.7-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * imb_2021_7-gnu-openmpi3-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mpich-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debugsource-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-mvapich2-hpc-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi3-hpc-debuginfo-2021.7-150400.3.6.1 * imb_2021_7-gnu-openmpi4-hpc-2021.7-150400.3.6.1 ## References: * https://jira.suse.com/browse/PED-7111 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:11 -0000 Subject: SUSE-RU-2024:0449-1: moderate: Recommended update for pdsh Message-ID: <170781319179.2637.18051269518977752393@smelt2.prg2.suse.org> # Recommended update for pdsh Announcement ID: SUSE-RU-2024:0449-1 Rating: moderate References: * bsc#1212946 * jsc#PED-7817 * jsc#PED-7829 Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that contains two features and has one fix can now be installed. ## Description: This update for pdsh fixes the following issues: * pdsh was updated to version 2.35 (jsc#PED-7817, jsc#PED-7829): * Added `-d` option to log errors * Added `-k` option to fail fast on ssh failures or non-zero return code * build: use LDADD instead of LDFLAGS for libcommon.la * dsbak: fixed handling of empty input lines * Release a lock that is no longer used * slurm: add -C to restrict hostlist to nodes with features * slurm: call slurm_init() once before any call to Slurm API * slurm: fix compile of slurm plugin against Slurm >= 23.x * ssh: fixed sshcmd_signal on macos * Fixed missing pdsh-slurm options to run jobs against the slurm cluster (bsc#1212946) * Removed outdated and defunct project URI on Google: * The content can still be found in the archives at: https://code.google.com/archive/p/pdsh/. * The project has moved to github entirely. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-449=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-449=1 openSUSE-SLE-15.5-2024-449=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-449=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * pdsh-debugsource-2.35-150500.46.3.1 * pdsh-dshgroup-2.35-150500.46.3.1 * pdsh-slurm-2.35-150500.46.3.1 * pdsh-machines-2.35-150500.46.3.1 * pdsh-genders-debuginfo-2.35-150500.46.3.1 * pdsh-machines-debuginfo-2.35-150500.46.3.1 * pdsh-genders-2.35-150500.46.3.1 * pdsh-2.35-150500.46.3.1 * pdsh-netgroup-2.35-150500.46.3.1 * pdsh-netgroup-debuginfo-2.35-150500.46.3.1 * pdsh-dshgroup-debuginfo-2.35-150500.46.3.1 * pdsh-debuginfo-2.35-150500.46.3.1 * pdsh-slurm-debuginfo-2.35-150500.46.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * pdsh-debugsource-2.35-150500.46.3.1 * pdsh-dshgroup-2.35-150500.46.3.1 * pdsh-machines-2.35-150500.46.3.1 * pdsh-genders-debuginfo-2.35-150500.46.3.1 * pdsh-machines-debuginfo-2.35-150500.46.3.1 * pdsh-genders-2.35-150500.46.3.1 * pdsh-2.35-150500.46.3.1 * pdsh-netgroup-2.35-150500.46.3.1 * pdsh-netgroup-debuginfo-2.35-150500.46.3.1 * pdsh-dshgroup-debuginfo-2.35-150500.46.3.1 * pdsh-debuginfo-2.35-150500.46.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pdsh-slurm-debuginfo-2.35-150500.46.3.1 * pdsh-slurm-2.35-150500.46.3.1 * HPC Module 15-SP5 (aarch64 x86_64) * pdsh-debugsource-2.35-150500.46.3.1 * pdsh-dshgroup-2.35-150500.46.3.1 * pdsh-slurm-2.35-150500.46.3.1 * pdsh-machines-2.35-150500.46.3.1 * pdsh-genders-debuginfo-2.35-150500.46.3.1 * pdsh-machines-debuginfo-2.35-150500.46.3.1 * pdsh-genders-2.35-150500.46.3.1 * pdsh-2.35-150500.46.3.1 * pdsh-netgroup-2.35-150500.46.3.1 * pdsh-netgroup-debuginfo-2.35-150500.46.3.1 * pdsh-dshgroup-debuginfo-2.35-150500.46.3.1 * pdsh-debuginfo-2.35-150500.46.3.1 * pdsh-slurm-debuginfo-2.35-150500.46.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212946 * https://jira.suse.com/browse/PED-7817 * https://jira.suse.com/browse/PED-7829 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:13 -0000 Subject: SUSE-RU-2024:0448-1: moderate: Recommended update for pdsh Message-ID: <170781319332.2637.7926204737120307212@smelt2.prg2.suse.org> # Recommended update for pdsh Announcement ID: SUSE-RU-2024:0448-1 Rating: moderate References: * jsc#PED-7817 * jsc#PED-7829 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 An update that contains two features can now be installed. ## Description: This update for pdsh fixes the following issues: * pdsh was updated to version 2.35 (jsc#PED-7817, jsc#PED-7829): * Added `-d` option to log errors * Added `-k` option to fail fast on ssh failures or non-zero return code * build: use LDADD instead of LDFLAGS for libcommon.la * dsbak: fixed handling of empty input lines * Release a lock that is no longer used * slurm: add -C to restrict hostlist to nodes with features * slurm: call slurm_init() once before any call to Slurm API * slurm: fix compile of slurm plugin against Slurm >= 23.x * ssh: fixed sshcmd_signal on macos * Removed outdated and defunct project URI on Google: * The content can still be found in the archives at: https://code.google.com/archive/p/pdsh/. * The project has moved to github entirely. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-448=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-448=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-448=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-448=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-448=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pdsh-debugsource-2.35-150300.51.1 * pdsh-netgroup-2.35-150300.51.1 * pdsh-netgroup-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-debuginfo-2.35-150300.51.1 * pdsh-machines-2.35-150300.51.1 * pdsh-debuginfo-2.35-150300.51.1 * pdsh-2.35-150300.51.1 * pdsh-machines-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-2.35-150300.51.1 * pdsh-genders-2.35-150300.51.1 * pdsh-genders-debuginfo-2.35-150300.51.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * pdsh-slurm_23_02-2.35-150300.51.1 * pdsh-slurm-debuginfo-2.35-150300.51.1 * pdsh-slurm_22_05-debuginfo-2.35-150300.51.1 * pdsh_slurm_23_02-debugsource-2.35-150300.51.1 * pdsh-slurm_22_05-2.35-150300.51.1 * pdsh-slurm-2.35-150300.51.1 * pdsh-slurm_23_02-debuginfo-2.35-150300.51.1 * pdsh_slurm_22_05-debugsource-2.35-150300.51.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pdsh-slurm_22_05-2.35-150300.51.1 * pdsh-slurm_22_05-debuginfo-2.35-150300.51.1 * pdsh_slurm_22_05-debugsource-2.35-150300.51.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pdsh-slurm_23_02-2.35-150300.51.1 * pdsh-slurm-debuginfo-2.35-150300.51.1 * pdsh-debugsource-2.35-150300.51.1 * pdsh-netgroup-2.35-150300.51.1 * pdsh-slurm_22_05-debuginfo-2.35-150300.51.1 * pdsh-netgroup-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-debuginfo-2.35-150300.51.1 * pdsh-machines-2.35-150300.51.1 * pdsh-debuginfo-2.35-150300.51.1 * pdsh-2.35-150300.51.1 * pdsh-slurm_22_05-2.35-150300.51.1 * pdsh-machines-debuginfo-2.35-150300.51.1 * pdsh-slurm-2.35-150300.51.1 * pdsh-slurm_23_02-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-2.35-150300.51.1 * pdsh_slurm_22_05-debugsource-2.35-150300.51.1 * pdsh-genders-2.35-150300.51.1 * pdsh-genders-debuginfo-2.35-150300.51.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pdsh-slurm_23_02-2.35-150300.51.1 * pdsh-slurm-debuginfo-2.35-150300.51.1 * pdsh-debugsource-2.35-150300.51.1 * pdsh-netgroup-2.35-150300.51.1 * pdsh-slurm_22_05-debuginfo-2.35-150300.51.1 * pdsh-netgroup-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-debuginfo-2.35-150300.51.1 * pdsh-machines-2.35-150300.51.1 * pdsh-debuginfo-2.35-150300.51.1 * pdsh-2.35-150300.51.1 * pdsh-slurm_22_05-2.35-150300.51.1 * pdsh-machines-debuginfo-2.35-150300.51.1 * pdsh-slurm-2.35-150300.51.1 * pdsh-slurm_23_02-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-2.35-150300.51.1 * pdsh_slurm_22_05-debugsource-2.35-150300.51.1 * pdsh-genders-2.35-150300.51.1 * pdsh-genders-debuginfo-2.35-150300.51.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pdsh-slurm_23_02-2.35-150300.51.1 * pdsh-slurm-debuginfo-2.35-150300.51.1 * pdsh-debugsource-2.35-150300.51.1 * pdsh-netgroup-2.35-150300.51.1 * pdsh-slurm_22_05-debuginfo-2.35-150300.51.1 * pdsh-netgroup-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-debuginfo-2.35-150300.51.1 * pdsh-machines-2.35-150300.51.1 * pdsh-debuginfo-2.35-150300.51.1 * pdsh-2.35-150300.51.1 * pdsh-slurm_22_05-2.35-150300.51.1 * pdsh-machines-debuginfo-2.35-150300.51.1 * pdsh-slurm-2.35-150300.51.1 * pdsh-slurm_23_02-debuginfo-2.35-150300.51.1 * pdsh-dshgroup-2.35-150300.51.1 * pdsh_slurm_22_05-debugsource-2.35-150300.51.1 * pdsh-genders-2.35-150300.51.1 * pdsh-genders-debuginfo-2.35-150300.51.1 ## References: * https://jira.suse.com/browse/PED-7817 * https://jira.suse.com/browse/PED-7829 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 08:33:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 08:33:14 -0000 Subject: SUSE-RU-2024:0447-1: moderate: Recommended update for pdsh Message-ID: <170781319464.2637.4415597520462219288@smelt2.prg2.suse.org> # Recommended update for pdsh Announcement ID: SUSE-RU-2024:0447-1 Rating: moderate References: * jsc#PED-7817 * jsc#PED-7829 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 An update that contains two features can now be installed. ## Description: This update for pdsh fixes the following issues: * pdsh was updated to version 2.35 (jsc#PED-7817, jsc#PED-7829): * Added `-d` option to log errors * Added `-k` option to fail fast on ssh failures or non-zero return code * build: use LDADD instead of LDFLAGS for libcommon.la * dsbak: fixed handling of empty input lines * Release a lock that is no longer used * slurm: add -C to restrict hostlist to nodes with features * slurm: call slurm_init() once before any call to Slurm API * slurm: fix compile of slurm plugin against Slurm >= 23.x * ssh: fixed sshcmd_signal on macos * Removed outdated and defunct project URI on Google: * The content can still be found in the archives at: https://code.google.com/archive/p/pdsh/. * The project has moved to github entirely. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-447=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-447=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pdsh-slurm_20_11-debuginfo-2.35-150200.4.16.1 * pdsh_slurm_20_11-debugsource-2.35-150200.4.16.1 * pdsh-slurm_20_11-2.35-150200.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pdsh-2.35-150200.4.16.1 * pdsh-slurm_20_11-2.35-150200.4.16.1 * pdsh-genders-2.35-150200.4.16.1 * pdsh-genders-debuginfo-2.35-150200.4.16.1 * pdsh-debugsource-2.35-150200.4.16.1 * pdsh-debuginfo-2.35-150200.4.16.1 * pdsh-slurm_22_05-debuginfo-2.35-150200.4.16.1 * pdsh-slurm-debuginfo-2.35-150200.4.16.1 * pdsh-slurm_23_02-2.35-150200.4.16.1 * pdsh-machines-debuginfo-2.35-150200.4.16.1 * pdsh-slurm_23_02-debuginfo-2.35-150200.4.16.1 * pdsh-netgroup-2.35-150200.4.16.1 * pdsh-slurm_22_05-2.35-150200.4.16.1 * pdsh-machines-2.35-150200.4.16.1 * pdsh-netgroup-debuginfo-2.35-150200.4.16.1 * pdsh_slurm_22_05-debugsource-2.35-150200.4.16.1 * pdsh-dshgroup-2.35-150200.4.16.1 * pdsh-slurm-2.35-150200.4.16.1 * pdsh-dshgroup-debuginfo-2.35-150200.4.16.1 ## References: * https://jira.suse.com/browse/PED-7817 * https://jira.suse.com/browse/PED-7829 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 12:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 12:30:01 -0000 Subject: SUSE-RU-2024:0456-1: moderate: Recommended update for grub2 Message-ID: <170782740134.14296.15116172125425160648@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:0456-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for grub2 fixes the following issues: * Fix missing grub2 exporters on Leap ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-456=1 openSUSE-SLE-15.5-2024-456=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-456=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-456=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-456=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * grub2-2.06-150500.29.13.1 * grub2-branding-upstream-2.06-150500.29.13.1 * grub2-debuginfo-2.06-150500.29.13.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150500.29.13.1 * openSUSE Leap 15.5 (noarch) * grub2-powerpc-ieee1275-2.06-150500.29.13.1 * grub2-s390x-emu-extras-2.06-150500.29.13.1 * grub2-x86_64-efi-2.06-150500.29.13.1 * grub2-i386-xen-2.06-150500.29.13.1 * grub2-x86_64-efi-debug-2.06-150500.29.13.1 * grub2-x86_64-efi-extras-2.06-150500.29.13.1 * grub2-powerpc-ieee1275-extras-2.06-150500.29.13.1 * grub2-i386-efi-2.06-150500.29.13.1 * grub2-arm64-efi-2.06-150500.29.13.1 * grub2-arm64-efi-extras-2.06-150500.29.13.1 * grub2-i386-efi-extras-2.06-150500.29.13.1 * grub2-powerpc-ieee1275-debug-2.06-150500.29.13.1 * grub2-i386-pc-2.06-150500.29.13.1 * grub2-x86_64-xen-2.06-150500.29.13.1 * grub2-i386-xen-extras-2.06-150500.29.13.1 * grub2-systemd-sleep-plugin-2.06-150500.29.13.1 * grub2-i386-pc-debug-2.06-150500.29.13.1 * grub2-x86_64-xen-extras-2.06-150500.29.13.1 * grub2-arm64-efi-debug-2.06-150500.29.13.1 * grub2-i386-pc-extras-2.06-150500.29.13.1 * grub2-i386-efi-debug-2.06-150500.29.13.1 * grub2-snapper-plugin-2.06-150500.29.13.1 * openSUSE Leap 15.5 (s390x) * grub2-s390x-emu-debug-2.06-150500.29.13.1 * grub2-s390x-emu-2.06-150500.29.13.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * grub2-2.06-150500.29.13.1 * grub2-debugsource-2.06-150500.29.13.1 * grub2-debuginfo-2.06-150500.29.13.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * grub2-arm64-efi-2.06-150500.29.13.1 * grub2-snapper-plugin-2.06-150500.29.13.1 * grub2-x86_64-efi-2.06-150500.29.13.1 * grub2-i386-pc-2.06-150500.29.13.1 * grub2-x86_64-xen-2.06-150500.29.13.1 * SUSE Linux Enterprise Micro 5.5 (s390x) * grub2-s390x-emu-2.06-150500.29.13.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * grub2-2.06-150500.29.13.1 * grub2-debuginfo-2.06-150500.29.13.1 * Basesystem Module 15-SP5 (noarch) * grub2-systemd-sleep-plugin-2.06-150500.29.13.1 * grub2-powerpc-ieee1275-2.06-150500.29.13.1 * grub2-arm64-efi-2.06-150500.29.13.1 * grub2-snapper-plugin-2.06-150500.29.13.1 * grub2-x86_64-efi-2.06-150500.29.13.1 * grub2-i386-pc-2.06-150500.29.13.1 * Basesystem Module 15-SP5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.13.1 * Basesystem Module 15-SP5 (s390x) * grub2-s390x-emu-2.06-150500.29.13.1 * Server Applications Module 15-SP5 (noarch) * grub2-x86_64-xen-2.06-150500.29.13.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0455-1: important: Security update for squid Message-ID: <170782740427.14296.4347814325888608691@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2024:0455-1 Rating: important References: * bsc#1217654 * bsc#1219131 Cross-References: * CVE-2023-50269 * CVE-2024-23638 CVSS scores: * CVE-2023-50269 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50269 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23638 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23638 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2023-50269: fixed X-Forwarded-For Stack Overflow. (bsc#1217654) * CVE-2024-23638: fixed Denial of Service attack against Cache Manager error responses. (bsc#1219131) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-455=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-455=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-455=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-455=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-455=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-455=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-455=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-455=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-455=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-455=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Manager Proxy 4.3 (x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.23.1 * squid-5.7-150400.3.23.1 * squid-debugsource-5.7-150400.3.23.1 ## References: * https://www.suse.com/security/cve/CVE-2023-50269.html * https://www.suse.com/security/cve/CVE-2024-23638.html * https://bugzilla.suse.com/show_bug.cgi?id=1217654 * https://bugzilla.suse.com/show_bug.cgi?id=1219131 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0462-1: important: Security update for openvswitch Message-ID: <170784180504.25157.5557385611704735875@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0462-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-462=1 ## Package List: * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * openvswitch-debugsource-2.11.5-150100.3.24.1 * python2-ovs-debuginfo-2.11.5-150100.3.24.1 * libopenvswitch-2_11-0-2.11.5-150100.3.24.1 * python2-ovs-2.11.5-150100.3.24.1 * openvswitch-debuginfo-2.11.5-150100.3.24.1 * libopenvswitch-2_11-0-debuginfo-2.11.5-150100.3.24.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 16:30:06 -0000 Subject: SUSE-SU-2024:0461-1: moderate: Security update for libxml2 Message-ID: <170784180668.25157.10240492412916961915@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2024:0461-1 Rating: moderate References: * bsc#1219576 Cross-References: * CVE-2024-25062 CVSS scores: * CVE-2024-25062 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25062 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-461=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-461=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-461=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-461=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python-libxml2-python-debugsource-2.9.7-150000.3.66.1 * libxml2-tools-debuginfo-2.9.7-150000.3.66.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.66.1 * libxml2-tools-2.9.7-150000.3.66.1 * libxml2-debugsource-2.9.7-150000.3.66.1 * libxml2-2-2.9.7-150000.3.66.1 * libxml2-2-debuginfo-2.9.7-150000.3.66.1 * python3-libxml2-python-2.9.7-150000.3.66.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python-libxml2-python-debugsource-2.9.7-150000.3.66.1 * libxml2-tools-debuginfo-2.9.7-150000.3.66.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.66.1 * libxml2-tools-2.9.7-150000.3.66.1 * libxml2-debugsource-2.9.7-150000.3.66.1 * libxml2-2-2.9.7-150000.3.66.1 * libxml2-2-debuginfo-2.9.7-150000.3.66.1 * python3-libxml2-python-2.9.7-150000.3.66.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-libxml2-python-debugsource-2.9.7-150000.3.66.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.66.1 * python3-libxml2-python-2.9.7-150000.3.66.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libxml2-tools-debuginfo-2.9.7-150000.3.66.1 * libxml2-tools-2.9.7-150000.3.66.1 * libxml2-debugsource-2.9.7-150000.3.66.1 * libxml2-2-2.9.7-150000.3.66.1 * libxml2-2-debuginfo-2.9.7-150000.3.66.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25062.html * https://bugzilla.suse.com/show_bug.cgi?id=1219576 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 16:30:08 -0000 Subject: SUSE-SU-2024:0460-1: important: Security update for rekor Message-ID: <170784180874.25157.7791064607160099329@smelt2.prg2.suse.org> # Security update for rekor Announcement ID: SUSE-SU-2024:0460-1 Rating: important References: * bsc#1218207 * jsc#SLE-23476 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for rekor fixes the following issues: update to 1.3.5 (jsc#SLE-23476): * Additional unique index correction * Remove timestamp from checkpoint * Drop conditional when verifying entry checkpoint * Fix panic for DSSE canonicalization * Change Redis value for locking mechanism * give log timestamps nanosecond precision * output trace in slog and override correlation header name * bumped embedded golang.org/x/crypto/ssh to fix the Terrapin attack CVE-2023-48795 (bsc#1218207) Updated to 1.3.4: * add mysql indexstorage backend * add s3 storage for attestations * fix: Do not check for pubsub.topics.get on initialization * fix optional field in cose schema * Update ranges.go * update indexstorage interface to reduce roundtrips * use a single validator library in rekor-cli * Remove go-playground/validator dependency from pkg/pki Updated to rekor 1.3.3 (jsc#SLE-23476): * Update signer flag description * update trillian to 1.5.3 * adds redis_auth * Add method to get artifact hash for an entry * make e2e tests more usable with docker-compose * install go at correct version for codeql Updated to rekor 1.3.2 (jsc#SLE-23476): Updated to rekor 1.3.1 (jsc#SLE-23476): New Features: * enable GCP cloud profiling on rekor-server (#1746) * move index storage into interface (#1741) * add info to readme to denote additional documentation sources (#1722) * Add type of ed25519 key for TUF (#1677) * Allow parsing base64-encoded TUF metadata and root content (#1671) Quality Enhancements: * disable quota in trillian in test harness (#1680) Bug Fixes: * Update contact for code of conduct (#1720) * Fix panic when parsing SSH SK pubkeys (#1712) * Correct index creation (#1708) * docs: fixzes a small typo on the readme (#1686) * chore: fix backfill-redis Makefile target (#1685) Updated to rekor 1.3.0 (jsc#SLE-23476): * Update openapi.yaml (#1655) * pass transient errors through retrieveLogEntry (#1653) * return full entryID on HTTP 409 responses (#1650) * feat: Support publishing new log entries to Pub/Sub topics (#1580) * Change values of Identity.Raw, add fingerprints (#1628) * Extract all subjects from SANs for x509 verifier (#1632) * Fix type comment for Identity struct (#1619) * Refactor Identities API (#1611) * Refactor Verifiers to return multiple keys (#1601) * Update checkpoint link (#1597) * Use correct log index in inclusion proof (#1599) * remove instrumentation library (#1595) Updated to rekor 1.2.2 (jsc#SLE-23476): * pass down error with message instead of nil * swap killswitch for 'docker-compose restart' * CVE-2023-48795: Fixed Terrapin attack in embedded golang.org/x/crypto/ssh (bsc#1218207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-460=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-460=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-460=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rekor-debuginfo-1.3.5-150400.4.19.1 * rekor-1.3.5-150400.4.19.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rekor-1.3.5-150400.4.19.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rekor-1.3.5-150400.4.19.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218207 * https://jira.suse.com/browse/SLE-23476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 16:30:12 -0000 Subject: SUSE-SU-2024:0459-1: important: Security update for runc Message-ID: <170784181202.25157.5366550744028424625@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2024:0459-1 Rating: important References: * bsc#1218894 Cross-References: * CVE-2024-21626 CVSS scores: * CVE-2024-21626 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2024-21626 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Containers Module 15-SP4 * Containers Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for runc fixes the following issues: * Update to runc v1.1.12 (bsc#1218894) The following CVE was already fixed with the previous release. * CVE-2024-21626: Fixed container breakout. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-459=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-459=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-459=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-459=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-459=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-459=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-459=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-459=1 * Containers Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2024-459=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-459=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-459=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-459=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-459=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-459=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-459=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-459=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-459=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-459=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-459=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-459=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-459=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-459=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-459=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-459=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * Containers Module 15-SP4 (aarch64 ppc64le s390x) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * runc-1.1.12-150000.61.2 * runc-debuginfo-1.1.12-150000.61.2 ## References: * https://www.suse.com/security/cve/CVE-2024-21626.html * https://bugzilla.suse.com/show_bug.cgi?id=1218894 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 16:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 16:30:13 -0000 Subject: SUSE-RU-2024:0458-1: moderate: Recommended update for hwdata Message-ID: <170784181396.25157.12574747179887934098@smelt2.prg2.suse.org> # Recommended update for hwdata Announcement ID: SUSE-RU-2024:0458-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that can now be installed. ## Description: This update for hwdata fixes the following issues: * Update to version 0.378 * Update pci, usb and vendor ids ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-458=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-458=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-458=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-458=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-458=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-458=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-458=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-458=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-458=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-458=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-458=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-458=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-458=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-458=1 ## Package List: * openSUSE Leap Micro 5.3 (noarch) * hwdata-0.378-150000.3.65.1 * openSUSE Leap Micro 5.4 (noarch) * hwdata-0.378-150000.3.65.1 * openSUSE Leap 15.5 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Manager Client Tools for SLE 15 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * hwdata-0.378-150000.3.65.1 * Basesystem Module 15-SP5 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * hwdata-0.378-150000.3.65.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * hwdata-0.378-150000.3.65.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 13 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Feb 2024 16:30:15 -0000 Subject: SUSE-RU-2024:0457-1: moderate: Recommended update for python-kiwi Message-ID: <170784181576.25157.12143356030636972488@smelt2.prg2.suse.org> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2024:0457-1 Rating: moderate References: * jsc#PED-7180 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Fix overwrite of kiwi_oemunattended: ensure that the overwrite happens in the early initialize method which provides the environment for all code running in the dracut module * Allow install disk overwrite from cmdline (jsc#PED-7180): add rd.kiwi.oem.installdevice=DEVICE, which configures the disk device that should be used in an OEM installation ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-457=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-457=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-457=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-457=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-457=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-457=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-457=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-457=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-457=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-457=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-457=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-457=1 ## Package List: * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kiwi-systemdeps-filesystems-9.24.43-150100.3.68.1 * kiwi-systemdeps-iso-media-9.24.43-150100.3.68.1 * dracut-kiwi-overlay-9.24.43-150100.3.68.1 * python3-kiwi-9.24.43-150100.3.68.1 * kiwi-systemdeps-disk-images-9.24.43-150100.3.68.1 * kiwi-tools-debuginfo-9.24.43-150100.3.68.1 * kiwi-man-pages-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-live-9.24.43-150100.3.68.1 * kiwi-systemdeps-core-9.24.43-150100.3.68.1 * kiwi-tools-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * kiwi-systemdeps-bootloaders-9.24.43-150100.3.68.1 * kiwi-systemdeps-9.24.43-150100.3.68.1 * kiwi-systemdeps-image-validation-9.24.43-150100.3.68.1 * kiwi-systemdeps-containers-9.24.43-150100.3.68.1 * Development Tools Module 15-SP5 (x86_64) * kiwi-pxeboot-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kiwi-systemdeps-filesystems-9.24.43-150100.3.68.1 * kiwi-systemdeps-iso-media-9.24.43-150100.3.68.1 * dracut-kiwi-overlay-9.24.43-150100.3.68.1 * python3-kiwi-9.24.43-150100.3.68.1 * kiwi-systemdeps-disk-images-9.24.43-150100.3.68.1 * kiwi-tools-debuginfo-9.24.43-150100.3.68.1 * kiwi-man-pages-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-live-9.24.43-150100.3.68.1 * kiwi-systemdeps-core-9.24.43-150100.3.68.1 * kiwi-tools-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * kiwi-systemdeps-bootloaders-9.24.43-150100.3.68.1 * kiwi-systemdeps-9.24.43-150100.3.68.1 * kiwi-systemdeps-image-validation-9.24.43-150100.3.68.1 * kiwi-systemdeps-containers-9.24.43-150100.3.68.1 * openSUSE Leap 15.5 (x86_64) * kiwi-pxeboot-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * python-kiwi-debugsource-9.24.43-150100.3.68.1 * dracut-kiwi-oem-repart-9.24.43-150100.3.68.1 * dracut-kiwi-oem-dump-9.24.43-150100.3.68.1 * dracut-kiwi-lib-9.24.43-150100.3.68.1 ## References: * https://jira.suse.com/browse/PED-7180 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:30:15 -0000 Subject: SUSE-SU-2024:0469-1: important: Security update for the Linux Kernel Message-ID: <170792821552.27394.5705815854189708941@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0469-1 Rating: important References: * bsc#1065729 * bsc#1108281 * bsc#1141539 * bsc#1174649 * bsc#1181674 * bsc#1193285 * bsc#1194869 * bsc#1209834 * bsc#1210443 * bsc#1211515 * bsc#1212091 * bsc#1214377 * bsc#1215275 * bsc#1215885 * bsc#1216441 * bsc#1216559 * bsc#1216702 * bsc#1217895 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218005 * bsc#1218447 * bsc#1218527 * bsc#1218659 * bsc#1218713 * bsc#1218723 * bsc#1218730 * bsc#1218738 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218778 * bsc#1218779 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1218916 * bsc#1218948 * bsc#1218958 * bsc#1218968 * bsc#1218997 * bsc#1219006 * bsc#1219012 * bsc#1219013 * bsc#1219014 * bsc#1219053 * bsc#1219067 * bsc#1219120 * bsc#1219128 * bsc#1219136 * bsc#1219285 * bsc#1219349 * bsc#1219412 * bsc#1219429 * bsc#1219434 * bsc#1219490 * bsc#1219512 * bsc#1219568 * bsc#1219582 * jsc#PED-4729 * jsc#PED-6694 * jsc#PED-7322 * jsc#PED-7615 * jsc#PED-7616 * jsc#PED-7620 * jsc#PED-7622 * jsc#PED-7623 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-4921 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6531 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0565 * CVE-2024-0641 * CVE-2024-0775 * CVE-2024-1085 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Real Time Module 15-SP5 An update that solves 19 vulnerabilities, contains eight features and has 41 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429). * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes). * ACPI: LPSS: Fix the fractional clock divider flags (git-fixes). * ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377) * ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes). * ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377) * ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes). * ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377) * ACPI: video: check for error while searching for backlight device parent (git-fixes). * ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git- fixes). * ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes). * ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes). * ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes). * ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes). * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes). * ALSA: hda: Refer to correct stream index at loops (git-fixes). * ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git- fixes). * ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes). * ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes). * ASoC: Intel: Skylake: mem leak in skl register function (git-fixes). * ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git- fixes). * ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes). * ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136). * ASoC: amd: Add check for acp config flags (bsc#1219136). * ASoC: amd: Add new dmi entries to config entry (bsc#1219136). * ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136). * ASoC: amd: Drop empty platform remove function (bsc#1219136). * ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136). * ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes). * ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136). * ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136). * ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136). * ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136). * ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136). * ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes). * ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136). * ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136). * ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136). * ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136). * ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136). * ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136). * ASoC: amd: acp: Refactor bit width calculation (bsc#1219136). * ASoC: amd: acp: Refactor dai format implementation (bsc#1219136). * ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136). * ASoC: amd: acp: add a label to make error path more clean (bsc#1219136). * ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136). * ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136). * ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136). * ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136). * ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136). * ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136). * ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136). * ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136). * ASoC: amd: acp: move pdm macros to common header file (bsc#1219136). * ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136). * ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136). * ASoC: amd: acp: remove acp poweroff function (bsc#1219136). * ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136). * ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136). * ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136). * ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136). * ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136). * ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136). * ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136). * ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136). * ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136). * ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136). * ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136). * ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136). * ASoC: amd: add acp6.2 irq handler (bsc#1219136). * ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136). * ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136). * ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136). * ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136). * ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136). * ASoC: amd: fix ACP version typo mistake (bsc#1219136). * ASoC: amd: fix spelling mistake: "i.e" -> "i.e." (bsc#1219136). * ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136). * ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136). * ASoC: amd: ps: Update copyright notice (bsc#1219136). * ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136). * ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136). * ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136). * ASoC: amd: ps: move irq handler registration (bsc#1219136). * ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136). * ASoC: amd: ps: refactor platform device creation logic (bsc#1219136). * ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136). * ASoC: amd: ps: remove unused variable (bsc#1219136). * ASoC: amd: ps: update dev index value in irq handler (bsc#1219136). * ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136). * ASoC: amd: ps: update the acp clock source (bsc#1219136). * ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136). * ASoC: amd: ps: use static function (bsc#1219136). * ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: update pm_runtime enable sequence (bsc#1219136). * ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136). * ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136). * ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136). * ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136). * ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136). * ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136). * ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136). * ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136). * ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136). * ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136). * ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136). * ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136). * ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136). * ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136). * ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136). * ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136). * ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136). * ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136). * ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes). * ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes). * ASoC: codecs: wcd938x: handle deferred probe (git-fixes). * ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes). * ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes). * ASoC: cs43130: Fix the position of const qualifier (git-fixes). * ASoC: da7219: Support low DC impedance headset (git-fixes). * ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes). * ASoC: ops: add correct range check for limiting volume (git-fixes). * ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes). * ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes). * ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes). * ASoC: wm8974: Correct boost mixer inputs (git-fixes). * Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136). * Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes). * Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes). * Documentation: Begin a RAS section (jsc#PED-7622). * EDAC/amd64: Add context struct (jsc#PED-7615). * EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615). * EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616). * EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615). * EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622). * EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615). * EDAC/amd64: Cache and use GPU node map (jsc#PED-7616). * EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615). * EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616). * EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615). * EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615). * EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615). * EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615). * EDAC/amd64: Remove early_channel_count() (jsc#PED-7615). * EDAC/amd64: Remove module version string (jsc#PED-7615). * EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615). * EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615). * EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615). * EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615). * EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615). * EDAC/mc: Add new HBM2 memory type (jsc#PED-7616). * EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622). * EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622). * EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes). * Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738) * HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes). * HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes). * IB/iser: Prevent invalidating wrong MR (git-fixes) * Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes). * Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes). * Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git- fixes). * Input: atkbd - use ab83 as id when skipping the getid command (git-fixes). * Input: bcm5974 - check endpoint type before starting traffic (git-fixes). * Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes). * Input: xpad - add Razer Wolverine V2 support (git-fixes). * KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes). * KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * PCI/AER: Configure ECRC only if AER is native (bsc#1218778) * PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes). * PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes). * PCI: keystone: Fix race condition when initializing PHYs (git-fixes). * PM: hibernate: Enforce ordering during image compression/decompression (git- fixes). * RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes) * RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes) * RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes) * RDMA/irdma: Add wait for suspend on SQD (git-fixes) * RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes) * RDMA/irdma: Do not modify to SQD on error (git-fixes) * RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes) * RDMA/irdma: Refactor error handling in create CQP (git-fixes) * RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes) * RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes) * RDMA/rtrs-clt: Start hb after path_up (git-fixes) * RDMA/rtrs-srv: Check return values while processing info request (git-fixes) * RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git- fixes) * RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes) * RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git- fixes) * RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes) * USB: xhci: workaround for grace period (git-fixes). * Update config files: enable ASoC AMD PS drivers (bsc#1219136) * Update patch reference for ax88179 fix (bsc#1218948) * acpi: property: Let args be NULL in __acpi_node_get_property_reference (git- fixes). * aio: fix mremap after fork null-deref (git-fixes). * apparmor: avoid crash when parsed profile name is empty (git-fixes). * arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729) * arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV. * arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729) * arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes) * arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git- fixes) * arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes) * arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes) * arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes) * arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes) * arm64: module: move find_section to header (jsc#PED-4729) * arm64: vdso: Fix "no previous prototype" warning (jsc#PED-4729) * arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729) * arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729) * asix: Add check for usbnet_get_endpoints (git-fixes). * attr: block mode changes of symlinks (git-fixes). * badblocks: add helper routines for badblock ranges handling (bsc#1174649). * badblocks: add more helper structure and routines in badblocks.h (bsc#1174649). * badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649). * badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649). * badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649). * badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649). * badblocks: switch to the improved badblock handling code (bsc#1174649). * bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes). * bus: mhi: host: Add alignment check for event ring read pointer (git-fixes). * bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git- fixes). * bus: mhi: host: Drop chan lock before queuing buffers (git-fixes). * ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568). * clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes). * clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes). * clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes). * clk: samsung: Fix kernel-doc comments (git-fixes). * clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git- fixes). * clk: zynqmp: Add a check for NULL pointer (git-fixes). * clk: zynqmp: make bestdiv unsigned (git-fixes). * clocksource: Skip watchdog check for large watchdog intervals (git-fixes). * clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885). * coresight: etm4x: Add ACPI support in platform driver (bsc#1218779) * coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779) * coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779) * coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779) * coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779) * coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779) * coresight: platform: acpi: Ignore the absence of graph (bsc#1218779) * crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes). * crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes). * crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes). * crypto: sahara - do not resize req->src when doing hash operations (git- fixes). * crypto: sahara - fix ahash reqsize (git-fixes). * crypto: sahara - fix ahash selftest failure (git-fixes). * crypto: sahara - fix cbc selftest failure (git-fixes). * crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes). * crypto: sahara - fix processing requests with cryptlen < sg->length (git- fixes). * crypto: sahara - fix wait_for_completion_timeout() error handling (git- fixes). * crypto: sahara - handle zero-length aes requests (git-fixes). * crypto: sahara - improve error handling in sahara_sha_process() (git-fixes). * crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes). * crypto: scomp - fix req->dst buffer overflow (git-fixes). * dma-debug: fix kernel-doc warnings (git-fixes). * dmaengine: fix NULL pointer in channel unregistration function (git-fixes). * dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git- fixes). * dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes). * dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes). * dmaengine: ti: k3-udma: Report short packet errors (git-fixes). * doc/README.KSYMS: Add to repo. * drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes). * drivers: clk: zynqmp: calculate closest mux rate (git-fixes). * drivers: clk: zynqmp: update divider round rate logic (git-fixes). * drm/amd/display: Fix tiled display misalignment (git-fixes). * drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git- fixes). * drm/amd/display: add nv12 bounding box (git-fixes). * drm/amd/display: get dprefclk ss info from integration info table (git- fixes). * drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes). * drm/amd/display: pbn_div need be updated for hotplug event (git-fixes). * drm/amd/display: update dcn315 lpddr pstate latency (git-fixes). * drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes). * drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git- fixes). * drm/amd/pm: fix a double-free in si_dpm_init (git-fixes). * drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes). * drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes). * drm/amdgpu/pm: Fix the power source flag error (git-fixes). * drm/amdgpu: Add NULL checks for function pointers (git-fixes). * drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes). * drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes). * drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes). * drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes). * drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git- fixes). * drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes). * drm/amdgpu: Let KFD sync with VM fences (git-fixes). * drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes). * drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git- fixes). * drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes). * drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes). * drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes). * drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git- fixes). * drm/amdkfd: Fix lock dependency warning (git-fixes). * drm/amdkfd: Fix lock dependency warning with srcu (git-fixes). * drm/amdkfd: Use resource_size() helper function (git-fixes). * drm/amdkfd: fixes for HMM mem allocation (git-fixes). * drm/bridge: Fix typo in post_disable() description (git-fixes). * drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes). * drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes). * drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes). * drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes). * drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes). * drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes). * drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git- fixes). * drm/bridge: tc358767: Fix return value on error case (git-fixes). * drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes). * drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes). * drm/crtc: fix uninitialized variable use (git-fixes). * drm/drv: propagate errors from drm_modeset_register_all() (git-fixes). * drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git- fixes). * drm/exynos: fix a potential error pointer dereference (git-fixes). * drm/exynos: fix a wrong error checking (git-fixes). * drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes). * drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git- fixes). * drm/framebuffer: Fix use of uninitialized variable (git-fixes). * drm/mediatek: Return error if MDP RDMA failed to enable the clock (git- fixes). * drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes). * drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes). * drm/msm/dpu: Set input_sel bit for INTF (git-fixes). * drm/msm/dpu: fix writeback programming for YUV cases (git-fixes). * drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes). * drm/msm/dsi: Enable runtime PM (git-fixes). * drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git- fixes). * drm/msm/mdp4: flush vblank event on disable (git-fixes). * drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git- fixes). * drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes). * drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes). * drm/panel: nt35510: fix typo (git-fixes). * drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git- fixes). * drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git- fixes). * drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes). * drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git- fixes). * drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git- fixes). * drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git- fixes). * drm/radeon: check return value of radeon_ring_lock() (git-fixes). * drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes). * drm/tidss: Check for K2G in in dispc_softreset() (git-fixes). * drm/tidss: Fix atomic_flush check (git-fixes). * drm/tidss: Fix dss reset (git-fixes). * drm/tidss: Move reset to the end of dispc_init() (git-fixes). * drm/tidss: Return error value from from softreset (git-fixes). * drm/tilcdc: Fix irq free on unload (git-fixes). * drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes). * drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git- fixes). * drm: using mul_u32_u32() requires linux/math64.h (git-fixes). * dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694) * efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes). * eventfd: prevent underflow for eventfd semaphores (git-fixes). * exfat: fix reporting fs error when reading dir beyond EOF (git-fixes). * exfat: support handle zero-size directory (git-fixes). * exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes). * fbdev: Only disable sysfb on the primary device (bsc#1216441) * fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441. * fbdev: flush deferred IO before closing (git-fixes). * fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes). * fbdev: imxfb: fix left margin setting (git-fixes). * fbdev: mmp: Fix typo and wording in code comment (git-fixes). * firewire: core: correct documentation of fw_csr_string() kernel API (git- fixes). * firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes). * firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes). * fjes: fix memleaks in fjes_hw_setup (git-fixes). * fs/mount_setattr: always cleanup mount_kattr (git-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes). * fs: Move notify_change permission checks into may_setattr (git-fixes). * fs: do not audit the capability check in simple_xattr_list() (git-fixes). * fs: drop peer group ids under namespace lock (git-fixes). * fs: indicate request originates from old mount API (git-fixes). * fs: sendfile handles O_NONBLOCK of out_fd (git-fixes). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * gfs2: Always check inode size of inline inodes (git-fixes). * gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes). * gfs2: Disable page faults during lockless buffered reads (git-fixes). * gfs2: Eliminate ip->i_gh (git-fixes). * gfs2: Eliminate vestigial HIF_FIRST (git-fixes). * gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes). * gfs2: Introduce flag for glock holder auto-demotion (git-fixes). * gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes). * gfs2: Remove redundant check from gfs2_glock_dq (git-fixes). * gfs2: Switch to wait_event in gfs2_logd (git-fixes). * gfs2: assign rgrp glock before compute_bitstructs (git-fixes). * gfs2: low-memory forced flush fixes (git-fixes). * gfs2: release iopen glock early in evict (git-fixes). * gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes). * gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes). * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * hwmon: (corsair-psu) Fix probe when built-in (git-fixes). * hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes). * i2c: rk3x: fix potential spinlock recursion on poll (git-fixes). * i2c: s3c24xx: fix read transfers in polling mode (git-fixes). * i2c: s3c24xx: fix transferring more than one message in polling mode (git- fixes). * iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes). * iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes). * iio: adc: ad9467: do not ignore error codes (git-fixes). * iio: adc: ad9467: fix reset gpio handling (git-fixes). * ipmi: Use regspacings passed as a module parameter (git-fixes). * kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136) * kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported * kdb: Fix a potential buffer overflow in kdb_local() (git-fixes). * kernel-doc: handle a void function without producing a warning (git-fixes). * kernel-source: Fix description typo * kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git- fixes). * leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes). * leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes). * libapi: Add missing linux/types.h header to get the __u64 type on io.h (git- fixes). * md: fix bi_status reporting in md_end_clone_io (bsc#1210443). * media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes). * media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes). * media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes). * media: imx355: Enable runtime PM before registering async sub-device (git- fixes). * media: ov9734: Enable runtime PM before registering async sub-device (git- fixes). * media: pvrusb2: fix use after free on context disconnection (git-fixes). * media: rkisp1: Disable runtime PM in probe error path (git-fixes). * media: rkisp1: Fix media device memory leak (git-fixes). * media: rkisp1: Read the ID register at probe time instead of streamon (git- fixes). * media: videobuf2-dma-sg: fix vmap callback (git-fixes). * mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes). * misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes). * mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases. * mkspec: Use variant in constraints template Constraints are not applied consistently with kernel package variants. Add variant to the constraints template as appropriate, and expand it in mkspec. * mm: fs: initialize fsdata passed to write_begin/write_end interface (git- fixes). * mmc: core: Cancel delayed work before releasing host (git-fixes). * modpost: move **attribute** ((format(printf, 2, 3))) to modpost.h (git- fixes). * mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes). * mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git- fixes). * mtd: rawnand: pl353: Fix kernel doc (git-fixes). * mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git- fixes). * mtd: rawnand: rockchip: Rename a structure (git-fixes). * net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes). * net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948). * net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948). * net: usb: ax88179_178a: move priv to driver_priv (git-fixes). * net: usb: ax88179_178a: remove redundant init code (git-fixes). * net: usb: ax88179_178a: restore state on resume (bsc#1218948). * nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes). * nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349). * nfsd: fix RELEASE_LOCKOWNER (bsc#1218968). * nouveau/tu102: flush all pdbs on vmm flush (git-fixes). * nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes). * nsfs: add compat ioctl handler (git-fixes). * nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515). * nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes). * nvme-pci: fix sleeping function called from interrupt context (git-fixes). * nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git- fixes). * nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515). * nvme: fix max_discard_sectors calculation (git-fixes). * nvme: introduce helper function to get ctrl state (git-fixes). * nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515). * nvme: start keep-alive after admin queue setup (bsc#1211515). * nvme: trace: avoid memcpy overflow warning (git-fixes). * nvmet: re-fix tracing strncpy() warning (git-fixes). * of: Fix double free in of_parse_phandle_with_args_map (git-fixes). * of: unittest: Fix of_count_phandle_with_args() expected value message (git- fixes). * parport: parport_serial: Add Brainboxes BAR details (git-fixes). * parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes). * perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958). * perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958). * perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512). * phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes). * phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes). * pinctrl: intel: Revert "Unexport intel_pinctrl_probe()" (git-fixes). * platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620). * platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620). * platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620). * platform/x86/amd/hsmp: improve the error log (jsc#PED-7620). * platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285). * platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620). * power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes). * power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes). * powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes). * powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869). * powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR- IOV device (bsc#1212091 ltc#199106 git-fixes). * powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869). * powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869). * powerpc/xive: Fix endian conversion size (bsc#1194869). * pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git- fixes). * pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes). * pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes). * pwm: stm32: Fix enable count for clk in .probe() (git-fixes). * pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes). * pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git- fixes). * r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git- fixes). * ring-buffer/Documentation: Add documentation on buffer_percent file (git- fixes). * ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes). * s390/dasd: fix double module refcount decrement (bsc#1141539). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006). * s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012). * s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014). * s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013). * s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723). * s390: vfio-ap: tighten the NIB validity check (git-fixes). * sched/isolation: add cpu_is_isolated() API (bsc#1217895). * scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes). * scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes). * scsi: core: Always send batch on reset or error handling command (git- fixes). * scsi: fnic: Return error if vmalloc() failed (git-fixes). * scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes). * scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes). * scsi: hisi_sas: Fix warnings detected by sparse (git-fixes). * scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes). * scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes). * scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes). * scsi: hisi_sas: Replace with standard error code return value (git-fixes). * scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes). * scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git- fixes). * scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes). * scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097). * scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097). * scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes). * scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes). * scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582). * scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582). * scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582). * scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582). * scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes). * scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes). * scsi: mpt3sas: Fix an outdated comment (git-fixes). * scsi: mpt3sas: Fix in error path (git-fixes). * scsi: mpt3sas: Fix loop logic (bsc#1219067). * scsi: mpt3sas: Fix loop logic (git-fixes). * scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes). * scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes). * scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes). * selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes). * serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: imx: Correct clock error message in function probe() (git-fixes). * serial: imx: fix tx statemachine deadlock (git-fixes). * serial: max310x: fail probe if clock crystal is unstable (git-fixes). * serial: max310x: improve crystal stable clock detection (git-fixes). * serial: max310x: set default value when reading clock ready bit (git-fixes). * serial: sc16is7xx: add check for unsupported SPI modes during probe (git- fixes). * serial: sc16is7xx: set safe default SPI clock frequency (git-fixes). * serial: sccnxp: Improve error message if regulator_disable() fails (git- fixes). * shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git- fixes). * software node: Let args be NULL in software_node_get_reference_args (git- fixes). * spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes). * swiotlb-xen: provide the "max_mapping_size" method (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * trace,smp: Add tracepoints around remotelly called functions (bsc#1217895). * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes). * tracing/trigger: Fix to return error if failed to alloc snapshot (git- fixes). * tracing: Add size check when printing trace_marker output (git-fixes). * tracing: Ensure visibility when inserting an element into tracing_map (git- fixes). * tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes). * tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes). * ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes). * ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes). * ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git- fixes). * uio: Fix use-after-free in uio_open (git-fixes). * usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git- fixes). * usb: cdns3: fix uvc failure work since sg support enabled (git-fixes). * usb: chipidea: wait controller resume finished for wakeup irq (git-fixes). * usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes). * usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes). * usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git- fixes). * usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes). * usb: otg numberpad exception (bsc#1218527). * usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: ucsi: Add missing ppm_lock (git-fixes). * usb: ucsi_acpi: Fix command completion handling (git-fixes). * usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git- fixes). * usr/Kconfig: fix typos of "its" (git-fixes). * vfs: make freeze_super abort when sync_filesystem returns error (git-fixes). * vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes). * virtio-mmio: fix memory leak of vm_dev (git-fixes). * virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes). * vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes). * watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes). * watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes). * watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes). * watchdog: set cdev owner before adding (git-fixes). * wifi: ath11k: Defer on rproc_get failure (git-fixes). * wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes). * wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes). * wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git- fixes). * wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes). * wifi: libertas: stop selecting wext (git-fixes). * wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes). * wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git- fixes). * wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes). * wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes). * wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git- fixes). * wifi: rtlwifi: add calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git- fixes). * wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes). * x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616). * x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622). * x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623). * x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622). * x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616). * x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615). * x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes). * x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes). * x86/mce: Cleanup mce_usable_address() (jsc#PED-7623). * x86/mce: Define amd_mce_usable_address() (jsc#PED-7623). * xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes). * xen/events: fix delayed eoi list handling (git-fixes). * xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes). * xhci: cleanup xhci_hub_control port references (git-fixes). * xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes). * xhci: track port suspend state correctly in unsuccessful resume cases (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-469=1 openSUSE-SLE-15.5-2024-469=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-469=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-469=1 * SUSE Real Time Module 15-SP5 zypper in -t patch SUSE-SLE-Module-RT-15-SP5-2024-469=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.35.1 * kernel-source-rt-5.14.21-150500.13.35.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt-devel-5.14.21-150500.13.35.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.35.1 * reiserfs-kmp-rt-5.14.21-150500.13.35.1 * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-1-150500.11.5.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.35.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.35.1 * cluster-md-kmp-rt-5.14.21-150500.13.35.1 * kernel-rt_debug-vdso-5.14.21-150500.13.35.1 * kernel-rt-debuginfo-5.14.21-150500.13.35.1 * dlm-kmp-rt-5.14.21-150500.13.35.1 * gfs2-kmp-rt-5.14.21-150500.13.35.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt-livepatch-5.14.21-150500.13.35.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.35.1 * kernel-rt-debugsource-5.14.21-150500.13.35.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.35.1 * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-1-150500.11.5.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.35.1 * kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.35.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kselftests-kmp-rt-5.14.21-150500.13.35.1 * kernel-rt-vdso-5.14.21-150500.13.35.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1 * kernel-rt_debug-devel-5.14.21-150500.13.35.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-syms-rt-5.14.21-150500.13.35.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.35.1 * kernel-rt-extra-5.14.21-150500.13.35.1 * kernel-rt-optional-5.14.21-150500.13.35.1 * ocfs2-kmp-rt-5.14.21-150500.13.35.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.35.1 * kernel-rt-5.14.21-150500.13.35.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.35.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt-debugsource-5.14.21-150500.13.35.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_35-rt-debuginfo-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_13_35-rt-1-150500.11.5.1 * kernel-livepatch-SLE15-SP5-RT_Update_10-debugsource-1-150500.11.5.1 * SUSE Real Time Module 15-SP5 (x86_64) * kernel-rt-devel-5.14.21-150500.13.35.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.35.1 * cluster-md-kmp-rt-5.14.21-150500.13.35.1 * kernel-rt_debug-vdso-5.14.21-150500.13.35.1 * kernel-rt-debuginfo-5.14.21-150500.13.35.1 * dlm-kmp-rt-5.14.21-150500.13.35.1 * gfs2-kmp-rt-5.14.21-150500.13.35.1 * kernel-rt-debugsource-5.14.21-150500.13.35.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.35.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.35.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt-vdso-5.14.21-150500.13.35.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-rt_debug-devel-5.14.21-150500.13.35.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.35.1 * kernel-syms-rt-5.14.21-150500.13.35.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.35.1 * ocfs2-kmp-rt-5.14.21-150500.13.35.1 * SUSE Real Time Module 15-SP5 (noarch) * kernel-devel-rt-5.14.21-150500.13.35.1 * kernel-source-rt-5.14.21-150500.13.35.1 * SUSE Real Time Module 15-SP5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.35.1 * kernel-rt-5.14.21-150500.13.35.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0641.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1085.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1174649 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1210443 * https://bugzilla.suse.com/show_bug.cgi?id=1211515 * https://bugzilla.suse.com/show_bug.cgi?id=1212091 * https://bugzilla.suse.com/show_bug.cgi?id=1214377 * https://bugzilla.suse.com/show_bug.cgi?id=1215275 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216441 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217895 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218005 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218527 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218723 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218738 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218778 * https://bugzilla.suse.com/show_bug.cgi?id=1218779 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218916 * https://bugzilla.suse.com/show_bug.cgi?id=1218948 * https://bugzilla.suse.com/show_bug.cgi?id=1218958 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1218997 * https://bugzilla.suse.com/show_bug.cgi?id=1219006 * https://bugzilla.suse.com/show_bug.cgi?id=1219012 * https://bugzilla.suse.com/show_bug.cgi?id=1219013 * https://bugzilla.suse.com/show_bug.cgi?id=1219014 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219067 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219136 * https://bugzilla.suse.com/show_bug.cgi?id=1219285 * https://bugzilla.suse.com/show_bug.cgi?id=1219349 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219429 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219490 * https://bugzilla.suse.com/show_bug.cgi?id=1219512 * https://bugzilla.suse.com/show_bug.cgi?id=1219568 * https://bugzilla.suse.com/show_bug.cgi?id=1219582 * https://jira.suse.com/browse/PED-4729 * https://jira.suse.com/browse/PED-6694 * https://jira.suse.com/browse/PED-7322 * https://jira.suse.com/browse/PED-7615 * https://jira.suse.com/browse/PED-7616 * https://jira.suse.com/browse/PED-7620 * https://jira.suse.com/browse/PED-7622 * https://jira.suse.com/browse/PED-7623 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:30:18 -0000 Subject: SUSE-SU-2024:0473-1: important: Security update for tomcat10 Message-ID: <170792821848.27394.12861838676960734259@smelt2.prg2.suse.org> # Security update for tomcat10 Announcement ID: SUSE-SU-2024:0473-1 Rating: important References: * bsc#1219208 Cross-References: * CVE-2024-22029 CVSS scores: * CVE-2024-22029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Web and Scripting Module 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tomcat10 fixes the following issues: * CVE-2024-22029: Fixed escalation to root from tomcat user via %post script. (bsc#1219208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-473=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-473=1 ## Package List: * openSUSE Leap 15.5 (noarch) * tomcat10-admin-webapps-10.1.18-150200.5.11.1 * tomcat10-el-5_0-api-10.1.18-150200.5.11.1 * tomcat10-docs-webapp-10.1.18-150200.5.11.1 * tomcat10-jsp-3_1-api-10.1.18-150200.5.11.1 * tomcat10-10.1.18-150200.5.11.1 * tomcat10-lib-10.1.18-150200.5.11.1 * tomcat10-webapps-10.1.18-150200.5.11.1 * tomcat10-embed-10.1.18-150200.5.11.1 * tomcat10-servlet-6_0-api-10.1.18-150200.5.11.1 * tomcat10-jsvc-10.1.18-150200.5.11.1 * Web and Scripting Module 15-SP5 (noarch) * tomcat10-admin-webapps-10.1.18-150200.5.11.1 * tomcat10-el-5_0-api-10.1.18-150200.5.11.1 * tomcat10-jsp-3_1-api-10.1.18-150200.5.11.1 * tomcat10-lib-10.1.18-150200.5.11.1 * tomcat10-10.1.18-150200.5.11.1 * tomcat10-webapps-10.1.18-150200.5.11.1 * tomcat10-servlet-6_0-api-10.1.18-150200.5.11.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22029.html * https://bugzilla.suse.com/show_bug.cgi?id=1219208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:23 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:23 -0000 Subject: SUSE-SU-2024:0472-1: important: Security update for tomcat Message-ID: <170792858377.29659.16749555445639702753@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2024:0472-1 Rating: important References: * bsc#1216118 * bsc#1216119 * bsc#1216120 * bsc#1217402 * bsc#1217649 * bsc#1217768 * bsc#1219208 Cross-References: * CVE-2023-42794 * CVE-2023-42795 * CVE-2023-45648 * CVE-2023-46589 * CVE-2024-22029 CVSS scores: * CVE-2023-42794 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-42794 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-42795 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42795 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-45648 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-45648 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-46589 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-46589 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-22029 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves five vulnerabilities and has two security fixes can now be installed. ## Description: This update for tomcat fixes the following issues: Updated to Tomcat 9.0.85: * CVE-2023-45648: Improve trailer header parsing (bsc#1216118). * CVE-2023-42794: FileUpload: remove tmp files to avoid DoS on Windows (bsc#1216120). * CVE-2023-42795: Improve handling of failures during recycle() methods (bsc#1216119). * CVE-2023-46589: Fixed HTTP request smuggling due to incorrect headers parsing (bsc#1217649) * CVE-2024-22029: Fixed escalation to root from tomcat user via %post script. (bsc#1219208) The following non-security issues were fixed: * Fixed the file permissions for server.xml (bsc#1217768, bsc#1217402). Find the full release notes at: https://tomcat.apache.org/tomcat-9.0-doc/changelog.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-472=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-472=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-472=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-472=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-472=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-472=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-472=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-472=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-472=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-472=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-472=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-472=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-472=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-472=1 ## Package List: * openSUSE Leap 15.5 (noarch) * tomcat-javadoc-9.0.85-150200.57.1 * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-embed-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * tomcat-docs-webapp-9.0.85-150200.57.1 * tomcat-jsvc-9.0.85-150200.57.1 * Web and Scripting Module 15-SP5 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Manager Server 4.3 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 * SUSE Enterprise Storage 7.1 (noarch) * tomcat-lib-9.0.85-150200.57.1 * tomcat-el-3_0-api-9.0.85-150200.57.1 * tomcat-servlet-4_0-api-9.0.85-150200.57.1 * tomcat-webapps-9.0.85-150200.57.1 * tomcat-admin-webapps-9.0.85-150200.57.1 * tomcat-9.0.85-150200.57.1 * tomcat-jsp-2_3-api-9.0.85-150200.57.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42794.html * https://www.suse.com/security/cve/CVE-2023-42795.html * https://www.suse.com/security/cve/CVE-2023-45648.html * https://www.suse.com/security/cve/CVE-2023-46589.html * https://www.suse.com/security/cve/CVE-2024-22029.html * https://bugzilla.suse.com/show_bug.cgi?id=1216118 * https://bugzilla.suse.com/show_bug.cgi?id=1216119 * https://bugzilla.suse.com/show_bug.cgi?id=1216120 * https://bugzilla.suse.com/show_bug.cgi?id=1217402 * https://bugzilla.suse.com/show_bug.cgi?id=1217649 * https://bugzilla.suse.com/show_bug.cgi?id=1217768 * https://bugzilla.suse.com/show_bug.cgi?id=1219208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:27 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:27 -0000 Subject: SUSE-RU-2024:0471-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <170792858733.29659.13508777722735026236@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2024:0471-1 Rating: moderate References: * bsc#1020320 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP1 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Added data for 4_12_14-150100_197_160, 4_12_14-150100_197_165, 5_14_21-150400_24_100, 5_14_21-150400_24_66, 5_14_21-150400_24_88, 5_14_21-150400_24_92, 5_14_21-150400_24_97, 5_14_21-150500_55_28, 5_14_21-150500_55_31, 5_14_21-150500_55_36, 5_14_21-150500_55_39, 5_3_18-150200_24_166, 5_3_18-150200_24_169, 5_3_18-150200_24_172, 5_3_18-150300_59_138, 5_3_18-150300_59_141, 5_3_18-150300_59_144, +kernel- livepatch-5_14_21-150400_15_53-rt, _,+kernel- livepatch-5_14_21-150400_15_56-rt,_ ,+kernel- livepatch-5_14_21-150400_15_59-rt, _,+kernel- livepatch-5_14_21-150400_15_62-rt,_ ,+kernel- livepatch-5_14_21-150500_13_18-rt, _,+kernel- livepatch-5_14_21-150500_13_21-rt,_ ,+kernel- livepatch-5_14_21-150500_13_24-rt, _,+kernel- livepatch-5_14_21-150500_13_27-rt,_. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP1 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2024-471=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-471=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-471=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-471=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-471=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-471=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP1 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.105.1 * SUSE Linux Enterprise Live Patching 15-SP2 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.105.1 * SUSE Linux Enterprise Live Patching 15-SP3 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.105.1 * SUSE Linux Enterprise Live Patching 15-SP4 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.105.1 * SUSE Linux Enterprise Live Patching 15-SP5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.105.1 * openSUSE Leap 15.5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.105.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:29 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:29 -0000 Subject: SUSE-RU-2024:0470-1: moderate: Recommended update for lifecycle-data-sle-live-patching Message-ID: <170792858935.29659.11063042636294675427@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-live-patching Announcement ID: SUSE-RU-2024:0470-1 Rating: moderate References: * bsc#1020320 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 12 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-live-patching fixes the following issues: * Added data for 4_12_14-122_173, 4_12_14-122_176, 4_12_14-122_179, 4_12_14-122_183, 4_12_14-122_186. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12 zypper in -t patch SUSE-SLE-Live-Patching-12-2024-470=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-470=1 ## Package List: * SUSE Linux Enterprise Live Patching 12 (noarch) * lifecycle-data-sle-live-patching-1-10.140.1 * SUSE Linux Enterprise Live Patching 12-SP5 (noarch) * lifecycle-data-sle-live-patching-1-10.140.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:34 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:34 -0000 Subject: SUSE-SU-2024:0468-1: important: Security update for the Linux Kernel Message-ID: <170792859475.29659.10484885690793863316@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0468-1 Rating: important References: * bsc#1065729 * bsc#1108281 * bsc#1123986 * bsc#1141539 * bsc#1181674 * bsc#1206889 * bsc#1212152 * bsc#1216702 * bsc#1216989 * bsc#1217525 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218836 * bsc#1218968 * bsc#1219022 * bsc#1219053 * bsc#1219120 * bsc#1219412 * bsc#1219434 * bsc#1219445 * bsc#1219446 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2024-0775 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Real Time 12 SP5 * SUSE Linux Enterprise Server 12 SP5 An update that solves nine vulnerabilities and has 15 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). The following non-security bugs were fixed: * 9p: missing chunk of "fs/9p: Do not update file type when updating file attributes" (git-fixes). * ACPICA: Avoid cache flush inside virtual machines (git-fixes). * Fix build error in debug config * GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes). * KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022). * Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes). * USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes). * USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes). * USB: serial: option: add entry for Sierra EM9191 with new firmware (git- fixes). * USB: serial: option: fix FM101R-GL defines (git-fixes). * acpi/nfit: Require opt-in for read-only label configurations (git-fixes). * acpi/nfit: improve bounds checking for 'func' (git-fixes). * affs: fix basic permission bits to actually work (git-fixes). * aio: fix mremap after fork null-deref (git-fixes). * asix: Add check for usbnet_get_endpoints (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445). * chardev: fix error handling in cdev_device_add() (git-fixes). * configfs: fix a deadlock in configfs_symlink() (git-fixes). * configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes). * configfs: fix a use-after-free in __configfs_open_file (git-fixes). * configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes). * configfs: fix memleak in configfs_release_bin_file (git-fixes). * configfs: new object reprsenting tree fragments (git-fixes). * configfs: provide exclusion between IO and removals (git-fixes). * configfs: stash the data we need into configfs_buffer at open time (git- fixes). * ext4: Avoid freeing inodes on dirty list (bsc#1216989). * ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889). * fat: add ratelimit to fat*_ent_bread() (git-fixes). * fs/exofs: fix potential memory leak in mount option parsing (git-fixes). * fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git- fixes). * fs/fat/file.c: issue flush after the writeback of FAT (git-fixes). * fs/file.c: initialize init_files.resize_wait (git-fixes). * fs: do not audit the capability check in simple_xattr_list() (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git- fixes). * fs: ratelimit __find_get_block_slow() failure message (git-fixes). * fs: warn about impending deprecation of mandatory locks (git-fixes). * gfs2: Allow lock_nolock mount to specify jid=X (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Do not call dlm after protocol is unmounted (git-fixes). * gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes). * gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix lru_count going negative (git-fixes). * gfs2: Fix marking bitmaps non-full (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes). * gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes). * gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git- fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Special-case rindex for gfs2_grow (git-fixes). * gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes). * gfs2: add validation checks for size of superblock (git-fixes). * gfs2: assign rgrp glock before compute_bitstructs (git-fixes). * gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes). * gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes). * gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git- fixes). * gfs2: fix use-after-free on transaction ail lists (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: initialize transaction tr_ailX_lists earlier (git-fixes). * gfs2: report "already frozen/thawed" errors (git-fixes). * gfs2: take jdata unstuff into account in do_grow (git-fixes). * gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes). * gtp: change NET_UDP_TUNNEL dependency to select (git-fixes). * help_next should increase position index (git-fixes). * iomap: sub-block dio needs to zeroout beyond EOF (git-fixes). * kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes). * kernfs: bring names in comments in line with code (git-fixes). * kernfs: fix use-after-free in __kernfs_remove (git-fixes). * libceph: use kernel_connect() (bsc#1219446). * libnvdimm/btt: Fix LBA masking during 'free list' population (git-fixes). * libnvdimm/btt: Fix a kmemdup failure check (git-fixes). * libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes). * libnvdimm/btt: fix variable 'rc' set but not used (git-fixes). * libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes). * libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes). * libnvdimm/pmem: Delete include of nd-core.h (git-fixes). * libnvdimm/pmem: fix a possible OOB access when read and write pmem (git- fixes). * libnvdimm/region: Fix label activation vs errors (git-fixes). * libnvdimm: Fix compilation warnings with W=1 (git-fixes). * libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes). * libnvdimm: Validate command family indices (git-fixes). * libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes). * locks: print a warning when mount fails due to lack of "mand" support (git- fixes). * mce: fix set_mce_nospec to always unmap the whole page (git-fixes). * mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes). * mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes). * mlxsw: spectrum: Set LAG port collector only when active (git-fixes). * mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986). * net: (cpts) fix a missing check of clk_prepare (git-fixes). * net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes). * net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git- fixes). * net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed). * net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes). * net: ethernet: ti: fix possible object reference leak (git-fixes). * net: fec: Do not use netdev messages too early (git-fixes). * net: ks8851: Delay requesting IRQ until opened (git-fixes). * net: ks8851: Reassert reset pin if chip ID check fails (git-fixes). * net: ks8851: Set initial carrier state to down (git-fixes). * net: macb: Add null check for PCLK and HCLK (git-fixed). * net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes). * net: phy: sfp: warn the user when no tx_disable pin is available (git- fixes). * net: phylink: avoid resolving link state too early (git-fixes). * net: sfp: do not probe SFP module before we're attached (git-fixes). * net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes). * net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git- fixes). * net: stmmac: do not overwrite discard_frame status (git-fixes). * net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes). * net: stmmac: dwmac1000: Clear unused address entries (git-fixed). * net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git- fixes). * net: stmmac: dwmac4/5: Clear unused address entries (git-fixes). * net: systemport: Fix reception of BPDUs (git-fixes). * net: xilinx: fix possible object reference leak (git-fixed). * nfs: NFS 4.0 LOCK calls getting constant NFS4ERR_BAD_SEQID (bsc#1218968). * nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525). * nvdimm/btt: do not call del_gendisk() if not needed (git-fixes). * nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes). * nvdimm: Fix badblocks clear off-by-one error (git-fixes). * nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: fix orangefs df output (git-fixes). * orangefs: rate limit the client not running info message (git-fixes). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes). * powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729). * powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729). * powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729). * preserve KABI for struct plat_stmmacenet_data (git-fixes). * preserve KABI for struct sfp_socket_ops (git-fixes). * proc: fix /proc/*/map_files lookup (git-fixes). * pstore/ram: Check start of empty przs during init (git-fixes). * pstore/ram: Fix error return code in ramoops_probe() (git-fixes). * pstore/ram: Run without kernel crash dump region (git-fixes). * pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes). * pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git- fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * s390/dasd: fix double module refcount decrement (bsc#1141539). * scsi: qedf: fc_rport_priv reference counting fixes (bsc#1212152). * scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes). * sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * tracing/trigger: Fix to return error if failed to alloc snapshot (git- fixes). * usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes). * veth: Fixing transmit return status for dropped packets (git-fixes). * vfs: make freeze_super abort when sync_filesystem returns error (git-fixes). * writeback: Export inode_io_list_del() (bsc#1216989). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes). * x86/bugs: Add "unknown" reporting for MMIO Stale Data (git-fixes). * x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes). * x86/build: Turn off -fcf-protection for realmode targets (git-fixes). * x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes). * x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes). * x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes). * x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes). * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes). * x86/lib: Fix overflow when counting digits (git-fixes). * x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). * x86/microcode/AMD: Track patch allocation size explicitly (git-fixes). * x86/microcode/intel: Do not retry microcode reloading on the APs (git- fixes). * x86/mm: Add a x86_has_pat_wp() helper (git-fixes). * x86/pat: Fix x86_has_pat_wp() (git-fixes). * x86/pat: Pass valid address to sanitize_phys() (git-fixes). * x86/pm: Add enumeration check before spec MSRs save/restore setup (git- fixes). * x86/pm: Fix false positive kmemleak report in msr_build_context() (git- fixes). * x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes). * x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes). * x86/topology: Fix duplicated core ID within a package (git-fixes). * x86/topology: Fix multiple packages shown on a single-package system (git- fixes). * x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * x86: Clear .brk area at early boot (git-fixes). * x86: Fix __get_wchan() for !STACKTRACE (git-fixes). * x86: Fix get_wchan() to support the ORC unwinder (git-fixes). * x86: Mark stop_this_cpu() __noreturn (git-fixes). * x86: Pin task-stack in __get_wchan() (git-fixes). * x86: **always_inline** {rd,wr}msr() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Real Time 12 SP5 zypper in -t patch SUSE-SLE-RT-12-SP5-2024-468=1 ## Package List: * SUSE Linux Enterprise Real Time 12 SP5 (x86_64) * kernel-rt-devel-4.12.14-10.162.1 * kernel-rt-devel-debuginfo-4.12.14-10.162.1 * dlm-kmp-rt-4.12.14-10.162.1 * ocfs2-kmp-rt-4.12.14-10.162.1 * kernel-rt-debugsource-4.12.14-10.162.1 * gfs2-kmp-rt-4.12.14-10.162.1 * ocfs2-kmp-rt-debuginfo-4.12.14-10.162.1 * cluster-md-kmp-rt-debuginfo-4.12.14-10.162.1 * kernel-rt_debug-devel-debuginfo-4.12.14-10.162.1 * kernel-rt-base-4.12.14-10.162.1 * kernel-rt_debug-devel-4.12.14-10.162.1 * kernel-rt-base-debuginfo-4.12.14-10.162.1 * kernel-rt_debug-debuginfo-4.12.14-10.162.1 * dlm-kmp-rt-debuginfo-4.12.14-10.162.1 * cluster-md-kmp-rt-4.12.14-10.162.1 * kernel-rt-debuginfo-4.12.14-10.162.1 * kernel-rt_debug-debugsource-4.12.14-10.162.1 * gfs2-kmp-rt-debuginfo-4.12.14-10.162.1 * kernel-syms-rt-4.12.14-10.162.1 * SUSE Linux Enterprise Real Time 12 SP5 (noarch) * kernel-source-rt-4.12.14-10.162.1 * kernel-devel-rt-4.12.14-10.162.1 * SUSE Linux Enterprise Real Time 12 SP5 (nosrc x86_64) * kernel-rt-4.12.14-10.162.1 * kernel-rt_debug-4.12.14-10.162.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1123986 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1212152 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216989 * https://bugzilla.suse.com/show_bug.cgi?id=1217525 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1219022 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219445 * https://bugzilla.suse.com/show_bug.cgi?id=1219446 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:36 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:36 -0000 Subject: SUSE-RU-2024:0467-1: critical: Recommended update for google-guest-agent, google-guest-oslogin Message-ID: <170792859667.29659.3866955586999874835@smelt2.prg2.suse.org> # Recommended update for google-guest-agent, google-guest-oslogin Announcement ID: SUSE-RU-2024:0467-1 Rating: critical References: * bsc#1219642 Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for google-guest-agent, google-guest-oslogin contains the following fix: * Add explicit versioned dependency on google-guest-oslogin (bsc#1219642) * Add explicit versioned dependency on google-guest-agent (bsc#1219642) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-467=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-467=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-467=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-467=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-467=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-20231101.00-150000.1.38.1 * google-guest-oslogin-debugsource-20231101.00-150000.1.38.1 * google-guest-oslogin-debuginfo-20231101.00-150000.1.38.1 * google-guest-agent-20231031.01-150000.1.43.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-20231101.00-150000.1.38.1 * google-guest-oslogin-debugsource-20231101.00-150000.1.38.1 * google-guest-oslogin-debuginfo-20231101.00-150000.1.38.1 * google-guest-agent-20231031.01-150000.1.43.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-20231101.00-150000.1.38.1 * google-guest-oslogin-debugsource-20231101.00-150000.1.38.1 * google-guest-oslogin-debuginfo-20231101.00-150000.1.38.1 * google-guest-agent-20231031.01-150000.1.43.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-20231101.00-150000.1.38.1 * google-guest-oslogin-debugsource-20231101.00-150000.1.38.1 * google-guest-oslogin-debuginfo-20231101.00-150000.1.38.1 * google-guest-agent-20231031.01-150000.1.43.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-guest-oslogin-20231101.00-150000.1.38.1 * google-guest-oslogin-debugsource-20231101.00-150000.1.38.1 * google-guest-oslogin-debuginfo-20231101.00-150000.1.38.1 * google-guest-agent-20231031.01-150000.1.43.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219642 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:38 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:38 -0000 Subject: SUSE-RU-2024:0466-1: important: Recommended update for syslinux Message-ID: <170792859805.29659.7302290142364320846@smelt2.prg2.suse.org> # Recommended update for syslinux Announcement ID: SUSE-RU-2024:0466-1 Rating: important References: * jsc#MSC-749 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that contains one feature can now be installed. ## Description: This update for syslinux fixes the following issues: * syslinux RPM package was rebuilt to address issues with aarch64 built binaries ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-466=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-466=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-466=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-466=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-466=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-466=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-466=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-466=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-466=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-466=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-466=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-466=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-466=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-466=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-466=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-466=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-466=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-466=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-466=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-466=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-466=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-466=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-466=1 ## Package List: * openSUSE Leap 15.3 (x86_64 i586) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x) * syslinux-debuginfo-x86_64-4.04-150300.17.2.1 * syslinux-x86_64-4.04-150300.17.2.1 * openSUSE Leap Micro 5.3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * openSUSE Leap Micro 5.4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * openSUSE Leap 15.5 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x) * syslinux-debuginfo-x86_64-4.04-150300.17.2.1 * syslinux-x86_64-4.04-150300.17.2.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * Basesystem Module 15-SP5 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x) * syslinux-x86_64-4.04-150300.17.2.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Manager Proxy 4.3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Manager Server 4.3 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 * SUSE Enterprise Storage 7.1 (x86_64) * syslinux-debuginfo-4.04-150300.17.2.1 * syslinux-debugsource-4.04-150300.17.2.1 * syslinux-4.04-150300.17.2.1 ## References: * https://jira.suse.com/browse/MSC-749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:39 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:39 -0000 Subject: SUSE-RU-2024:0465-1: moderate: Recommended update for numatop Message-ID: <170792859977.29659.16825880479914809876@smelt2.prg2.suse.org> # Recommended update for numatop Announcement ID: SUSE-RU-2024:0465-1 Rating: moderate References: * jsc#PED-5450 * jsc#PED-5667 * jsc#PED-6038 * jsc#PED-6059 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains four features can now be installed. ## Description: This update for numatop fixes the following issues: * update to version 2.4 * Support EMR processors (jsc#PED-6059, jsc#PED-6038) * Support Power10 processors (jsc#PED-5450, jsc#PED-5667) * Support Zen3, Zen4 processors ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-465=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-465=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-465=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-465=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-465=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-465=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-465=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-465=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-465=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-465=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-465=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-465=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-465=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-465=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-465=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-465=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-465=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-465=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-465=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-465=1 ## Package List: * SUSE Enterprise Storage 7.1 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE CaaS Platform 4.0 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * openSUSE Leap 15.5 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * Basesystem Module 15-SP5 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * numatop-debuginfo-2.4-150100.3.9.1 * numatop-2.4-150100.3.9.1 * numatop-debugsource-2.4-150100.3.9.1 ## References: * https://jira.suse.com/browse/PED-5450 * https://jira.suse.com/browse/PED-5667 * https://jira.suse.com/browse/PED-6038 * https://jira.suse.com/browse/PED-6059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:41 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:41 -0000 Subject: SUSE-SU-2024:0464-1: moderate: Security update for python3 Message-ID: <170792860180.29659.10259804835890973236@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2024:0464-1 Rating: moderate References: * bsc#1210638 * bsc#1214691 Cross-References: * CVE-2022-48566 * CVE-2023-27043 CVSS scores: * CVE-2022-48566 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-48566 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638). * CVE-2022-48566: Use CRYPTO_memcmp() for compare_digest (bsc#1214691). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-464=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python3-debugsource-3.6.15-150000.3.138.1 * python3-core-debugsource-3.6.15-150000.3.138.1 * python3-base-3.6.15-150000.3.138.1 * libpython3_6m1_0-3.6.15-150000.3.138.1 * python3-debuginfo-3.6.15-150000.3.138.1 * python3-base-debuginfo-3.6.15-150000.3.138.1 * libpython3_6m1_0-debuginfo-3.6.15-150000.3.138.1 * python3-3.6.15-150000.3.138.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48566.html * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 * https://bugzilla.suse.com/show_bug.cgi?id=1214691 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 16:36:45 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 16:36:45 -0000 Subject: SUSE-SU-2024:0463-1: important: Security update for the Linux Kernel Message-ID: <170792860545.29659.14398859828604000753@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0463-1 Rating: important References: * bsc#1108281 * bsc#1193285 * bsc#1216702 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1219053 * bsc#1219120 * bsc#1219412 * bsc#1219434 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0565 * CVE-2024-0775 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 14 vulnerabilities and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-463=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-463=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-463=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.158.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.158.1 * kernel-rt-debugsource-5.3.18-150300.158.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.158.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.158.1 * kernel-rt-debugsource-5.3.18-150300.158.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.158.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.158.1 * kernel-rt-debugsource-5.3.18-150300.158.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 20:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 20:30:10 -0000 Subject: SUSE-SU-2024:0476-1: important: Security update for the Linux Kernel Message-ID: <170794261004.5732.5398847312998345197@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0476-1 Rating: important References: * bsc#1108281 * bsc#1177529 * bsc#1209834 * bsc#1212091 * bsc#1215885 * bsc#1216016 * bsc#1216702 * bsc#1217217 * bsc#1217670 * bsc#1217895 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218689 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1218916 * bsc#1218929 * bsc#1218930 * bsc#1218968 * bsc#1219053 * bsc#1219120 * bsc#1219128 * bsc#1219349 * bsc#1219412 * bsc#1219429 * bsc#1219434 * bsc#1219490 * bsc#1219608 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0340 * CVE-2024-0565 * CVE-2024-0641 * CVE-2024-0775 * CVE-2024-1085 * CVE-2024-1086 * CVE-2024-24860 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-24860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24860 ( NVD ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 19 vulnerabilities and has 16 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608). * CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429). * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes). * bcache: Remove unnecessary NULL point check in node allocations (git-fixes). * bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes). * bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes). * bcache: avoid oversize memory allocation by small stripe_size (git-fixes). * bcache: check return value from btree_node_alloc_replacement() (git-fixes). * bcache: fixup btree_cache_wait list damage (git-fixes). * bcache: fixup init dirty data errors (git-fixes). * bcache: fixup lock c->root error (git-fixes). * bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git- fixes). * bcache: prevent potential division by zero error (git-fixes). * bcache: remove redundant assignment to variable cur_idx (git-fixes). * bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes). * bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes). * block: Fix kabi header include (bsc#1218929). * block: free the extended dev_t minor later (bsc#1218930). * clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217). * clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885). * dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes). * dm cache: add cond_resched() to various workqueue loops (git-fixes). * dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git- fixes). * dm crypt: add cond_resched() to dmcrypt_write() (git-fixes). * dm crypt: avoid accessing uninitialized tasklet (git-fixes). * dm flakey: do not corrupt the zero page (git-fixes). * dm flakey: fix a crash with invalid table line (git-fixes). * dm flakey: fix logic when corrupting a bio (git-fixes). * dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes). * dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes). * dm integrity: reduce vmalloc space footprint on 32-bit architectures (git- fixes). * dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes). * dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git- fixes). * dm stats: check for and propagate alloc_percpu failure (git-fixes). * dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git- fixes). * dm thin metadata: check fail_io before using data_sm (git-fixes). * dm thin: add cond_resched() to various workqueue loops (git-fixes). * dm thin: fix deadlock when swapping to thin device (bsc#1177529). * dm verity: do not perform FEC for failed readahead IO (git-fixes). * dm verity: fix error handling for check_at_most_once on FEC (git-fixes). * dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes). * dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes). * dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes). * dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes). * dm-verity: align struct dm_verity_fec_io properly (git-fixes). * dm: add cond_resched() to dm_wq_work() (git-fixes). * dm: do not lock fs when the map is NULL during suspend or resume (git- fixes). * dm: do not lock fs when the map is NULL in process of resume (git-fixes). * dm: remove flush_scheduled_work() during local_exit() (git-fixes). * dm: send just one event on resize, not two (git-fixes). * doc/README.KSYMS: Add to repo. * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * intel_idle: add Emerald Rapids Xeon support (bsc#1216016). * kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * kernel-source: Fix description typo * loop: suppress uevents while reconfiguring the device (git-fixes). * nbd: Fix debugfs_create_dir error checking (git-fixes). * nbd: fix incomplete validation of ioctl arg (git-fixes). * nbd: use the correct block_device in nbd_bdev_reset (git-fixes). * nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349). * nfsd: fix RELEASE_LOCKOWNER (bsc#1218968). * null_blk: Always check queue mode setting from configfs (git-fixes). * powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR- IOV device (bsc#1212091 ltc#199106 git-fixes). * rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git- fixes). * rbd: decouple header read-in from updating rbd_dev->header (git-fixes). * rbd: decouple parent info read-in from updating rbd_dev (git-fixes). * rbd: get snapshot context after exclusive lock is ensured to be held (git- fixes). * rbd: harden get_lock_owner_info() a bit (git-fixes). * rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes). * rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes). * rbd: move rbd_dev_refresh() definition (git-fixes). * rbd: prevent busy loop when requesting exclusive lock (git-fixes). * rbd: retrieve and check lock owner twice before blocklisting (git-fixes). * rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes). * sched/isolation: add cpu_is_isolated() API (bsc#1217895). * scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097). * scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097). * trace,smp: Add tracepoints around remotelly called functions (bsc#1217895). * vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-476=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-476=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-476=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-476=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-476=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-476=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-476=1 ## Package List: * openSUSE Leap Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.68.1 * openSUSE Leap Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.68.1 * kernel-rt-debuginfo-5.14.21-150400.15.68.1 * openSUSE Leap Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.68.1 * openSUSE Leap Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.68.1 * kernel-rt-debuginfo-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.68.1 * kernel-rt-debuginfo-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.68.1 * kernel-rt-debuginfo-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.68.1 * kernel-rt-debuginfo-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.68.1 * kernel-rt-debuginfo-5.14.21-150400.15.68.1 * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-SLE15-SP4-RT_Update_18-debugsource-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_68-rt-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_68-rt-debuginfo-1-150400.1.3.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0641.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1085.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://www.suse.com/security/cve/CVE-2024-24860.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1177529 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1212091 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216016 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217670 * https://bugzilla.suse.com/show_bug.cgi?id=1217895 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218916 * https://bugzilla.suse.com/show_bug.cgi?id=1218929 * https://bugzilla.suse.com/show_bug.cgi?id=1218930 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219349 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219429 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219490 * https://bugzilla.suse.com/show_bug.cgi?id=1219608 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 20:30:12 -0000 Subject: SUSE-RU-2024:0477-1: moderate: Recommended update for yast2-packager Message-ID: <170794261261.5732.18078413984553730168@smelt2.prg2.suse.org> # Recommended update for yast2-packager Announcement ID: SUSE-RU-2024:0477-1 Rating: moderate References: * bsc#1182303 * bsc#1219174 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for yast2-packager fixes the following issues: * After installation disable the empty installation repository from the SLE15 Online medium (bsc#1182303) * Aditional fixes to avoid Yast failures in SLE 15 SP5 Maintenance updates (bsc#1219174) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-477=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-477=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-477=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-477=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-477=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-477=1 openSUSE-SLE-15.5-2024-477=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * yast2-packager-4.5.19-150500.3.8.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * yast2-packager-4.5.19-150500.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * yast2-packager-4.5.19-150500.3.8.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * yast2-packager-4.5.19-150500.3.8.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * yast2-packager-4.5.19-150500.3.8.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * yast2-packager-4.5.19-150500.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1182303 * https://bugzilla.suse.com/show_bug.cgi?id=1219174 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 20:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 20:30:16 -0000 Subject: SUSE-RU-2024:0475-1: important: Recommended update for libsolv Message-ID: <170794261609.5732.9476403945923608598@smelt2.prg2.suse.org> # Recommended update for libsolv Announcement ID: SUSE-RU-2024:0475-1 Rating: important References: * bsc#1215698 * bsc#1218782 * bsc#1218831 * bsc#1219442 * jsc#PED-6218 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that contains one feature and has four fixes can now be installed. ## Description: This update for libsolv, libzypp fixes the following issues: * build for multiple python versions [jsc#PED-6218] * applydeltaprm: Create target directory if it does not exist (bsc#1219442) * Fix problems with EINTR in ExternalDataSource::getline (bsc#1215698) * CheckAccessDeleted: fix running_in_container detection (bsc#1218782) * Detect CURLOPT_REDIR_PROTOCOLS_STR availability at runtime (bsc#1218831) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-475=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2024-475=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-475=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-475=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-475=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-475=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-475=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-475=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-475=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-475=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-475=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-475=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libsolv-tools-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libsolv-tools-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsolv-devel-0.7.28-150200.26.1 * ruby-solv-0.7.28-150200.26.1 * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * perl-solv-debuginfo-0.7.28-150200.26.1 * python3-solv-0.7.28-150200.26.1 * perl-solv-0.7.28-150200.26.1 * libzypp-devel-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libsolv-devel-debuginfo-0.7.28-150200.26.1 * python3-solv-debuginfo-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * ruby-solv-debuginfo-0.7.28-150200.26.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * libzypp-17.31.31-150200.87.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsolv-tools-debuginfo-0.7.28-150200.26.1 * libsolv-tools-0.7.28-150200.26.1 * libsolv-debuginfo-0.7.28-150200.26.1 * libzypp-debuginfo-17.31.31-150200.87.1 * libsolv-debugsource-0.7.28-150200.26.1 * libzypp-debugsource-17.31.31-150200.87.1 * libzypp-17.31.31-150200.87.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215698 * https://bugzilla.suse.com/show_bug.cgi?id=1218782 * https://bugzilla.suse.com/show_bug.cgi?id=1218831 * https://bugzilla.suse.com/show_bug.cgi?id=1219442 * https://jira.suse.com/browse/PED-6218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 14 20:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Feb 2024 20:30:20 -0000 Subject: SUSE-SU-2024:0474-1: important: Security update for the Linux Kernel Message-ID: <170794262036.5732.11756486570588840386@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0474-1 Rating: important References: * bsc#1108281 * bsc#1193285 * bsc#1215275 * bsc#1216702 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1219053 * bsc#1219120 * bsc#1219412 * bsc#1219434 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-4921 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0565 * CVE-2024-0775 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 15 vulnerabilities and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 LTSS kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). The following non-security bugs were fixed: * Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-474=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-474=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-474=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-474=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-474=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-474=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2024-474=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-474=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-474=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-474=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.150.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.150.1 * kernel-64kb-debugsource-5.3.18-150300.59.150.1 * kernel-64kb-devel-5.3.18-150300.59.150.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.150.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.150.1 * kernel-default-5.3.18-150300.59.150.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.150.1 * reiserfs-kmp-default-5.3.18-150300.59.150.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-default-devel-5.3.18-150300.59.150.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.150.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-syms-5.3.18-150300.59.150.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-obs-build-debugsource-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * kernel-preempt-devel-5.3.18-150300.59.150.1 * kernel-obs-build-5.3.18-150300.59.150.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-source-5.3.18-150300.59.150.1 * kernel-devel-5.3.18-150300.59.150.1 * kernel-macros-5.3.18-150300.59.150.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (noarch) * kernel-source-vanilla-5.3.18-150300.59.150.1 * kernel-source-5.3.18-150300.59.150.1 * kernel-docs-html-5.3.18-150300.59.150.1 * kernel-devel-5.3.18-150300.59.150.1 * kernel-macros-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-debug-5.3.18-150300.59.150.1 * kernel-kvmsmall-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-debug-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-debug-debugsource-5.3.18-150300.59.150.1 * kernel-debug-devel-5.3.18-150300.59.150.1 * kernel-debug-debuginfo-5.3.18-150300.59.150.1 * kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.150.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.150.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.150.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-kvmsmall-devel-5.3.18-150300.59.150.1 * kernel-debug-livepatch-devel-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-optional-5.3.18-150300.59.150.1 * kernel-default-base-rebuild-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-default-livepatch-devel-5.3.18-150300.59.150.1 * dlm-kmp-default-5.3.18-150300.59.150.1 * gfs2-kmp-default-5.3.18-150300.59.150.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.150.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.150.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-syms-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * kernel-obs-build-5.3.18-150300.59.150.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.150.1 * kernel-default-devel-5.3.18-150300.59.150.1 * kernel-default-extra-5.3.18-150300.59.150.1 * kselftests-kmp-default-5.3.18-150300.59.150.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-obs-build-debugsource-5.3.18-150300.59.150.1 * reiserfs-kmp-default-5.3.18-150300.59.150.1 * kernel-default-livepatch-5.3.18-150300.59.150.1 * cluster-md-kmp-default-5.3.18-150300.59.150.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-obs-qa-5.3.18-150300.59.150.1 * ocfs2-kmp-default-5.3.18-150300.59.150.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_41-debugsource-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_150-preempt-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.150.1 * cluster-md-kmp-preempt-5.3.18-150300.59.150.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.150.1 * gfs2-kmp-preempt-5.3.18-150300.59.150.1 * reiserfs-kmp-preempt-5.3.18-150300.59.150.1 * kernel-preempt-extra-5.3.18-150300.59.150.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-livepatch-devel-5.3.18-150300.59.150.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-optional-5.3.18-150300.59.150.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.150.1 * kselftests-kmp-preempt-5.3.18-150300.59.150.1 * ocfs2-kmp-preempt-5.3.18-150300.59.150.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.150.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.150.1 * dlm-kmp-preempt-5.3.18-150300.59.150.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-devel-5.3.18-150300.59.150.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.150.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (aarch64) * kernel-64kb-extra-5.3.18-150300.59.150.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.150.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.150.1 * dtb-freescale-5.3.18-150300.59.150.1 * dtb-nvidia-5.3.18-150300.59.150.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.150.1 * kernel-64kb-livepatch-devel-5.3.18-150300.59.150.1 * dtb-rockchip-5.3.18-150300.59.150.1 * dtb-renesas-5.3.18-150300.59.150.1 * dtb-mediatek-5.3.18-150300.59.150.1 * dtb-amd-5.3.18-150300.59.150.1 * dtb-xilinx-5.3.18-150300.59.150.1 * dtb-amlogic-5.3.18-150300.59.150.1 * dtb-altera-5.3.18-150300.59.150.1 * gfs2-kmp-64kb-5.3.18-150300.59.150.1 * kernel-64kb-debuginfo-5.3.18-150300.59.150.1 * reiserfs-kmp-64kb-5.3.18-150300.59.150.1 * dtb-apm-5.3.18-150300.59.150.1 * dtb-sprd-5.3.18-150300.59.150.1 * dtb-socionext-5.3.18-150300.59.150.1 * dtb-hisilicon-5.3.18-150300.59.150.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.150.1 * dtb-allwinner-5.3.18-150300.59.150.1 * kernel-64kb-debugsource-5.3.18-150300.59.150.1 * dtb-zte-5.3.18-150300.59.150.1 * dtb-arm-5.3.18-150300.59.150.1 * dtb-exynos-5.3.18-150300.59.150.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.150.1 * kselftests-kmp-64kb-5.3.18-150300.59.150.1 * ocfs2-kmp-64kb-5.3.18-150300.59.150.1 * dtb-lg-5.3.18-150300.59.150.1 * dtb-cavium-5.3.18-150300.59.150.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.150.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.150.1 * dtb-al-5.3.18-150300.59.150.1 * cluster-md-kmp-64kb-5.3.18-150300.59.150.1 * dtb-broadcom-5.3.18-150300.59.150.1 * dtb-marvell-5.3.18-150300.59.150.1 * kernel-64kb-optional-5.3.18-150300.59.150.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.150.1 * kernel-64kb-devel-5.3.18-150300.59.150.1 * dtb-qcom-5.3.18-150300.59.150.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.150.1 * dlm-kmp-64kb-5.3.18-150300.59.150.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_150-default-1-150300.7.3.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-livepatch-devel-5.3.18-150300.59.150.1 * kernel-default-livepatch-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-5.3.18-150300.59.150.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * dlm-kmp-default-5.3.18-150300.59.150.1 * gfs2-kmp-default-5.3.18-150300.59.150.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.150.1 * cluster-md-kmp-default-5.3.18-150300.59.150.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.150.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.150.1 * kernel-64kb-debugsource-5.3.18-150300.59.150.1 * kernel-64kb-devel-5.3.18-150300.59.150.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.150.1 * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.150.1 * reiserfs-kmp-default-5.3.18-150300.59.150.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-default-devel-5.3.18-150300.59.150.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.150.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-syms-5.3.18-150300.59.150.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-obs-build-debugsource-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * kernel-preempt-devel-5.3.18-150300.59.150.1 * kernel-obs-build-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.150.1 * kernel-devel-5.3.18-150300.59.150.1 * kernel-macros-5.3.18-150300.59.150.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * kernel-64kb-debuginfo-5.3.18-150300.59.150.1 * kernel-64kb-debugsource-5.3.18-150300.59.150.1 * kernel-64kb-devel-5.3.18-150300.59.150.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.3.18-150300.59.150.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-default-devel-5.3.18-150300.59.150.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-syms-5.3.18-150300.59.150.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-obs-build-debugsource-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * kernel-obs-build-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * kernel-source-5.3.18-150300.59.150.1 * kernel-devel-5.3.18-150300.59.150.1 * kernel-macros-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.150.1 * kernel-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-devel-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.150.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * reiserfs-kmp-default-5.3.18-150300.59.150.1 * kernel-default-debuginfo-5.3.18-150300.59.150.1 * kernel-default-base-5.3.18-150300.59.150.1.150300.18.88.1 * kernel-default-devel-5.3.18-150300.59.150.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.150.1 * kernel-syms-5.3.18-150300.59.150.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-obs-build-debugsource-5.3.18-150300.59.150.1 * kernel-default-debugsource-5.3.18-150300.59.150.1 * kernel-obs-build-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-source-5.3.18-150300.59.150.1 * kernel-devel-5.3.18-150300.59.150.1 * kernel-macros-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.150.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.150.1 * kernel-preempt-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.150.1 * kernel-preempt-devel-5.3.18-150300.59.150.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1215275 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 12:30:06 -0000 Subject: SUSE-SU-2024:0478-1: important: Security update for the Linux Kernel Message-ID: <170800020607.26594.11440959591504810816@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0478-1 Rating: important References: * bsc#1108281 * bsc#1193285 * bsc#1215275 * bsc#1216702 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1219053 * bsc#1219120 * bsc#1219412 * bsc#1219434 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-4921 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0565 * CVE-2024-0775 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves 15 vulnerabilities and has four security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). The following non-security bugs were fixed: * build: Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713) * mkspec: Include constraints for both multibuild and plain package always * rpm/kernel-docs.spec.in: fix build with 6.8 Since upstream commit f061c9f7d058 * rpm/kernel-source.rpmlintrc: add action-ebpf Upstream commit a79d8ba734bd * rpm/mkspec: use kernel-source: prefix for constraints on multibuild Otherwise the constraints are not applied with multibuild enabled. * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-478=1 * SUSE Linux Enterprise High Availability Extension 15 SP2 zypper in -t patch SUSE-SLE-Product-HA-15-SP2-2024-478=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-478=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-478=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-478=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (nosrc) * kernel-default-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150200.24.178.1 * kernel-livepatch-5_3_18-150200_24_178-default-1-150200.5.3.1 * kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-1-150200.5.3.1 * kernel-livepatch-SLE15-SP2_Update_45-debugsource-1-150200.5.3.1 * kernel-default-livepatch-devel-5.3.18-150200.24.178.1 * kernel-default-debugsource-5.3.18-150200.24.178.1 * kernel-default-livepatch-5.3.18-150200.24.178.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.3.18-150200.24.178.1 * cluster-md-kmp-default-debuginfo-5.3.18-150200.24.178.1 * cluster-md-kmp-default-5.3.18-150200.24.178.1 * ocfs2-kmp-default-5.3.18-150200.24.178.1 * dlm-kmp-default-debuginfo-5.3.18-150200.24.178.1 * gfs2-kmp-default-debuginfo-5.3.18-150200.24.178.1 * ocfs2-kmp-default-debuginfo-5.3.18-150200.24.178.1 * kernel-default-debugsource-5.3.18-150200.24.178.1 * gfs2-kmp-default-5.3.18-150200.24.178.1 * dlm-kmp-default-5.3.18-150200.24.178.1 * SUSE Linux Enterprise High Availability Extension 15 SP2 (nosrc) * kernel-default-5.3.18-150200.24.178.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-default-5.3.18-150200.24.178.1 * kernel-preempt-5.3.18-150200.24.178.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-obs-build-debugsource-5.3.18-150200.24.178.1 * kernel-default-debuginfo-5.3.18-150200.24.178.1 * kernel-obs-build-5.3.18-150200.24.178.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.178.1 * kernel-default-devel-5.3.18-150200.24.178.1 * kernel-preempt-debuginfo-5.3.18-150200.24.178.1 * kernel-preempt-devel-5.3.18-150200.24.178.1 * kernel-preempt-debugsource-5.3.18-150200.24.178.1 * kernel-default-debugsource-5.3.18-150200.24.178.1 * kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1 * kernel-syms-5.3.18-150200.24.178.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.178.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.178.1 * kernel-devel-5.3.18-150200.24.178.1 * kernel-macros-5.3.18-150200.24.178.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-5.3.18-150200.24.178.1 * kernel-default-debuginfo-5.3.18-150200.24.178.1 * kernel-obs-build-5.3.18-150200.24.178.1 * kernel-default-devel-5.3.18-150200.24.178.1 * reiserfs-kmp-default-5.3.18-150200.24.178.1 * kernel-default-debugsource-5.3.18-150200.24.178.1 * kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1 * kernel-syms-5.3.18-150200.24.178.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.178.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * kernel-source-5.3.18-150200.24.178.1 * kernel-devel-5.3.18-150200.24.178.1 * kernel-macros-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * kernel-preempt-debuginfo-5.3.18-150200.24.178.1 * kernel-preempt-devel-5.3.18-150200.24.178.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.178.1 * kernel-preempt-debugsource-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * kernel-obs-build-debugsource-5.3.18-150200.24.178.1 * kernel-default-debuginfo-5.3.18-150200.24.178.1 * kernel-obs-build-5.3.18-150200.24.178.1 * kernel-default-devel-5.3.18-150200.24.178.1 * reiserfs-kmp-default-5.3.18-150200.24.178.1 * kernel-default-debugsource-5.3.18-150200.24.178.1 * kernel-default-base-5.3.18-150200.24.178.1.150200.9.91.1 * kernel-syms-5.3.18-150200.24.178.1 * reiserfs-kmp-default-debuginfo-5.3.18-150200.24.178.1 * kernel-default-devel-debuginfo-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * kernel-source-5.3.18-150200.24.178.1 * kernel-devel-5.3.18-150200.24.178.1 * kernel-macros-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch nosrc) * kernel-docs-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc x86_64) * kernel-preempt-5.3.18-150200.24.178.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * kernel-preempt-debuginfo-5.3.18-150200.24.178.1 * kernel-preempt-devel-5.3.18-150200.24.178.1 * kernel-preempt-devel-debuginfo-5.3.18-150200.24.178.1 * kernel-preempt-debugsource-5.3.18-150200.24.178.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1215275 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 12:30:09 -0000 Subject: SUSE-RU-2024:0480-1: important: Recommended update for libsolv Message-ID: <170800020905.26594.18327985535944852254@smelt2.prg2.suse.org> # Recommended update for libsolv Announcement ID: SUSE-RU-2024:0480-1 Rating: important References: * bsc#1215698 * bsc#1218782 * bsc#1218831 * bsc#1219442 * jsc#PED-6218 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has four fixes can now be installed. ## Description: This update for libsolv, libzypp fixes the following issues: * build for multiple python versions [jsc#PED-6218] * applydeltaprm: Create target directory if it does not exist (bsc#1219442) * Fix problems with EINTR in ExternalDataSource::getline (bsc#1215698) * CheckAccessDeleted: fix running_in_container detection (bsc#1218782) * Detect CURLOPT_REDIR_PROTOCOLS_STR availability at runtime (bsc#1218831) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-480=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-480=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-480=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-480=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-480=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-480=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-480=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-480=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-480=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-480=1 SUSE-SLE- INSTALLER-15-SP4-2024-480=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-480=1 SUSE-SLE- INSTALLER-15-SP4-2024-480=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-480=1 SUSE-SLE-INSTALLER-15-SP4-2024-480=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-480=1 SUSE- SLE-INSTALLER-15-SP4-2024-480=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-480=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-480=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-480=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-480=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-480=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-480=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-480=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-480=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-480=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-480=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-480=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-480=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-480=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Manager Proxy 4.3 (x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsolv-demo-debuginfo-0.7.28-150400.3.16.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * python311-solv-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * python311-solv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-devel-doc-17.31.31-150400.3.52.2 * python3-solv-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * perl-solv-0.7.28-150400.3.16.2 * libsolv-demo-0.7.28-150400.3.16.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-solv-debuginfo-0.7.28-150400.3.16.2 * libsolv-devel-0.7.28-150400.3.16.2 * libzypp-devel-17.31.31-150400.3.52.2 * ruby-solv-0.7.28-150400.3.16.2 * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libzypp-devel-doc-17.31.31-150400.3.52.2 * python3-solv-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libsolv-demo-debuginfo-0.7.28-150400.3.16.2 * ruby-solv-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-debuginfo-0.7.28-150400.3.16.2 * perl-solv-0.7.28-150400.3.16.2 * libsolv-demo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * libsolv-devel-debuginfo-0.7.28-150400.3.16.2 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libzypp-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libzypp-debugsource-17.31.31-150400.3.52.2 * libsolv-tools-0.7.28-150400.3.16.2 * libsolv-tools-debuginfo-0.7.28-150400.3.16.2 * libzypp-debuginfo-17.31.31-150400.3.52.2 * libsolv-debuginfo-0.7.28-150400.3.16.2 * libsolv-debugsource-0.7.28-150400.3.16.2 * libzypp-17.31.31-150400.3.52.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215698 * https://bugzilla.suse.com/show_bug.cgi?id=1218782 * https://bugzilla.suse.com/show_bug.cgi?id=1218831 * https://bugzilla.suse.com/show_bug.cgi?id=1219442 * https://jira.suse.com/browse/PED-6218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 12:30:11 -0000 Subject: SUSE-SU-2024:0479-1: important: Security update for java-1_8_0-openj9 Message-ID: <170800021142.26594.10639722300366798945@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2024:0479-1 Rating: important References: * bsc#1217214 * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2023-5676 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-5676 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-5676 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine * Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214 * CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903), CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906), CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-479=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-479=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5676.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1217214 * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:30:09 -0000 Subject: SUSE-SU-2024:0484-1: important: Security update for the Linux Kernel Message-ID: <170801460913.18974.9485671655571757434@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0484-1 Rating: important References: * bsc#1065729 * bsc#1108281 * bsc#1123986 * bsc#1141539 * bsc#1181674 * bsc#1206889 * bsc#1212152 * bsc#1216702 * bsc#1216989 * bsc#1217525 * bsc#1217946 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218689 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218836 * bsc#1218968 * bsc#1219022 * bsc#1219053 * bsc#1219120 * bsc#1219128 * bsc#1219412 * bsc#1219434 * bsc#1219445 * bsc#1219446 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6610 * CVE-2024-0340 * CVE-2024-0775 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6610 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-6610 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves 15 vulnerabilities and has 15 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). The following non-security bugs were fixed: * 9p: missing chunk of "fs/9p: Do not update file type when updating file attributes" (git-fixes). * ACPICA: Avoid cache flush inside virtual machines (git-fixes). * GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes). * KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022). * UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes). * USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes). * USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes). * USB: serial: option: add entry for Sierra EM9191 with new firmware (git- fixes). * USB: serial: option: fix FM101R-GL defines (git-fixes). * acpi/nfit: Require opt-in for read-only label configurations (git-fixes). * acpi/nfit: improve bounds checking for 'func' (git-fixes). * affs: fix basic permission bits to actually work (git-fixes). * aio: fix mremap after fork null-deref (git-fixes). * asix: Add check for usbnet_get_endpoints (git-fixes). * bnxt_en: Log unknown link speed appropriately (git-fixes). * build: Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445). * chardev: fix error handling in cdev_device_add() (git-fixes). * configfs: fix a deadlock in configfs_symlink() (git-fixes). * configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes). * configfs: fix a use-after-free in __configfs_open_file (git-fixes). * configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes). * configfs: fix memleak in configfs_release_bin_file (git-fixes). * configfs: new object reprsenting tree fragments (git-fixes). * configfs: provide exclusion between IO and removals (git-fixes). * configfs: stash the data we need into configfs_buffer at open time (git- fixes). * docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * ext4: Avoid freeing inodes on dirty list (bsc#1216989). * ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889). * fat: add ratelimit to fat*_ent_bread() (git-fixes). * fs/exofs: fix potential memory leak in mount option parsing (git-fixes). * fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git- fixes). * fs/fat/file.c: issue flush after the writeback of FAT (git-fixes). * fs/file.c: initialize init_files.resize_wait (git-fixes). * fs: do not audit the capability check in simple_xattr_list() (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git- fixes). * fs: ratelimit __find_get_block_slow() failure message (git-fixes). * fs: warn about impending deprecation of mandatory locks (git-fixes). * gfs2: Allow lock_nolock mount to specify jid=X (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Do not call dlm after protocol is unmounted (git-fixes). * gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes). * gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix lru_count going negative (git-fixes). * gfs2: Fix marking bitmaps non-full (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes). * gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes). * gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git- fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Special-case rindex for gfs2_grow (git-fixes). * gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes). * gfs2: add validation checks for size of superblock (git-fixes). * gfs2: assign rgrp glock before compute_bitstructs (git-fixes). * gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes). * gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes). * gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git- fixes). * gfs2: fix use-after-free on transaction ail lists (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: initialize transaction tr_ailX_lists earlier (git-fixes). * gfs2: report "already frozen/thawed" errors (git-fixes). * gfs2: take jdata unstuff into account in do_grow (git-fixes). * gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes). * gtp: change NET_UDP_TUNNEL dependency to select (git-fixes). * help_next should increase position index (git-fixes). * iomap: sub-block dio needs to zeroout beyond EOF (git-fixes). * kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes). * kernfs: bring names in comments in line with code (git-fixes). * kernfs: fix use-after-free in __kernfs_remove (git-fixes). * libceph: use kernel_connect() (bsc#1219446). * libnvdimm/btt: Fix LBA masking during 'free list' population (git-fixes). * libnvdimm/btt: Fix a kmemdup failure check (git-fixes). * libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes). * libnvdimm/btt: fix variable 'rc' set but not used (git-fixes). * libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes). * libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes). * libnvdimm/pmem: Delete include of nd-core.h (git-fixes). * libnvdimm/pmem: fix a possible OOB access when read and write pmem (git- fixes). * libnvdimm/region: Fix label activation vs errors (git-fixes). * libnvdimm: Fix compilation warnings with W=1 (git-fixes). * libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes). * libnvdimm: Validate command family indices (git-fixes). * libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes). * locks: print a warning when mount fails due to lack of "mand" support (git- fixes). * mce: fix set_mce_nospec to always unmap the whole page (git-fixes). * mlx4: handle non-napi callers to napi_poll (git-fixes). * mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes). * mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes). * mlxsw: spectrum: Set LAG port collector only when active (git-fixes). * mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986). * net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git- fixes). * net: (cpts) fix a missing check of clk_prepare (git-fixes). * net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes). * net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git- fixes). * net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed). * net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes). * net: ethernet: ti: fix possible object reference leak (git-fixes). * net: fec: Do not use netdev messages too early (git-fixes). * net: ks8851: Delay requesting IRQ until opened (git-fixes). * net: ks8851: Reassert reset pin if chip ID check fails (git-fixes). * net: ks8851: Set initial carrier state to down (git-fixes). * net: macb: Add null check for PCLK and HCLK (git-fixed). * net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes). * net: mvneta: fix double free of txq->buf (git-fixes). * net: phy: sfp: warn the user when no tx_disable pin is available (git- fixes). * net: phylink: avoid resolving link state too early (git-fixes). * net: sfp: do not probe SFP module before we're attached (git-fixes). * net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes). * net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git- fixes). * net: stmmac: do not overwrite discard_frame status (git-fixes). * net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes). * net: stmmac: dwmac1000: Clear unused address entries (git-fixed). * net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git- fixes). * net: stmmac: dwmac4/5: Clear unused address entries (git-fixes). * net: systemport: Fix reception of BPDUs (git-fixes). * net: xilinx: fix possible object reference leak (git-fixed). * nfs: NFS 4.0 LOCK calls getting constant NFS4ERR_BAD_SEQID (bsc#1218968). * nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525). * nvdimm/btt: do not call del_gendisk() if not needed (git-fixes). * nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes). * nvdimm: Fix badblocks clear off-by-one error (git-fixes). * nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: fix orangefs df output (git-fixes). * orangefs: rate limit the client not running info message (git-fixes). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes). * powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729). * powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729). * powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729). * preserve KABI for struct plat_stmmacenet_data (git-fixes). * preserve KABI for struct sfp_socket_ops (git-fixes). * proc: fix /proc/*/map_files lookup (git-fixes). * pstore/ram: Check start of empty przs during init (git-fixes). * pstore/ram: Fix error return code in ramoops_probe() (git-fixes). * pstore/ram: Run without kernel crash dump region (git-fixes). * pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes). * pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git- fixes). * r8169: fix data corruption issue on RTL8402 (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * s390/dasd: fix double module refcount decrement (bsc#1141539). * scripts/git_sort/git_sort.py: Add 'perf-tools' branch * scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes). * sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * tracing/trigger: Fix to return error if failed to alloc snapshot (git- fixes). * usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes). * veth: Fixing transmit return status for dropped packets (git-fixes). * vfs: make freeze_super abort when sync_filesystem returns error (git-fixes). * writeback: Export inode_io_list_del() (bsc#1216989). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes). * x86/bugs: Add "unknown" reporting for MMIO Stale Data (git-fixes). * x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes). * x86/build: Turn off -fcf-protection for realmode targets (git-fixes). * x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes). * x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes). * x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes). * x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes). * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes). * x86/lib: Fix overflow when counting digits (git-fixes). * x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). * x86/microcode/AMD: Track patch allocation size explicitly (git-fixes). * x86/microcode/intel: Do not retry microcode reloading on the APs (git- fixes). * x86/mm: Add a x86_has_pat_wp() helper (git-fixes). * x86/pat: Fix x86_has_pat_wp() (git-fixes). * x86/pat: Pass valid address to sanitize_phys() (git-fixes). * x86/pm: Add enumeration check before spec MSRs save/restore setup (git- fixes). * x86/pm: Fix false positive kmemleak report in msr_build_context() (git- fixes). * x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes). * x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes). * x86/topology: Fix duplicated core ID within a package (git-fixes). * x86/topology: Fix multiple packages shown on a single-package system (git- fixes). * x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * x86: Clear .brk area at early boot (git-fixes). * x86: Fix __get_wchan() for !STACKTRACE (git-fixes). * x86: Fix get_wchan() to support the ORC unwinder (git-fixes). * x86: Mark stop_this_cpu() __noreturn (git-fixes). * x86: Pin task-stack in __get_wchan() (git-fixes). * x86: **always_inline** {rd,wr}msr() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-484=1 SUSE-SLE- SERVER-12-SP5-2024-484=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2024-484=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-484=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-484=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-484=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-484=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-484=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * dlm-kmp-default-debuginfo-4.12.14-122.194.1 * kernel-default-base-debuginfo-4.12.14-122.194.1 * kernel-syms-4.12.14-122.194.1 * dlm-kmp-default-4.12.14-122.194.1 * kernel-default-debugsource-4.12.14-122.194.1 * kernel-default-debuginfo-4.12.14-122.194.1 * ocfs2-kmp-default-4.12.14-122.194.1 * kernel-default-base-4.12.14-122.194.1 * gfs2-kmp-default-4.12.14-122.194.1 * kernel-default-devel-4.12.14-122.194.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.194.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.194.1 * gfs2-kmp-default-debuginfo-4.12.14-122.194.1 * cluster-md-kmp-default-4.12.14-122.194.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * kernel-default-4.12.14-122.194.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-macros-4.12.14-122.194.1 * kernel-source-4.12.14-122.194.1 * kernel-devel-4.12.14-122.194.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.194.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-4.12.14-122.194.1 * dlm-kmp-default-4.12.14-122.194.1 * kernel-default-debugsource-4.12.14-122.194.1 * kernel-default-debuginfo-4.12.14-122.194.1 * ocfs2-kmp-default-4.12.14-122.194.1 * gfs2-kmp-default-4.12.14-122.194.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.194.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.194.1 * gfs2-kmp-default-debuginfo-4.12.14-122.194.1 * cluster-md-kmp-default-4.12.14-122.194.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc) * kernel-default-4.12.14-122.194.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.194.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-4.12.14-122.194.1 * kernel-default-debuginfo-4.12.14-122.194.1 * kgraft-patch-4_12_14-122_194-default-1-8.5.1 * kernel-default-kgraft-devel-4.12.14-122.194.1 * kernel-default-debugsource-4.12.14-122.194.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-4.12.14-122.194.1 * kernel-obs-build-4.12.14-122.194.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch nosrc) * kernel-docs-4.12.14-122.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 nosrc x86_64) * kernel-default-4.12.14-122.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * kernel-syms-4.12.14-122.194.1 * kernel-default-base-debuginfo-4.12.14-122.194.1 * kernel-default-debuginfo-4.12.14-122.194.1 * kernel-default-base-4.12.14-122.194.1 * kernel-default-devel-4.12.14-122.194.1 * kernel-default-debugsource-4.12.14-122.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-macros-4.12.14-122.194.1 * kernel-source-4.12.14-122.194.1 * kernel-devel-4.12.14-122.194.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.194.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.194.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * kernel-syms-4.12.14-122.194.1 * kernel-default-base-debuginfo-4.12.14-122.194.1 * kernel-default-debuginfo-4.12.14-122.194.1 * kernel-default-base-4.12.14-122.194.1 * kernel-default-devel-4.12.14-122.194.1 * kernel-default-debugsource-4.12.14-122.194.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-macros-4.12.14-122.194.1 * kernel-source-4.12.14-122.194.1 * kernel-devel-4.12.14-122.194.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * kernel-default-man-4.12.14-122.194.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.194.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (nosrc) * kernel-default-4.12.14-122.194.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * kernel-default-extra-debuginfo-4.12.14-122.194.1 * kernel-default-debuginfo-4.12.14-122.194.1 * kernel-default-debugsource-4.12.14-122.194.1 * kernel-default-extra-4.12.14-122.194.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6610.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1123986 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1212152 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216989 * https://bugzilla.suse.com/show_bug.cgi?id=1217525 * https://bugzilla.suse.com/show_bug.cgi?id=1217946 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1219022 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219445 * https://bugzilla.suse.com/show_bug.cgi?id=1219446 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:30:22 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:30:22 -0000 Subject: SUSE-SU-2024:0516-1: important: Security update for the Linux Kernel Message-ID: <170801462253.18974.4893171098765071677@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0516-1 Rating: important References: * bsc#1065729 * bsc#1108281 * bsc#1141539 * bsc#1174649 * bsc#1181674 * bsc#1193285 * bsc#1194869 * bsc#1209834 * bsc#1210443 * bsc#1211515 * bsc#1212091 * bsc#1214377 * bsc#1215275 * bsc#1215885 * bsc#1216441 * bsc#1216559 * bsc#1216702 * bsc#1217895 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218005 * bsc#1218447 * bsc#1218527 * bsc#1218659 * bsc#1218689 * bsc#1218713 * bsc#1218723 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218778 * bsc#1218779 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1218916 * bsc#1218948 * bsc#1218958 * bsc#1218968 * bsc#1218997 * bsc#1219006 * bsc#1219012 * bsc#1219013 * bsc#1219014 * bsc#1219053 * bsc#1219067 * bsc#1219120 * bsc#1219128 * bsc#1219136 * bsc#1219285 * bsc#1219349 * bsc#1219412 * bsc#1219429 * bsc#1219434 * bsc#1219490 * bsc#1219512 * bsc#1219568 * bsc#1219582 * bsc#1219608 * jsc#PED-4729 * jsc#PED-6694 * jsc#PED-7322 * jsc#PED-7615 * jsc#PED-7616 * jsc#PED-7618 * jsc#PED-7620 * jsc#PED-7622 * jsc#PED-7623 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-4921 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6531 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0340 * CVE-2024-0565 * CVE-2024-0641 * CVE-2024-0775 * CVE-2024-1085 * CVE-2024-1086 * CVE-2024-24860 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-24860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24860 ( NVD ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 An update that solves 21 vulnerabilities, contains nine features and has 40 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429). * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608). The following non-security bugs were fixed: * Documentation: RAS: Add index and address translation section (jsc#PED-7618). * ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes). * ACPI: LPSS: Fix the fractional clock divider flags (git-fixes). * ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377) * ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes). * ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377) * ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes). * ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377) * ACPI: video: check for error while searching for backlight device parent (git-fixes). * ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git- fixes). * ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes). * ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes). * ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes). * ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes). * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes). * ALSA: hda: Refer to correct stream index at loops (git-fixes). * ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git- fixes). * ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes). * ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes). * ASoC: Intel: Skylake: mem leak in skl register function (git-fixes). * ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git- fixes). * ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes). * ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136). * ASoC: amd: Add check for acp config flags (bsc#1219136). * ASoC: amd: Add new dmi entries to config entry (bsc#1219136). * ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136). * ASoC: amd: Drop empty platform remove function (bsc#1219136). * ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136). * ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes). * ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136). * ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136). * ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136). * ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136). * ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136). * ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes). * ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136). * ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136). * ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136). * ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136). * ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136). * ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136). * ASoC: amd: acp: Refactor bit width calculation (bsc#1219136). * ASoC: amd: acp: Refactor dai format implementation (bsc#1219136). * ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136). * ASoC: amd: acp: add a label to make error path more clean (bsc#1219136). * ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136). * ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136). * ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136). * ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136). * ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136). * ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136). * ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136). * ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136). * ASoC: amd: acp: move pdm macros to common header file (bsc#1219136). * ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136). * ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136). * ASoC: amd: acp: remove acp poweroff function (bsc#1219136). * ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136). * ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136). * ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136). * ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136). * ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136). * ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136). * ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136). * ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136). * ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136). * ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136). * ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136). * ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136). * ASoC: amd: add acp6.2 irq handler (bsc#1219136). * ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136). * ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136). * ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136). * ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136). * ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136). * ASoC: amd: fix ACP version typo mistake (bsc#1219136). * ASoC: amd: fix spelling mistake: "i.e" -> "i.e." (bsc#1219136). * ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136). * ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136). * ASoC: amd: ps: Update copyright notice (bsc#1219136). * ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136). * ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136). * ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136). * ASoC: amd: ps: move irq handler registration (bsc#1219136). * ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136). * ASoC: amd: ps: refactor platform device creation logic (bsc#1219136). * ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136). * ASoC: amd: ps: remove unused variable (bsc#1219136). * ASoC: amd: ps: update dev index value in irq handler (bsc#1219136). * ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136). * ASoC: amd: ps: update the acp clock source (bsc#1219136). * ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136). * ASoC: amd: ps: use static function (bsc#1219136). * ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: update pm_runtime enable sequence (bsc#1219136). * ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136). * ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136). * ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136). * ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136). * ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136). * ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136). * ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136). * ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136). * ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136). * ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136). * ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136). * ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136). * ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136). * ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136). * ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136). * ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136). * ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136). * ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136). * ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes). * ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes). * ASoC: codecs: wcd938x: handle deferred probe (git-fixes). * ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes). * ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes). * ASoC: cs43130: Fix the position of const qualifier (git-fixes). * ASoC: da7219: Support low DC impedance headset (git-fixes). * ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes). * ASoC: ops: add correct range check for limiting volume (git-fixes). * ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes). * ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes). * ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes). * ASoC: wm8974: Correct boost mixer inputs (git-fixes). * Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136). * Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes). * Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes). * Documentation: Begin a RAS section (jsc#PED-7622). * EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618). * EDAC/amd64: Add context struct (jsc#PED-7615). * EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615). * EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616). * EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615). * EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622). * EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615). * EDAC/amd64: Cache and use GPU node map (jsc#PED-7616). * EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615). * EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616). * EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615). * EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615). * EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615). * EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615). * EDAC/amd64: Remove early_channel_count() (jsc#PED-7615). * EDAC/amd64: Remove module version string (jsc#PED-7615). * EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615). * EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615). * EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615). * EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615). * EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618). * EDAC/mc: Add new HBM2 memory type (jsc#PED-7616). * EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622). * EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622). * EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes). * HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes). * HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes). * IB/iser: Prevent invalidating wrong MR (git-fixes) * Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes). * Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes). * Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git- fixes). * Input: atkbd - use ab83 as id when skipping the getid command (git-fixes). * Input: bcm5974 - check endpoint type before starting traffic (git-fixes). * Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes). * Input: xpad - add Razer Wolverine V2 support (git-fixes). * KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes). * KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281). * PCI/AER: Configure ECRC only if AER is native (bsc#1218778) * PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes). * PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes). * PCI: keystone: Fix race condition when initializing PHYs (git-fixes). * PM: hibernate: Enforce ordering during image compression/decompression (git- fixes). * RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618). * RAS/AMD/ATL: Add MI300 support (jsc#PED-7618). * RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618). * RAS: Introduce AMD Address Translation Library (jsc#PED-7618). * RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes) * RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes) * RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes) * RDMA/irdma: Add wait for suspend on SQD (git-fixes) * RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes) * RDMA/irdma: Do not modify to SQD on error (git-fixes) * RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes) * RDMA/irdma: Refactor error handling in create CQP (git-fixes) * RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes) * RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes) * RDMA/rtrs-clt: Start hb after path_up (git-fixes) * RDMA/rtrs-srv: Check return values while processing info request (git-fixes) * RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git- fixes) * RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes) * RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git- fixes) * RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes) * USB: xhci: workaround for grace period (git-fixes). * Update config files: enable ASoC AMD PS drivers (bsc#1219136) * Update patch reference for ax88179 fix (bsc#1218948) * acpi: property: Let args be NULL in __acpi_node_get_property_reference (git- fixes). * aio: fix mremap after fork null-deref (git-fixes). * apparmor: avoid crash when parsed profile name is empty (git-fixes). * arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729) * arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV. * arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729) * arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes) * arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git- fixes) * arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes) * arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes) * arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes) * arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes) * arm64: module: move find_section to header (jsc#PED-4729) * arm64: vdso: Fix "no previous prototype" warning (jsc#PED-4729) * arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729) * arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729) * asix: Add check for usbnet_get_endpoints (git-fixes). * attr: block mode changes of symlinks (git-fixes). * badblocks: add helper routines for badblock ranges handling (bsc#1174649). * badblocks: add more helper structure and routines in badblocks.h (bsc#1174649). * badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649). * badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649). * badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649). * badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649). * badblocks: switch to the improved badblock handling code (bsc#1174649). * bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes). * bus: mhi: host: Add alignment check for event ring read pointer (git-fixes). * bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git- fixes). * bus: mhi: host: Drop chan lock before queuing buffers (git-fixes). * ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568). * clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes). * clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes). * clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes). * clk: samsung: Fix kernel-doc comments (git-fixes). * clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git- fixes). * clk: zynqmp: Add a check for NULL pointer (git-fixes). * clk: zynqmp: make bestdiv unsigned (git-fixes). * clocksource: Skip watchdog check for large watchdog intervals (git-fixes). * clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885). * coresight: etm4x: Add ACPI support in platform driver (bsc#1218779) * coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779) * coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779) * coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779) * coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779) * coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779) * coresight: platform: acpi: Ignore the absence of graph (bsc#1218779) * crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes). * crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes). * crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes). * crypto: sahara - do not resize req->src when doing hash operations (git- fixes). * crypto: sahara - fix ahash reqsize (git-fixes). * crypto: sahara - fix ahash selftest failure (git-fixes). * crypto: sahara - fix cbc selftest failure (git-fixes). * crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes). * crypto: sahara - fix processing requests with cryptlen < sg->length (git- fixes). * crypto: sahara - fix wait_for_completion_timeout() error handling (git- fixes). * crypto: sahara - handle zero-length aes requests (git-fixes). * crypto: sahara - improve error handling in sahara_sha_process() (git-fixes). * crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes). * crypto: scomp - fix req->dst buffer overflow (git-fixes). * dma-debug: fix kernel-doc warnings (git-fixes). * dmaengine: fix NULL pointer in channel unregistration function (git-fixes). * dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git- fixes). * dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes). * dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes). * dmaengine: ti: k3-udma: Report short packet errors (git-fixes). * doc/README.KSYMS: Add to repo. * docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes). * drivers: clk: zynqmp: calculate closest mux rate (git-fixes). * drivers: clk: zynqmp: update divider round rate logic (git-fixes). * drm/amd/display: Fix tiled display misalignment (git-fixes). * drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git- fixes). * drm/amd/display: add nv12 bounding box (git-fixes). * drm/amd/display: get dprefclk ss info from integration info table (git- fixes). * drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes). * drm/amd/display: pbn_div need be updated for hotplug event (git-fixes). * drm/amd/display: update dcn315 lpddr pstate latency (git-fixes). * drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes). * drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git- fixes). * drm/amd/pm: fix a double-free in si_dpm_init (git-fixes). * drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes). * drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes). * drm/amdgpu/pm: Fix the power source flag error (git-fixes). * drm/amdgpu: Add NULL checks for function pointers (git-fixes). * drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes). * drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes). * drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes). * drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes). * drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git- fixes). * drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes). * drm/amdgpu: Let KFD sync with VM fences (git-fixes). * drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes). * drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git- fixes). * drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes). * drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes). * drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes). * drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git- fixes). * drm/amdkfd: Fix lock dependency warning (git-fixes). * drm/amdkfd: Fix lock dependency warning with srcu (git-fixes). * drm/amdkfd: Use resource_size() helper function (git-fixes). * drm/amdkfd: fixes for HMM mem allocation (git-fixes). * drm/bridge: Fix typo in post_disable() description (git-fixes). * drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes). * drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes). * drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes). * drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes). * drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes). * drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes). * drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git- fixes). * drm/bridge: tc358767: Fix return value on error case (git-fixes). * drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes). * drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes). * drm/crtc: fix uninitialized variable use (git-fixes). * drm/drv: propagate errors from drm_modeset_register_all() (git-fixes). * drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git- fixes). * drm/exynos: fix a potential error pointer dereference (git-fixes). * drm/exynos: fix a wrong error checking (git-fixes). * drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes). * drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git- fixes). * drm/framebuffer: Fix use of uninitialized variable (git-fixes). * drm/mediatek: Return error if MDP RDMA failed to enable the clock (git- fixes). * drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes). * drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes). * drm/msm/dpu: Set input_sel bit for INTF (git-fixes). * drm/msm/dpu: fix writeback programming for YUV cases (git-fixes). * drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes). * drm/msm/dsi: Enable runtime PM (git-fixes). * drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git- fixes). * drm/msm/mdp4: flush vblank event on disable (git-fixes). * drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git- fixes). * drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes). * drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes). * drm/panel: nt35510: fix typo (git-fixes). * drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git- fixes). * drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git- fixes). * drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes). * drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git- fixes). * drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git- fixes). * drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git- fixes). * drm/radeon: check return value of radeon_ring_lock() (git-fixes). * drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes). * drm/tidss: Check for K2G in in dispc_softreset() (git-fixes). * drm/tidss: Fix atomic_flush check (git-fixes). * drm/tidss: Fix dss reset (git-fixes). * drm/tidss: Move reset to the end of dispc_init() (git-fixes). * drm/tidss: Return error value from from softreset (git-fixes). * drm/tilcdc: Fix irq free on unload (git-fixes). * drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes). * drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git- fixes). * drm: using mul_u32_u32() requires linux/math64.h (git-fixes). * dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694) * efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes). * eventfd: prevent underflow for eventfd semaphores (git-fixes). * exfat: fix reporting fs error when reading dir beyond EOF (git-fixes). * exfat: support handle zero-size directory (git-fixes). * exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes). * fbdev: Only disable sysfb on the primary device (bsc#1216441) * fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441. * fbdev: flush deferred IO before closing (git-fixes). * fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes). * fbdev: imxfb: fix left margin setting (git-fixes). * fbdev: mmp: Fix typo and wording in code comment (git-fixes). * firewire: core: correct documentation of fw_csr_string() kernel API (git- fixes). * firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes). * firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes). * fjes: fix memleaks in fjes_hw_setup (git-fixes). * fs/mount_setattr: always cleanup mount_kattr (git-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes). * fs: Move notify_change permission checks into may_setattr (git-fixes). * fs: do not audit the capability check in simple_xattr_list() (git-fixes). * fs: drop peer group ids under namespace lock (git-fixes). * fs: indicate request originates from old mount API (git-fixes). * fs: sendfile handles O_NONBLOCK of out_fd (git-fixes). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * gfs2: Always check inode size of inline inodes (git-fixes). * gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes). * gfs2: Disable page faults during lockless buffered reads (git-fixes). * gfs2: Eliminate ip->i_gh (git-fixes). * gfs2: Eliminate vestigial HIF_FIRST (git-fixes). * gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes). * gfs2: Introduce flag for glock holder auto-demotion (git-fixes). * gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes). * gfs2: Remove redundant check from gfs2_glock_dq (git-fixes). * gfs2: Switch to wait_event in gfs2_logd (git-fixes). * gfs2: assign rgrp glock before compute_bitstructs (git-fixes). * gfs2: low-memory forced flush fixes (git-fixes). * gfs2: release iopen glock early in evict (git-fixes). * gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes). * gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes). * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * hwmon: (corsair-psu) Fix probe when built-in (git-fixes). * hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes). * i2c: rk3x: fix potential spinlock recursion on poll (git-fixes). * i2c: s3c24xx: fix read transfers in polling mode (git-fixes). * i2c: s3c24xx: fix transferring more than one message in polling mode (git- fixes). * iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes). * iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes). * iio: adc: ad9467: do not ignore error codes (git-fixes). * iio: adc: ad9467: fix reset gpio handling (git-fixes). * ipmi: Use regspacings passed as a module parameter (git-fixes). * kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136) * kdb: Fix a potential buffer overflow in kdb_local() (git-fixes). * kernel-doc: handle a void function without producing a warning (git-fixes). * kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git- fixes). * leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes). * leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes). * libapi: Add missing linux/types.h header to get the __u64 type on io.h (git- fixes). * md: fix bi_status reporting in md_end_clone_io (bsc#1210443). * media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes). * media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes). * media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes). * media: imx355: Enable runtime PM before registering async sub-device (git- fixes). * media: ov9734: Enable runtime PM before registering async sub-device (git- fixes). * media: pvrusb2: fix use after free on context disconnection (git-fixes). * media: rkisp1: Disable runtime PM in probe error path (git-fixes). * media: rkisp1: Fix media device memory leak (git-fixes). * media: rkisp1: Read the ID register at probe time instead of streamon (git- fixes). * media: videobuf2-dma-sg: fix vmap callback (git-fixes). * mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes). * misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes). * mm: fs: initialize fsdata passed to write_begin/write_end interface (git- fixes). * mmc: core: Cancel delayed work before releasing host (git-fixes). * modpost: move **attribute** ((format(printf, 2, 3))) to modpost.h (git- fixes). * mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes). * mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git- fixes). * mtd: rawnand: pl353: Fix kernel doc (git-fixes). * mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git- fixes). * mtd: rawnand: rockchip: Rename a structure (git-fixes). * net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes). * net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948). * net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948). * net: usb: ax88179_178a: move priv to driver_priv (git-fixes). * net: usb: ax88179_178a: remove redundant init code (git-fixes). * net: usb: ax88179_178a: restore state on resume (bsc#1218948). * nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes). * nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349). * nfsd: fix RELEASE_LOCKOWNER (bsc#1218968). * nouveau/tu102: flush all pdbs on vmm flush (git-fixes). * nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes). * nsfs: add compat ioctl handler (git-fixes). * nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515). * nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes). * nvme-pci: fix sleeping function called from interrupt context (git-fixes). * nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git- fixes). * nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515). * nvme: fix max_discard_sectors calculation (git-fixes). * nvme: introduce helper function to get ctrl state (git-fixes). * nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515). * nvme: start keep-alive after admin queue setup (bsc#1211515). * nvme: trace: avoid memcpy overflow warning (git-fixes). * nvmet: re-fix tracing strncpy() warning (git-fixes). * of: Fix double free in of_parse_phandle_with_args_map (git-fixes). * of: unittest: Fix of_count_phandle_with_args() expected value message (git- fixes). * parport: parport_serial: Add Brainboxes BAR details (git-fixes). * parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes). * pci: Drop PCI vmd patches that caused a regression (bsc#1218005) * perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958). * perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958). * perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512). * phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes). * phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes). * pinctrl: intel: Revert "Unexport intel_pinctrl_probe()" (git-fixes). * platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620). * platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620). * platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620). * platform/x86/amd/hsmp: improve the error log (jsc#PED-7620). * platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285). * platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620). * power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes). * power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes). * powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes). * powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869). * powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR- IOV device (bsc#1212091 ltc#199106 git-fixes). * powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869). * powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869). * powerpc/xive: Fix endian conversion size (bsc#1194869). * pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git- fixes). * pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes). * pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes). * pwm: stm32: Fix enable count for clk in .probe() (git-fixes). * pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes). * pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git- fixes). * r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git- fixes). * ring-buffer/Documentation: Add documentation on buffer_percent file (git- fixes). * ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes). * s390/dasd: fix double module refcount decrement (bsc#1141539). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006). * s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012). * s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014). * s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013). * s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723). * sched/isolation: add cpu_is_isolated() API (bsc#1217895). * scripts/kernel-doc: restore warning for Excess struct/union (git-fixes). * scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes). * scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes). * scsi: core: Always send batch on reset or error handling command (git- fixes). * scsi: fnic: Return error if vmalloc() failed (git-fixes). * scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes). * scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes). * scsi: hisi_sas: Fix warnings detected by sparse (git-fixes). * scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes). * scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes). * scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes). * scsi: hisi_sas: Replace with standard error code return value (git-fixes). * scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes). * scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git- fixes). * scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes). * scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097). * scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097). * scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes). * scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes). * scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582). * scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582). * scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582). * scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582). * scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes). * scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes). * scsi: mpt3sas: Fix an outdated comment (git-fixes). * scsi: mpt3sas: Fix in error path (git-fixes). * scsi: mpt3sas: Fix loop logic (bsc#1219067). * scsi: mpt3sas: Fix loop logic (git-fixes). * scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes). * scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes). * scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes). * selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes). * serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: imx: Correct clock error message in function probe() (git-fixes). * serial: imx: fix tx statemachine deadlock (git-fixes). * serial: max310x: fail probe if clock crystal is unstable (git-fixes). * serial: max310x: improve crystal stable clock detection (git-fixes). * serial: max310x: set default value when reading clock ready bit (git-fixes). * serial: sc16is7xx: add check for unsupported SPI modes during probe (git- fixes). * serial: sc16is7xx: set safe default SPI clock frequency (git-fixes). * serial: sccnxp: Improve error message if regulator_disable() fails (git- fixes). * series.conf: the patch is not in git and breaks series_insert.py * shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git- fixes). * software node: Let args be NULL in software_node_get_reference_args (git- fixes). * spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes). * swiotlb-xen: provide the "max_mapping_size" method (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * trace,smp: Add tracepoints around remotelly called functions (bsc#1217895). * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes). * tracing/trigger: Fix to return error if failed to alloc snapshot (git- fixes). * tracing: Add size check when printing trace_marker output (git-fixes). * tracing: Ensure visibility when inserting an element into tracing_map (git- fixes). * tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes). * tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes). * tracing: Increase trace array ref count on enable and filter files (bsc#1219490). * ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes). * ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes). * ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git- fixes). * uio: Fix use-after-free in uio_open (git-fixes). * usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git- fixes). * usb: cdns3: fix uvc failure work since sg support enabled (git-fixes). * usb: chipidea: wait controller resume finished for wakeup irq (git-fixes). * usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes). * usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes). * usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git- fixes). * usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes). * usb: otg numberpad exception (bsc#1218527). * usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: ucsi: Add missing ppm_lock (git-fixes). * usb: ucsi_acpi: Fix command completion handling (git-fixes). * usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git- fixes). * usr/Kconfig: fix typos of "its" (git-fixes). * vfs: make freeze_super abort when sync_filesystem returns error (git-fixes). * vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes). * virtio-mmio: fix memory leak of vm_dev (git-fixes). * virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes). * vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes). * watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes). * watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes). * watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes). * watchdog: set cdev owner before adding (git-fixes). * wifi: ath11k: Defer on rproc_get failure (git-fixes). * wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes). * wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes). * wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git- fixes). * wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes). * wifi: libertas: stop selecting wext (git-fixes). * wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes). * wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git- fixes). * wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes). * wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes). * wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git- fixes). * wifi: rtlwifi: add calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git- fixes). * wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes). * x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616). * x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622). * x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623). * x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622). * x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616). * x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615). * x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes). * x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes). * x86/mce: Cleanup mce_usable_address() (jsc#PED-7623). * x86/mce: Define amd_mce_usable_address() (jsc#PED-7623). * xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes). * xen/events: fix delayed eoi list handling (git-fixes). * xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes). * xhci: cleanup xhci_hub_control port references (git-fixes). * xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes). * xhci: track port suspend state correctly in unsuccessful resume cases (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-516=1 SUSE-2024-516=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-516=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-516=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-516=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-516=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-516=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-516=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-516=1 ## Package List: * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (noarch) * kernel-source-vanilla-5.14.21-150500.55.49.1 * kernel-docs-html-5.14.21-150500.55.49.1 * kernel-macros-5.14.21-150500.55.49.1 * kernel-source-5.14.21-150500.55.49.1 * kernel-devel-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150500.55.49.1 * kernel-debug-devel-debuginfo-5.14.21-150500.55.49.1 * kernel-debug-livepatch-devel-5.14.21-150500.55.49.1 * kernel-debug-devel-5.14.21-150500.55.49.1 * kernel-debug-debuginfo-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (x86_64) * kernel-kvmsmall-vdso-5.14.21-150500.55.49.1 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.49.1 * kernel-debug-vdso-5.14.21-150500.55.49.1 * kernel-default-vdso-debuginfo-5.14.21-150500.55.49.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.49.1 * kernel-default-vdso-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150500.55.49.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1 * kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2 * kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 * kernel-kvmsmall-devel-5.14.21-150500.55.49.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.49.1 * kernel-kvmsmall-debugsource-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kernel-default-optional-5.14.21-150500.55.49.1 * kernel-default-debuginfo-5.14.21-150500.55.49.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.49.1 * ocfs2-kmp-default-5.14.21-150500.55.49.1 * kernel-default-devel-5.14.21-150500.55.49.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.49.1 * kernel-default-livepatch-devel-5.14.21-150500.55.49.1 * cluster-md-kmp-default-5.14.21-150500.55.49.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-extra-5.14.21-150500.55.49.1 * kernel-obs-build-5.14.21-150500.55.49.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-livepatch-5.14.21-150500.55.49.1 * dlm-kmp-default-5.14.21-150500.55.49.1 * kernel-obs-build-debugsource-5.14.21-150500.55.49.1 * kernel-obs-qa-5.14.21-150500.55.49.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.49.1 * kernel-syms-5.14.21-150500.55.49.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.49.1 * gfs2-kmp-default-5.14.21-150500.55.49.1 * reiserfs-kmp-default-5.14.21-150500.55.49.1 * kselftests-kmp-default-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_10-debugsource-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1 * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-1-150500.11.5.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.49.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (aarch64) * dtb-amlogic-5.14.21-150500.55.49.1 * dtb-marvell-5.14.21-150500.55.49.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.49.1 * dtb-hisilicon-5.14.21-150500.55.49.1 * gfs2-kmp-64kb-5.14.21-150500.55.49.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.49.1 * dtb-qcom-5.14.21-150500.55.49.1 * dtb-lg-5.14.21-150500.55.49.1 * dtb-mediatek-5.14.21-150500.55.49.1 * dtb-exynos-5.14.21-150500.55.49.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.49.1 * kselftests-kmp-64kb-5.14.21-150500.55.49.1 * dtb-altera-5.14.21-150500.55.49.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.49.1 * dtb-socionext-5.14.21-150500.55.49.1 * kernel-64kb-debuginfo-5.14.21-150500.55.49.1 * kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1 * dtb-amd-5.14.21-150500.55.49.1 * dtb-xilinx-5.14.21-150500.55.49.1 * kernel-64kb-devel-5.14.21-150500.55.49.1 * reiserfs-kmp-64kb-5.14.21-150500.55.49.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.49.1 * dtb-cavium-5.14.21-150500.55.49.1 * dtb-amazon-5.14.21-150500.55.49.1 * kernel-64kb-debugsource-5.14.21-150500.55.49.1 * dtb-nvidia-5.14.21-150500.55.49.1 * ocfs2-kmp-64kb-5.14.21-150500.55.49.1 * kernel-64kb-optional-5.14.21-150500.55.49.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.49.1 * dtb-rockchip-5.14.21-150500.55.49.1 * dtb-apm-5.14.21-150500.55.49.1 * dtb-allwinner-5.14.21-150500.55.49.1 * kernel-64kb-extra-5.14.21-150500.55.49.1 * cluster-md-kmp-64kb-5.14.21-150500.55.49.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.49.1 * dtb-apple-5.14.21-150500.55.49.1 * dlm-kmp-64kb-5.14.21-150500.55.49.1 * dtb-sprd-5.14.21-150500.55.49.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.49.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.49.1 * dtb-broadcom-5.14.21-150500.55.49.1 * dtb-renesas-5.14.21-150500.55.49.1 * dtb-arm-5.14.21-150500.55.49.1 * dtb-freescale-5.14.21-150500.55.49.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.49.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150500.55.49.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (aarch64) * kernel-64kb-devel-5.14.21-150500.55.49.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.49.1 * kernel-64kb-debuginfo-5.14.21-150500.55.49.1 * kernel-64kb-debugsource-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * kernel-default-devel-5.14.21-150500.55.49.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (noarch) * kernel-macros-5.14.21-150500.55.49.1 * kernel-devel-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.49.1 * Basesystem Module 15-SP5 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.49.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.49.1 * Development Tools Module 15-SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.49.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.14.21-150500.55.49.1 * kernel-syms-5.14.21-150500.55.49.1 * kernel-obs-build-debugsource-5.14.21-150500.55.49.1 * Development Tools Module 15-SP5 (noarch) * kernel-source-5.14.21-150500.55.49.1 * Legacy Module 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.49.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * reiserfs-kmp-default-5.14.21-150500.55.49.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.49.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_10-debugsource-1-150500.11.5.1 * kernel-default-debuginfo-5.14.21-150500.55.49.1 * kernel-livepatch-5_14_21-150500_55_49-default-1-150500.11.5.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * kernel-default-livepatch-5.14.21-150500.55.49.1 * kernel-default-livepatch-devel-5.14.21-150500.55.49.1 * kernel-livepatch-5_14_21-150500_55_49-default-debuginfo-1-150500.11.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-5.14.21-150500.55.49.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debuginfo-5.14.21-150500.55.49.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.49.1 * dlm-kmp-default-5.14.21-150500.55.49.1 * gfs2-kmp-default-5.14.21-150500.55.49.1 * cluster-md-kmp-default-5.14.21-150500.55.49.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.49.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.49.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (nosrc) * kernel-default-5.14.21-150500.55.49.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * kernel-default-extra-5.14.21-150500.55.49.1 * kernel-default-debuginfo-5.14.21-150500.55.49.1 * kernel-default-debugsource-5.14.21-150500.55.49.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.49.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0641.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1085.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://www.suse.com/security/cve/CVE-2024-24860.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1174649 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1210443 * https://bugzilla.suse.com/show_bug.cgi?id=1211515 * https://bugzilla.suse.com/show_bug.cgi?id=1212091 * https://bugzilla.suse.com/show_bug.cgi?id=1214377 * https://bugzilla.suse.com/show_bug.cgi?id=1215275 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216441 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217895 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218005 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218527 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218723 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218778 * https://bugzilla.suse.com/show_bug.cgi?id=1218779 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218916 * https://bugzilla.suse.com/show_bug.cgi?id=1218948 * https://bugzilla.suse.com/show_bug.cgi?id=1218958 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1218997 * https://bugzilla.suse.com/show_bug.cgi?id=1219006 * https://bugzilla.suse.com/show_bug.cgi?id=1219012 * https://bugzilla.suse.com/show_bug.cgi?id=1219013 * https://bugzilla.suse.com/show_bug.cgi?id=1219014 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219067 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219136 * https://bugzilla.suse.com/show_bug.cgi?id=1219285 * https://bugzilla.suse.com/show_bug.cgi?id=1219349 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219429 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219490 * https://bugzilla.suse.com/show_bug.cgi?id=1219512 * https://bugzilla.suse.com/show_bug.cgi?id=1219568 * https://bugzilla.suse.com/show_bug.cgi?id=1219582 * https://bugzilla.suse.com/show_bug.cgi?id=1219608 * https://jira.suse.com/browse/PED-4729 * https://jira.suse.com/browse/PED-6694 * https://jira.suse.com/browse/PED-7322 * https://jira.suse.com/browse/PED-7615 * https://jira.suse.com/browse/PED-7616 * https://jira.suse.com/browse/PED-7618 * https://jira.suse.com/browse/PED-7620 * https://jira.suse.com/browse/PED-7622 * https://jira.suse.com/browse/PED-7623 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:30:32 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:30:32 -0000 Subject: SUSE-SU-2024:0515-1: important: Security update for the Linux Kernel Message-ID: <170801463249.18974.8679354622546340693@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0515-1 Rating: important References: * bsc#1108281 * bsc#1177529 * bsc#1209834 * bsc#1212091 * bsc#1215275 * bsc#1215885 * bsc#1216016 * bsc#1216702 * bsc#1217217 * bsc#1217670 * bsc#1217895 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218689 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1218916 * bsc#1218929 * bsc#1218930 * bsc#1218968 * bsc#1219053 * bsc#1219120 * bsc#1219128 * bsc#1219349 * bsc#1219412 * bsc#1219429 * bsc#1219434 * bsc#1219490 * bsc#1219608 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-4921 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0340 * CVE-2024-0565 * CVE-2024-0641 * CVE-2024-0775 * CVE-2024-1085 * CVE-2024-1086 * CVE-2024-24860 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-24860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24860 ( NVD ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 20 vulnerabilities and has 16 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429). * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608). The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes). * bcache: Remove unnecessary NULL point check in node allocations (git-fixes). * bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes). * bcache: avoid NULL checking to c->root in run_cache_set() (git-fixes). * bcache: avoid oversize memory allocation by small stripe_size (git-fixes). * bcache: check return value from btree_node_alloc_replacement() (git-fixes). * bcache: fixup btree_cache_wait list damage (git-fixes). * bcache: fixup init dirty data errors (git-fixes). * bcache: fixup lock c->root error (git-fixes). * bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git- fixes). * bcache: prevent potential division by zero error (git-fixes). * bcache: remove redundant assignment to variable cur_idx (git-fixes). * bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes). * bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes). * block: Fix kabi header include (bsc#1218929). * block: free the extended dev_t minor later (bsc#1218930). * clocksource: Skip watchdog check for large watchdog intervals (bsc#1217217). * clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885). * dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes). * dm cache: add cond_resched() to various workqueue loops (git-fixes). * dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git- fixes). * dm crypt: add cond_resched() to dmcrypt_write() (git-fixes). * dm crypt: avoid accessing uninitialized tasklet (git-fixes). * dm flakey: do not corrupt the zero page (git-fixes). * dm flakey: fix a crash with invalid table line (git-fixes). * dm flakey: fix logic when corrupting a bio (git-fixes). * dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes). * dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes). * dm integrity: reduce vmalloc space footprint on 32-bit architectures (git- fixes). * dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes). * dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git- fixes). * dm stats: check for and propagate alloc_percpu failure (git-fixes). * dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git- fixes). * dm thin metadata: check fail_io before using data_sm (git-fixes). * dm thin: add cond_resched() to various workqueue loops (git-fixes). * dm thin: fix deadlock when swapping to thin device (bsc#1177529). * dm verity: do not perform FEC for failed readahead IO (git-fixes). * dm verity: fix error handling for check_at_most_once on FEC (git-fixes). * dm verity: skip redundant verity_handle_err() on I/O errors (git-fixes). * dm zoned: free dmz->ddev array in dmz_put_zoned_devices (git-fixes). * dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes). * dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes). * dm-verity: align struct dm_verity_fec_io properly (git-fixes). * dm: add cond_resched() to dm_wq_work() (git-fixes). * dm: do not lock fs when the map is NULL during suspend or resume (git- fixes). * dm: do not lock fs when the map is NULL in process of resume (git-fixes). * dm: remove flush_scheduled_work() during local_exit() (git-fixes). * dm: send just one event on resize, not two (git-fixes). * doc/README.KSYMS: Add to repo. * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * intel_idle: add Emerald Rapids Xeon support (bsc#1216016). * kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * loop: suppress uevents while reconfiguring the device (git-fixes). * nbd: Fix debugfs_create_dir error checking (git-fixes). * nbd: fix incomplete validation of ioctl arg (git-fixes). * nbd: use the correct block_device in nbd_bdev_reset (git-fixes). * nfsd: fix RELEASE_LOCKOWNER (bsc#1218968). * nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349). * null_blk: Always check queue mode setting from configfs (git-fixes). * powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR- IOV device (bsc#1212091 ltc#199106 git-fixes). * rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails (git- fixes). * rbd: decouple header read-in from updating rbd_dev->header (git-fixes). * rbd: decouple parent info read-in from updating rbd_dev (git-fixes). * rbd: get snapshot context after exclusive lock is ensured to be held (git- fixes). * rbd: harden get_lock_owner_info() a bit (git-fixes). * rbd: make get_lock_owner_info() return a single locker or NULL (git-fixes). * rbd: move RBD_OBJ_FLAG_COPYUP_ENABLED flag setting (git-fixes). * rbd: move rbd_dev_refresh() definition (git-fixes). * rbd: prevent busy loop when requesting exclusive lock (git-fixes). * rbd: retrieve and check lock owner twice before blocklisting (git-fixes). * rbd: take header_rwsem in rbd_dev_refresh() only when updating (git-fixes). * sched/isolation: add cpu_is_isolated() API (bsc#1217895). * scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097). * scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097). * trace,smp: Add tracepoints around remotelly called functions (bsc#1217895). * vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-515=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-515=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-515=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-515=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-515=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-515=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-515=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-515=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-515=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-515=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-515=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-515=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-515=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-515=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-515=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-515=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-515=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.108.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-debugsource-5.14.21-150400.24.108.1 * kernel-64kb-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-obs-build-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-obs-build-debugsource-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-syms-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * reiserfs-kmp-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.108.1 * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-extra-5.14.21-150400.24.108.1 * kernel-obs-build-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-obs-build-debugsource-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-syms-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.108.1 * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.108.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-debugsource-5.14.21-150400.24.108.1 * kernel-64kb-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-obs-build-debugsource-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-syms-5.14.21-150400.24.108.1 * kernel-obs-build-5.14.21-150400.24.108.1 * reiserfs-kmp-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-source-5.14.21-150400.24.108.1 * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.108.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-obs-build-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-obs-build-debugsource-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-syms-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * reiserfs-kmp-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.108.1 * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.108.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * SUSE Manager Server 4.3 (noarch) * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.108.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.108.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (noarch) * kernel-source-vanilla-5.14.21-150400.24.108.1 * kernel-source-5.14.21-150400.24.108.1 * kernel-docs-html-5.14.21-150400.24.108.1 * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debuginfo-5.14.21-150400.24.108.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.108.1 * kernel-debug-devel-5.14.21-150400.24.108.1 * kernel-debug-debugsource-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.108.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.108.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-kvmsmall-devel-5.14.21-150400.24.108.1 * kernel-default-base-rebuild-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-kvmsmall-debugsource-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-livepatch-5.14.21-150400.24.108.1 * kernel-default-optional-5.14.21-150400.24.108.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-syms-5.14.21-150400.24.108.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.108.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-devel-5.14.21-150400.24.108.1 * dlm-kmp-default-5.14.21-150400.24.108.1 * kernel-default-extra-5.14.21-150400.24.108.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-obs-qa-5.14.21-150400.24.108.1 * kernel-obs-build-debugsource-5.14.21-150400.24.108.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * reiserfs-kmp-default-5.14.21-150400.24.108.1 * cluster-md-kmp-default-5.14.21-150400.24.108.1 * ocfs2-kmp-default-5.14.21-150400.24.108.1 * kernel-default-livepatch-devel-5.14.21-150400.24.108.1 * gfs2-kmp-default-5.14.21-150400.24.108.1 * kselftests-kmp-default-5.14.21-150400.24.108.1 * kernel-obs-build-5.14.21-150400.24.108.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_23-debugsource-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.108.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (aarch64) * dtb-altera-5.14.21-150400.24.108.1 * dtb-amlogic-5.14.21-150400.24.108.1 * dtb-nvidia-5.14.21-150400.24.108.1 * dtb-xilinx-5.14.21-150400.24.108.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.108.1 * kselftests-kmp-64kb-5.14.21-150400.24.108.1 * dtb-apm-5.14.21-150400.24.108.1 * reiserfs-kmp-64kb-5.14.21-150400.24.108.1 * dtb-lg-5.14.21-150400.24.108.1 * gfs2-kmp-64kb-5.14.21-150400.24.108.1 * dtb-qcom-5.14.21-150400.24.108.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.108.1 * ocfs2-kmp-64kb-5.14.21-150400.24.108.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-devel-5.14.21-150400.24.108.1 * dtb-allwinner-5.14.21-150400.24.108.1 * dtb-hisilicon-5.14.21-150400.24.108.1 * dtb-rockchip-5.14.21-150400.24.108.1 * dlm-kmp-64kb-5.14.21-150400.24.108.1 * dtb-freescale-5.14.21-150400.24.108.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.108.1 * dtb-amazon-5.14.21-150400.24.108.1 * cluster-md-kmp-64kb-5.14.21-150400.24.108.1 * dtb-broadcom-5.14.21-150400.24.108.1 * dtb-renesas-5.14.21-150400.24.108.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-extra-5.14.21-150400.24.108.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.108.1 * dtb-cavium-5.14.21-150400.24.108.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-optional-5.14.21-150400.24.108.1 * dtb-apple-5.14.21-150400.24.108.1 * dtb-marvell-5.14.21-150400.24.108.1 * dtb-mediatek-5.14.21-150400.24.108.1 * dtb-arm-5.14.21-150400.24.108.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.108.1 * dtb-sprd-5.14.21-150400.24.108.1 * kernel-64kb-debuginfo-5.14.21-150400.24.108.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.108.1 * dtb-exynos-5.14.21-150400.24.108.1 * dtb-amd-5.14.21-150400.24.108.1 * dtb-socionext-5.14.21-150400.24.108.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-debugsource-5.14.21-150400.24.108.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.108.1 * openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.108.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.108.1 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-livepatch-devel-5.14.21-150400.24.108.1 * kernel-livepatch-SLE15-SP4_Update_23-debugsource-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_108-default-debuginfo-1-150400.9.5.1 * kernel-default-livepatch-5.14.21-150400.24.108.1 * kernel-livepatch-5_14_21-150400_24_108-default-1-150400.9.5.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * gfs2-kmp-default-5.14.21-150400.24.108.1 * cluster-md-kmp-default-5.14.21-150400.24.108.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.108.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.108.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.108.1 * dlm-kmp-default-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.108.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-64kb-debugsource-5.14.21-150400.24.108.1 * kernel-64kb-debuginfo-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.108.1 * kernel-obs-build-5.14.21-150400.24.108.1 * kernel-default-debugsource-5.14.21-150400.24.108.1 * kernel-default-base-5.14.21-150400.24.108.1.150400.24.50.2 * kernel-default-devel-5.14.21-150400.24.108.1 * kernel-obs-build-debugsource-5.14.21-150400.24.108.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.108.1 * kernel-syms-5.14.21-150400.24.108.1 * kernel-default-debuginfo-5.14.21-150400.24.108.1 * reiserfs-kmp-default-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-source-5.14.21-150400.24.108.1 * kernel-macros-5.14.21-150400.24.108.1 * kernel-devel-5.14.21-150400.24.108.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.108.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0641.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1085.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://www.suse.com/security/cve/CVE-2024-24860.html * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1177529 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1212091 * https://bugzilla.suse.com/show_bug.cgi?id=1215275 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216016 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217217 * https://bugzilla.suse.com/show_bug.cgi?id=1217670 * https://bugzilla.suse.com/show_bug.cgi?id=1217895 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218916 * https://bugzilla.suse.com/show_bug.cgi?id=1218929 * https://bugzilla.suse.com/show_bug.cgi?id=1218930 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219349 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219429 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219490 * https://bugzilla.suse.com/show_bug.cgi?id=1219608 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:30:44 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:30:44 -0000 Subject: SUSE-SU-2024:0514-1: important: Security update for the Linux Kernel Message-ID: <170801464474.18974.9022614584531822068@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0514-1 Rating: important References: * bsc#1065729 * bsc#1108281 * bsc#1141539 * bsc#1174649 * bsc#1181674 * bsc#1193285 * bsc#1194869 * bsc#1209834 * bsc#1210443 * bsc#1211515 * bsc#1212091 * bsc#1214377 * bsc#1215275 * bsc#1215885 * bsc#1216441 * bsc#1216559 * bsc#1216702 * bsc#1217895 * bsc#1217987 * bsc#1217988 * bsc#1217989 * bsc#1218005 * bsc#1218447 * bsc#1218527 * bsc#1218659 * bsc#1218689 * bsc#1218713 * bsc#1218723 * bsc#1218730 * bsc#1218738 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218778 * bsc#1218779 * bsc#1218804 * bsc#1218832 * bsc#1218836 * bsc#1218916 * bsc#1218948 * bsc#1218958 * bsc#1218968 * bsc#1218997 * bsc#1219006 * bsc#1219012 * bsc#1219013 * bsc#1219014 * bsc#1219053 * bsc#1219067 * bsc#1219120 * bsc#1219128 * bsc#1219136 * bsc#1219285 * bsc#1219349 * bsc#1219412 * bsc#1219429 * bsc#1219434 * bsc#1219490 * bsc#1219512 * bsc#1219568 * bsc#1219582 * bsc#1219608 * jsc#PED-4729 * jsc#PED-6694 * jsc#PED-7322 * jsc#PED-7615 * jsc#PED-7616 * jsc#PED-7618 * jsc#PED-7620 * jsc#PED-7622 * jsc#PED-7623 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-4921 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2023-6356 * CVE-2023-6531 * CVE-2023-6535 * CVE-2023-6536 * CVE-2023-6915 * CVE-2024-0340 * CVE-2024-0565 * CVE-2024-0641 * CVE-2024-0775 * CVE-2024-1085 * CVE-2024-1086 * CVE-2024-24860 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6356 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6531 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6531 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6535 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6535 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6536 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0565 ( NVD ): 7.4 CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1085 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-24860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24860 ( NVD ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 21 vulnerabilities, contains nine features and has 41 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429). * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988). * CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989). * CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916). * CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832). * CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447). * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608). The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package (bsc#1218713). * Documentation: RAS: Add index and address translation section (jsc#PED-7618). * ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes). * ACPI: LPSS: Fix the fractional clock divider flags (git-fixes). * ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377) * ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes). * ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377) * ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes). * ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes). * ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377) * ACPI: video: check for error while searching for backlight device parent (git-fixes). * ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git- fixes). * ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes). * ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes). * ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes). * ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes). * ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes). * ALSA: hda: Refer to correct stream index at loops (git-fixes). * ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git- fixes). * ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes). * ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes). * ASoC: Intel: Skylake: mem leak in skl register function (git-fixes). * ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git- fixes). * ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes). * ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136). * ASoC: amd: Add check for acp config flags (bsc#1219136). * ASoC: amd: Add new dmi entries to config entry (bsc#1219136). * ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136). * ASoC: amd: Drop empty platform remove function (bsc#1219136). * ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136). * ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes). * ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136). * ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136). * ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136). * ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136). * ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136). * ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes). * ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136). * ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136). * ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136). * ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136). * ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136). * ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136). * ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136). * ASoC: amd: acp: Refactor bit width calculation (bsc#1219136). * ASoC: amd: acp: Refactor dai format implementation (bsc#1219136). * ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136). * ASoC: amd: acp: add a label to make error path more clean (bsc#1219136). * ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136). * ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136). * ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136). * ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136). * ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136). * ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136). * ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136). * ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136). * ASoC: amd: acp: move pdm macros to common header file (bsc#1219136). * ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136). * ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136). * ASoC: amd: acp: remove acp poweroff function (bsc#1219136). * ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136). * ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136). * ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136). * ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136). * ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136). * ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136). * ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136). * ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136). * ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136). * ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136). * ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136). * ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136). * ASoC: amd: add acp6.2 irq handler (bsc#1219136). * ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136). * ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136). * ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136). * ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136). * ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136). * ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136). * ASoC: amd: fix ACP version typo mistake (bsc#1219136). * ASoC: amd: fix spelling mistake: "i.e" -> "i.e." (bsc#1219136). * ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136). * ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136). * ASoC: amd: ps: Update copyright notice (bsc#1219136). * ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136). * ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136). * ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136). * ASoC: amd: ps: move irq handler registration (bsc#1219136). * ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136). * ASoC: amd: ps: refactor platform device creation logic (bsc#1219136). * ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136). * ASoC: amd: ps: remove unused variable (bsc#1219136). * ASoC: amd: ps: update dev index value in irq handler (bsc#1219136). * ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136). * ASoC: amd: ps: update the acp clock source (bsc#1219136). * ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136). * ASoC: amd: ps: use static function (bsc#1219136). * ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: update pm_runtime enable sequence (bsc#1219136). * ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136). * ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136). * ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136). * ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136). * ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136). * ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136). * ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136). * ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136). * ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136). * ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136). * ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136). * ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136). * ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136). * ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136). * ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136). * ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136). * ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136). * ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136). * ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136). * ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136). * ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136). * ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136). * ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136). * ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes). * ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes). * ASoC: codecs: wcd938x: handle deferred probe (git-fixes). * ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes). * ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes). * ASoC: cs43130: Fix the position of const qualifier (git-fixes). * ASoC: da7219: Support low DC impedance headset (git-fixes). * ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes). * ASoC: ops: add correct range check for limiting volume (git-fixes). * ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes). * ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes). * ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes). * ASoC: wm8974: Correct boost mixer inputs (git-fixes). * Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136). * Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes). * Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes). * Documentation: Begin a RAS section (jsc#PED-7622). * EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618). * EDAC/amd64: Add context struct (jsc#PED-7615). * EDAC/amd64: Add get_err_info() to pvt->ops (jsc#PED-7615). * EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616). * EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615). * EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622). * EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615). * EDAC/amd64: Cache and use GPU node map (jsc#PED-7616). * EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615). * EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616). * EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615). * EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615). * EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615). * EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615). * EDAC/amd64: Remove early_channel_count() (jsc#PED-7615). * EDAC/amd64: Remove module version string (jsc#PED-7615). * EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615). * EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615). * EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615). * EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615). * EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615). * EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615). * EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618). * EDAC/mc: Add new HBM2 memory type (jsc#PED-7616). * EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622). * EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622). * EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes). * Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738) * HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes). * HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes). * IB/iser: Prevent invalidating wrong MR (git-fixes) * Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes). * Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes). * Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git- fixes). * Input: atkbd - use ab83 as id when skipping the getid command (git-fixes). * Input: bcm5974 - check endpoint type before starting traffic (git-fixes). * Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes). * Input: xpad - add Razer Wolverine V2 support (git-fixes). * KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes). * KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997). * KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322). * PCI/AER: Configure ECRC only if AER is native (bsc#1218778) * PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes). * PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes). * PCI: keystone: Fix race condition when initializing PHYs (git-fixes). * PM: hibernate: Enforce ordering during image compression/decompression (git- fixes). * RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618). * RAS/AMD/ATL: Add MI300 support (jsc#PED-7618). * RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618). * RAS: Introduce AMD Address Translation Library (jsc#PED-7618). * RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes) * RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes) * RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes) * RDMA/irdma: Add wait for suspend on SQD (git-fixes) * RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes) * RDMA/irdma: Do not modify to SQD on error (git-fixes) * RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes) * RDMA/irdma: Refactor error handling in create CQP (git-fixes) * RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes) * RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes) * RDMA/rtrs-clt: Start hb after path_up (git-fixes) * RDMA/rtrs-srv: Check return values while processing info request (git-fixes) * RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git- fixes) * RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes) * RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git- fixes) * RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes) * USB: xhci: workaround for grace period (git-fixes). * Update config files: enable ASoC AMD PS drivers (bsc#1219136) * acpi: property: Let args be NULL in __acpi_node_get_property_reference (git- fixes). * aio: fix mremap after fork null-deref (git-fixes). * apparmor: avoid crash when parsed profile name is empty (git-fixes). * arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729) * arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV. * arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729) * arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes) * arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git- fixes) * arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes) * arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes) * arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes) * arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes) * arm64: module: move find_section to header (jsc#PED-4729) * arm64: vdso: Fix "no previous prototype" warning (jsc#PED-4729) * arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729) * arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729) * asix: Add check for usbnet_get_endpoints (git-fixes). * attr: block mode changes of symlinks (git-fixes). * badblocks: add helper routines for badblock ranges handling (bsc#1174649). * badblocks: add more helper structure and routines in badblocks.h (bsc#1174649). * badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649). * badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649). * badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649). * badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649). * badblocks: switch to the improved badblock handling code (bsc#1174649). * bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes). * bus: mhi: host: Add alignment check for event ring read pointer (git-fixes). * bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git- fixes). * bus: mhi: host: Drop chan lock before queuing buffers (git-fixes). * ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568). * clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes). * clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes). * clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes). * clk: samsung: Fix kernel-doc comments (git-fixes). * clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git- fixes). * clk: zynqmp: Add a check for NULL pointer (git-fixes). * clk: zynqmp: make bestdiv unsigned (git-fixes). * clocksource: Skip watchdog check for large watchdog intervals (git-fixes). * clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885). * coresight: etm4x: Add ACPI support in platform driver (bsc#1218779) * coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779) * coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779) * coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779) * coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779) * coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779) * coresight: platform: acpi: Ignore the absence of graph (bsc#1218779) * crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes). * crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes). * crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes). * crypto: sahara - do not resize req->src when doing hash operations (git- fixes). * crypto: sahara - fix ahash reqsize (git-fixes). * crypto: sahara - fix ahash selftest failure (git-fixes). * crypto: sahara - fix cbc selftest failure (git-fixes). * crypto: sahara - fix processing hash requests with req->nbytes < sg->length (git-fixes). * crypto: sahara - fix processing requests with cryptlen < sg->length (git- fixes). * crypto: sahara - fix wait_for_completion_timeout() error handling (git- fixes). * crypto: sahara - handle zero-length aes requests (git-fixes). * crypto: sahara - improve error handling in sahara_sha_process() (git-fixes). * crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes). * crypto: scomp - fix req->dst buffer overflow (git-fixes). * dma-debug: fix kernel-doc warnings (git-fixes). * dmaengine: fix NULL pointer in channel unregistration function (git-fixes). * dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git- fixes). * dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes). * dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes). * dmaengine: ti: k3-udma: Report short packet errors (git-fixes). * doc/README.KSYMS: Add to repo. * drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes). * drivers: clk: zynqmp: calculate closest mux rate (git-fixes). * drivers: clk: zynqmp: update divider round rate logic (git-fixes). * drm/amd/display: Fix tiled display misalignment (git-fixes). * drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git- fixes). * drm/amd/display: add nv12 bounding box (git-fixes). * drm/amd/display: get dprefclk ss info from integration info table (git- fixes). * drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes). * drm/amd/display: pbn_div need be updated for hotplug event (git-fixes). * drm/amd/display: update dcn315 lpddr pstate latency (git-fixes). * drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes). * drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git- fixes). * drm/amd/pm: fix a double-free in si_dpm_init (git-fixes). * drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes). * drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes). * drm/amdgpu/pm: Fix the power source flag error (git-fixes). * drm/amdgpu: Add NULL checks for function pointers (git-fixes). * drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes). * drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes). * drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes). * drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes). * drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git- fixes). * drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes). * drm/amdgpu: Let KFD sync with VM fences (git-fixes). * drm/amdgpu: Release 'adev->pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes). * drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git- fixes). * drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes). * drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes). * drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes). * drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git- fixes). * drm/amdkfd: Fix lock dependency warning (git-fixes). * drm/amdkfd: Fix lock dependency warning with srcu (git-fixes). * drm/amdkfd: Use resource_size() helper function (git-fixes). * drm/amdkfd: fixes for HMM mem allocation (git-fixes). * drm/bridge: Fix typo in post_disable() description (git-fixes). * drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes). * drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes). * drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes). * drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes). * drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes). * drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes). * drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git- fixes). * drm/bridge: tc358767: Fix return value on error case (git-fixes). * drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes). * drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes). * drm/crtc: fix uninitialized variable use (git-fixes). * drm/drv: propagate errors from drm_modeset_register_all() (git-fixes). * drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git- fixes). * drm/exynos: fix a potential error pointer dereference (git-fixes). * drm/exynos: fix a wrong error checking (git-fixes). * drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes). * drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git- fixes). * drm/framebuffer: Fix use of uninitialized variable (git-fixes). * drm/mediatek: Return error if MDP RDMA failed to enable the clock (git- fixes). * drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes). * drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes). * drm/msm/dpu: Set input_sel bit for INTF (git-fixes). * drm/msm/dpu: fix writeback programming for YUV cases (git-fixes). * drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes). * drm/msm/dsi: Enable runtime PM (git-fixes). * drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git- fixes). * drm/msm/mdp4: flush vblank event on disable (git-fixes). * drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git- fixes). * drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes). * drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes). * drm/panel: nt35510: fix typo (git-fixes). * drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git- fixes). * drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git- fixes). * drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes). * drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git- fixes). * drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git- fixes). * drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git- fixes). * drm/radeon: check return value of radeon_ring_lock() (git-fixes). * drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes). * drm/tidss: Check for K2G in in dispc_softreset() (git-fixes). * drm/tidss: Fix atomic_flush check (git-fixes). * drm/tidss: Fix dss reset (git-fixes). * drm/tidss: Move reset to the end of dispc_init() (git-fixes). * drm/tidss: Return error value from from softreset (git-fixes). * drm/tilcdc: Fix irq free on unload (git-fixes). * drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes). * drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git- fixes). * drm: using mul_u32_u32() requires linux/math64.h (git-fixes). * dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694) * efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes). * eventfd: prevent underflow for eventfd semaphores (git-fixes). * exfat: fix reporting fs error when reading dir beyond EOF (git-fixes). * exfat: support handle zero-size directory (git-fixes). * exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes). * fbdev: Only disable sysfb on the primary device (bsc#1216441) * fbdev: flush deferred IO before closing (git-fixes). * fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes). * fbdev: imxfb: fix left margin setting (git-fixes). * fbdev: mmp: Fix typo and wording in code comment (git-fixes). * firewire: core: correct documentation of fw_csr_string() kernel API (git- fixes). * firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes). * firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes). * fjes: fix memleaks in fjes_hw_setup (git-fixes). * fs/mount_setattr: always cleanup mount_kattr (git-fixes). * fs: Fix error checking for d_hash_and_lookup() (git-fixes). * fs: Move notify_change permission checks into may_setattr (git-fixes). * fs: do not audit the capability check in simple_xattr_list() (git-fixes). * fs: drop peer group ids under namespace lock (git-fixes). * fs: indicate request originates from old mount API (git-fixes). * fs: sendfile handles O_NONBLOCK of out_fd (git-fixes). * fuse: dax: set fc->dax to NULL in fuse_dax_conn_free() (bsc#1218659). * gfs2: Always check inode size of inline inodes (git-fixes). * gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes). * gfs2: Disable page faults during lockless buffered reads (git-fixes). * gfs2: Eliminate ip->i_gh (git-fixes). * gfs2: Eliminate vestigial HIF_FIRST (git-fixes). * gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes). * gfs2: Introduce flag for glock holder auto-demotion (git-fixes). * gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes). * gfs2: Remove redundant check from gfs2_glock_dq (git-fixes). * gfs2: Switch to wait_event in gfs2_logd (git-fixes). * gfs2: assign rgrp glock before compute_bitstructs (git-fixes). * gfs2: low-memory forced flush fixes (git-fixes). * gfs2: release iopen glock early in evict (git-fixes). * gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes). * gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes). * hv_netvsc: rndis_filter needs to select NLS (git-fixes). * hwmon: (corsair-psu) Fix probe when built-in (git-fixes). * hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes). * i2c: rk3x: fix potential spinlock recursion on poll (git-fixes). * i2c: s3c24xx: fix read transfers in polling mode (git-fixes). * i2c: s3c24xx: fix transferring more than one message in polling mode (git- fixes). * iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes). * iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes). * iio: adc: ad9467: do not ignore error codes (git-fixes). * iio: adc: ad9467: fix reset gpio handling (git-fixes). * ipmi: Use regspacings passed as a module parameter (git-fixes). * kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136) * kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported * kdb: Fix a potential buffer overflow in kdb_local() (git-fixes). * kernel-doc: handle a void function without producing a warning (git-fixes). * kernel-source: Fix description typo * kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git- fixes). * leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes). * leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes). * libapi: Add missing linux/types.h header to get the __u64 type on io.h (git- fixes). * md: fix bi_status reporting in md_end_clone_io (bsc#1210443). * media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes). * media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes). * media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes). * media: imx355: Enable runtime PM before registering async sub-device (git- fixes). * media: ov9734: Enable runtime PM before registering async sub-device (git- fixes). * media: pvrusb2: fix use after free on context disconnection (git-fixes). * media: rkisp1: Disable runtime PM in probe error path (git-fixes). * media: rkisp1: Fix media device memory leak (git-fixes). * media: rkisp1: Read the ID register at probe time instead of streamon (git- fixes). * media: videobuf2-dma-sg: fix vmap callback (git-fixes). * mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes). * misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes). * mm: fs: initialize fsdata passed to write_begin/write_end interface (git- fixes). * mmc: core: Cancel delayed work before releasing host (git-fixes). * modpost: move **attribute** ((format(printf, 2, 3))) to modpost.h (git- fixes). * mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes). * mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git- fixes). * mtd: rawnand: pl353: Fix kernel doc (git-fixes). * mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git- fixes). * mtd: rawnand: rockchip: Rename a structure (git-fixes). * net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes). * net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948). * net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948). * net: usb: ax88179_178a: move priv to driver_priv (git-fixes). * net: usb: ax88179_178a: remove redundant init code (git-fixes). * net: usb: ax88179_178a: restore state on resume (bsc#1218948). * nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes). * nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349). * nfsd: fix RELEASE_LOCKOWNER (bsc#1218968). * nouveau/tu102: flush all pdbs on vmm flush (git-fixes). * nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes). * nsfs: add compat ioctl handler (git-fixes). * nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515). * nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes). * nvme-pci: fix sleeping function called from interrupt context (git-fixes). * nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git- fixes). * nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515). * nvme: fix max_discard_sectors calculation (git-fixes). * nvme: introduce helper function to get ctrl state (git-fixes). * nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515). * nvme: start keep-alive after admin queue setup (bsc#1211515). * nvme: trace: avoid memcpy overflow warning (git-fixes). * nvmet: re-fix tracing strncpy() warning (git-fixes). * of: Fix double free in of_parse_phandle_with_args_map (git-fixes). * of: unittest: Fix of_count_phandle_with_args() expected value message (git- fixes). * parport: parport_serial: Add Brainboxes BAR details (git-fixes). * parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes). * perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958). * perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958). * perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512). * phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes). * phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes). * pinctrl: intel: Revert "Unexport intel_pinctrl_probe()" (git-fixes). * platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620). * platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620). * platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620). * platform/x86/amd/hsmp: improve the error log (jsc#PED-7620). * platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285). * platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620). * power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes). * power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes). * powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes). * powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869). * powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR- IOV device (bsc#1212091 ltc#199106 git-fixes). * powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729). * powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869). * powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869). * powerpc/xive: Fix endian conversion size (bsc#1194869). * pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git- fixes). * pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes). * pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes). * pwm: stm32: Fix enable count for clk in .probe() (git-fixes). * pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes). * pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git- fixes). * r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes). * r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes). * reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git- fixes). * ring-buffer/Documentation: Add documentation on buffer_percent file (git- fixes). * ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes). * s390/dasd: fix double module refcount decrement (bsc#1141539). * s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006). * s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012). * s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014). * s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013). * s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723). * s390: vfio-ap: tighten the NIB validity check (git-fixes). * sched/isolation: add cpu_is_isolated() API (bsc#1217895). * scripts/kernel-doc: restore warning for Excess struct/union (git-fixes). * scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes). * scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes). * scsi: core: Always send batch on reset or error handling command (git- fixes). * scsi: fnic: Return error if vmalloc() failed (git-fixes). * scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes). * scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes). * scsi: hisi_sas: Fix warnings detected by sparse (git-fixes). * scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes). * scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes). * scsi: hisi_sas: Rename HISI_SAS_{RESET -> RESETTING}_BIT (git-fixes). * scsi: hisi_sas: Replace with standard error code return value (git-fixes). * scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes). * scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git- fixes). * scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes). * scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097). * scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097). * scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes). * scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes). * scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582). * scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582). * scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582). * scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582). * scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes). * scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes). * scsi: mpt3sas: Fix an outdated comment (git-fixes). * scsi: mpt3sas: Fix in error path (git-fixes). * scsi: mpt3sas: Fix loop logic (bsc#1219067). * scsi: mpt3sas: Fix loop logic (git-fixes). * scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes). * scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes). * scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes). * selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes). * serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes). * serial: core: Fix atomicity violation in uart_tiocmget (git-fixes). * serial: imx: Correct clock error message in function probe() (git-fixes). * serial: imx: fix tx statemachine deadlock (git-fixes). * serial: max310x: fail probe if clock crystal is unstable (git-fixes). * serial: max310x: improve crystal stable clock detection (git-fixes). * serial: max310x: set default value when reading clock ready bit (git-fixes). * serial: sc16is7xx: add check for unsupported SPI modes during probe (git- fixes). * serial: sc16is7xx: set safe default SPI clock frequency (git-fixes). * serial: sccnxp: Improve error message if regulator_disable() fails (git- fixes). * shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git- fixes). * software node: Let args be NULL in software_node_get_reference_args (git- fixes). * spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes). * swiotlb-xen: provide the "max_mapping_size" method (git-fixes). * swiotlb: fix a braino in the alignment check fix (bsc#1216559). * swiotlb: fix slot alignment checks (bsc#1216559). * trace,smp: Add tracepoints around remotelly called functions (bsc#1217895). * tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes). * tracing/trigger: Fix to return error if failed to alloc snapshot (git- fixes). * tracing: Add size check when printing trace_marker output (git-fixes). * tracing: Ensure visibility when inserting an element into tracing_map (git- fixes). * tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes). * tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes). * ubifs: Check @c->dirty_[n|p]n_cnt and @c->nroot state under @c->lp_mutex (git-fixes). * ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes). * ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (git- fixes). * uio: Fix use-after-free in uio_open (git-fixes). * usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git- fixes). * usb: cdns3: fix uvc failure work since sg support enabled (git-fixes). * usb: chipidea: wait controller resume finished for wakeup irq (git-fixes). * usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes). * usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes). * usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git- fixes). * usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes). * usb: otg numberpad exception (bsc#1218527). * usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes). * usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes). * usb: ucsi: Add missing ppm_lock (git-fixes). * usb: ucsi_acpi: Fix command completion handling (git-fixes). * usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git- fixes). * usr/Kconfig: fix typos of "its" (git-fixes). * vfs: make freeze_super abort when sync_filesystem returns error (git-fixes). * vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes). * virtio-mmio: fix memory leak of vm_dev (git-fixes). * virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes). * vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895). * vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes). * watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes). * watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes). * watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes). * watchdog: set cdev owner before adding (git-fixes). * wifi: ath11k: Defer on rproc_get failure (git-fixes). * wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes). * wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes). * wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git- fixes). * wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes). * wifi: libertas: stop selecting wext (git-fixes). * wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes). * wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git- fixes). * wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes). * wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes). * wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git- fixes). * wifi: rtlwifi: add calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes). * wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git- fixes). * wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes). * x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616). * x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622). * x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623). * x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622). * x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616). * x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615). * x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615). * x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285). * x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes). * x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes). * x86/mce: Cleanup mce_usable_address() (jsc#PED-7623). * x86/mce: Define amd_mce_usable_address() (jsc#PED-7623). * xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes). * xen/events: fix delayed eoi list handling (git-fixes). * xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes). * xhci: cleanup xhci_hub_control port references (git-fixes). * xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes). * xhci: track port suspend state correctly in unsuccessful resume cases (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-514=1 openSUSE-SLE-15.5-2024-514=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-514=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-debuginfo-5.14.21-150500.33.34.1 * gfs2-kmp-azure-5.14.21-150500.33.34.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.34.1 * ocfs2-kmp-azure-5.14.21-150500.33.34.1 * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-extra-debuginfo-5.14.21-150500.33.34.1 * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-debugsource-5.14.21-150500.33.34.1 * kernel-syms-azure-5.14.21-150500.33.34.1 * kernel-azure-optional-5.14.21-150500.33.34.1 * reiserfs-kmp-azure-5.14.21-150500.33.34.1 * kselftests-kmp-azure-5.14.21-150500.33.34.1 * cluster-md-kmp-azure-5.14.21-150500.33.34.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.34.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-devel-5.14.21-150500.33.34.1 * kernel-azure-extra-5.14.21-150500.33.34.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-livepatch-devel-5.14.21-150500.33.34.1 * dlm-kmp-azure-5.14.21-150500.33.34.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.34.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-debuginfo-5.14.21-150500.33.34.1 * kernel-azure-vdso-5.14.21-150500.33.34.1 * openSUSE Leap 15.5 (noarch) * kernel-devel-azure-5.14.21-150500.33.34.1 * kernel-source-azure-5.14.21-150500.33.34.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.34.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-azure-debuginfo-5.14.21-150500.33.34.1 * kernel-syms-azure-5.14.21-150500.33.34.1 * kernel-azure-devel-5.14.21-150500.33.34.1 * kernel-azure-debugsource-5.14.21-150500.33.34.1 * kernel-azure-devel-debuginfo-5.14.21-150500.33.34.1 * Public Cloud Module 15-SP5 (noarch) * kernel-devel-azure-5.14.21-150500.33.34.1 * kernel-source-azure-5.14.21-150500.33.34.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2023-6356.html * https://www.suse.com/security/cve/CVE-2023-6531.html * https://www.suse.com/security/cve/CVE-2023-6535.html * https://www.suse.com/security/cve/CVE-2023-6536.html * https://www.suse.com/security/cve/CVE-2023-6915.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0565.html * https://www.suse.com/security/cve/CVE-2024-0641.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1085.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://www.suse.com/security/cve/CVE-2024-24860.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1174649 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1193285 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1209834 * https://bugzilla.suse.com/show_bug.cgi?id=1210443 * https://bugzilla.suse.com/show_bug.cgi?id=1211515 * https://bugzilla.suse.com/show_bug.cgi?id=1212091 * https://bugzilla.suse.com/show_bug.cgi?id=1214377 * https://bugzilla.suse.com/show_bug.cgi?id=1215275 * https://bugzilla.suse.com/show_bug.cgi?id=1215885 * https://bugzilla.suse.com/show_bug.cgi?id=1216441 * https://bugzilla.suse.com/show_bug.cgi?id=1216559 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1217895 * https://bugzilla.suse.com/show_bug.cgi?id=1217987 * https://bugzilla.suse.com/show_bug.cgi?id=1217988 * https://bugzilla.suse.com/show_bug.cgi?id=1217989 * https://bugzilla.suse.com/show_bug.cgi?id=1218005 * https://bugzilla.suse.com/show_bug.cgi?id=1218447 * https://bugzilla.suse.com/show_bug.cgi?id=1218527 * https://bugzilla.suse.com/show_bug.cgi?id=1218659 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218723 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218738 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218778 * https://bugzilla.suse.com/show_bug.cgi?id=1218779 * https://bugzilla.suse.com/show_bug.cgi?id=1218804 * https://bugzilla.suse.com/show_bug.cgi?id=1218832 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218916 * https://bugzilla.suse.com/show_bug.cgi?id=1218948 * https://bugzilla.suse.com/show_bug.cgi?id=1218958 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1218997 * https://bugzilla.suse.com/show_bug.cgi?id=1219006 * https://bugzilla.suse.com/show_bug.cgi?id=1219012 * https://bugzilla.suse.com/show_bug.cgi?id=1219013 * https://bugzilla.suse.com/show_bug.cgi?id=1219014 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219067 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219136 * https://bugzilla.suse.com/show_bug.cgi?id=1219285 * https://bugzilla.suse.com/show_bug.cgi?id=1219349 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219429 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219490 * https://bugzilla.suse.com/show_bug.cgi?id=1219512 * https://bugzilla.suse.com/show_bug.cgi?id=1219568 * https://bugzilla.suse.com/show_bug.cgi?id=1219582 * https://bugzilla.suse.com/show_bug.cgi?id=1219608 * https://jira.suse.com/browse/PED-4729 * https://jira.suse.com/browse/PED-6694 * https://jira.suse.com/browse/PED-7322 * https://jira.suse.com/browse/PED-7615 * https://jira.suse.com/browse/PED-7616 * https://jira.suse.com/browse/PED-7618 * https://jira.suse.com/browse/PED-7620 * https://jira.suse.com/browse/PED-7622 * https://jira.suse.com/browse/PED-7623 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:30:54 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:30:54 -0000 Subject: SUSE-SU-2024:0513-1: important: Security update for SUSE Manager 4.3.11 Release Notes Message-ID: <170801465458.18974.16560520785191527800@smelt2.prg2.suse.org> # Security update for SUSE Manager 4.3.11 Release Notes Announcement ID: SUSE-SU-2024:0513-1 Rating: important References: * bsc#1170848 * bsc#1210911 * bsc#1211254 * bsc#1211560 * bsc#1211912 * bsc#1213079 * bsc#1213507 * bsc#1213738 * bsc#1213981 * bsc#1214077 * bsc#1214791 * bsc#1215166 * bsc#1215514 * bsc#1215769 * bsc#1215810 * bsc#1215813 * bsc#1215982 * bsc#1216114 * bsc#1216394 * bsc#1216437 * bsc#1216550 * bsc#1216657 * bsc#1216753 * bsc#1216781 * bsc#1216988 * bsc#1217069 * bsc#1217209 * bsc#1217588 * bsc#1217784 * bsc#1217869 * bsc#1218019 * bsc#1218074 * bsc#1218075 * bsc#1218089 * bsc#1218094 * bsc#1218146 * bsc#1218490 * bsc#1218615 * bsc#1218669 * bsc#1218849 * bsc#1219577 * bsc#1219850 * jsc#MSQA-719 Cross-References: * CVE-2023-32189 * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities, contains one feature and has 39 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager-proxy: * Update to SUSE Manager 4.3.11 * Bugs mentioned: bsc#1213738, bsc#1216657, bsc#1216781, bsc#1217209, bsc#1217588 bsc#1218615, bsc#1218849, bsc#1219577, bsc#1219850 ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.11 * Migrate from RHEL and its clones to SUSE Liberty Linux * Reboot required indication for non-SUSE distributions * SSH key rotation for enhanced security * Configure remote command execution * End of Debian 10 support * CVEs fixed: CVE-2023-32189, CVE-2024-22231, CVE-2024-22232 * Bugs mentioned: bsc#1170848, bsc#1210911, bsc#1211254, bsc#1211560, bsc#1211912 bsc#1213079, bsc#1213507, bsc#1213738, bsc#1213981, bsc#1214077 bsc#1214791, bsc#1215166, bsc#1215514, bsc#1215769, bsc#1215810 bsc#1215813, bsc#1215982, bsc#1216114, bsc#1216394, bsc#1216437 bsc#1216550, bsc#1216657, bsc#1216753, bsc#1216781, bsc#1216988 bsc#1217069, bsc#1217209, bsc#1217588, bsc#1217784, bsc#1217869 bsc#1218019, bsc#1218074, bsc#1218075, bsc#1218089, bsc#1218094 bsc#1218490, bsc#1218615, bsc#1218669, bsc#1218849, bsc#1219577 bsc#1219850, bsc#1218146 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-513=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-513=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-513=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-513=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-proxy-4.3.11-150400.3.79.1 * release-notes-susemanager-4.3.11-150400.3.100.1 * SUSE Manager Proxy 4.3 (noarch) * release-notes-susemanager-proxy-4.3.11-150400.3.79.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * release-notes-susemanager-proxy-4.3.11-150400.3.79.1 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.11-150400.3.100.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32189.html * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1170848 * https://bugzilla.suse.com/show_bug.cgi?id=1210911 * https://bugzilla.suse.com/show_bug.cgi?id=1211254 * https://bugzilla.suse.com/show_bug.cgi?id=1211560 * https://bugzilla.suse.com/show_bug.cgi?id=1211912 * https://bugzilla.suse.com/show_bug.cgi?id=1213079 * https://bugzilla.suse.com/show_bug.cgi?id=1213507 * https://bugzilla.suse.com/show_bug.cgi?id=1213738 * https://bugzilla.suse.com/show_bug.cgi?id=1213981 * https://bugzilla.suse.com/show_bug.cgi?id=1214077 * https://bugzilla.suse.com/show_bug.cgi?id=1214791 * https://bugzilla.suse.com/show_bug.cgi?id=1215166 * https://bugzilla.suse.com/show_bug.cgi?id=1215514 * https://bugzilla.suse.com/show_bug.cgi?id=1215769 * https://bugzilla.suse.com/show_bug.cgi?id=1215810 * https://bugzilla.suse.com/show_bug.cgi?id=1215813 * https://bugzilla.suse.com/show_bug.cgi?id=1215982 * https://bugzilla.suse.com/show_bug.cgi?id=1216114 * https://bugzilla.suse.com/show_bug.cgi?id=1216394 * https://bugzilla.suse.com/show_bug.cgi?id=1216437 * https://bugzilla.suse.com/show_bug.cgi?id=1216550 * https://bugzilla.suse.com/show_bug.cgi?id=1216657 * https://bugzilla.suse.com/show_bug.cgi?id=1216753 * https://bugzilla.suse.com/show_bug.cgi?id=1216781 * https://bugzilla.suse.com/show_bug.cgi?id=1216988 * https://bugzilla.suse.com/show_bug.cgi?id=1217069 * https://bugzilla.suse.com/show_bug.cgi?id=1217209 * https://bugzilla.suse.com/show_bug.cgi?id=1217588 * https://bugzilla.suse.com/show_bug.cgi?id=1217784 * https://bugzilla.suse.com/show_bug.cgi?id=1217869 * https://bugzilla.suse.com/show_bug.cgi?id=1218019 * https://bugzilla.suse.com/show_bug.cgi?id=1218074 * https://bugzilla.suse.com/show_bug.cgi?id=1218075 * https://bugzilla.suse.com/show_bug.cgi?id=1218089 * https://bugzilla.suse.com/show_bug.cgi?id=1218094 * https://bugzilla.suse.com/show_bug.cgi?id=1218146 * https://bugzilla.suse.com/show_bug.cgi?id=1218490 * https://bugzilla.suse.com/show_bug.cgi?id=1218615 * https://bugzilla.suse.com/show_bug.cgi?id=1218669 * https://bugzilla.suse.com/show_bug.cgi?id=1218849 * https://bugzilla.suse.com/show_bug.cgi?id=1219577 * https://bugzilla.suse.com/show_bug.cgi?id=1219850 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:30:56 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:30:56 -0000 Subject: SUSE-SU-2024:0512-1: important: Security update for golang-github-prometheus-alertmanager Message-ID: <170801465683.18974.13528874595829965011@smelt2.prg2.suse.org> # Security update for golang-github-prometheus-alertmanager Announcement ID: SUSE-SU-2024:0512-1 Rating: important References: * bsc#1218838 * jsc#MSQA-719 * jsc#PED-7353 Cross-References: * CVE-2023-40577 CVSS scores: * CVE-2023-40577 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-40577 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for golang-github-prometheus-alertmanager fixes the following issues: golang-github-prometheus-alertmanager was updated from version 0.23.0 to 0.26.0 (jsc#PED-7353): * Version 0.26.0: * Security fixes: * CVE-2023-40577: Fix stored XSS via the /api/v1/alerts endpoint in the Alertmanager UI (bsc#1218838) * Other changes and bugs fixed: * Configuration: Fix empty list of receivers and inhibit_rules would cause the alertmanager to crash * Templating: Fixed a race condition when using the title function. It is now race-safe * API: Fixed duplicate receiver names in the api/v2/receivers API endpoint * API: Attempting to delete a silence now returns the correct status code, 404 instead of 500 * Clustering: Fixes a panic when tls_client_config is empty * Webhook: url is now marked as a secret. It will no longer show up in the logs as clear-text * Metrics: New label reason for alertmanager_notifications_failed_total metric to indicate the type of error of the alert delivery * Clustering: New flag --cluster.label, to help to block any traffic that is not meant for the cluster * Integrations: Add Microsoft Teams as a supported integration * Version 0.25.0: * Fail configuration loading if api_key and api_key_file are defined at the same time * Fix the alertmanager_alerts metric to avoid counting resolved alerts as active. Also added a new alertmanager_marked_alerts metric that retain the old behavior * Trim contents of Slack API URLs when reading from files * amtool: Avoid panic when the label value matcher is empty * Fail configuration loading if api_url is empty for OpsGenie * Fix email template for resolved notifications * Add proxy_url support for OAuth2 in HTTP client configuration * Reload TLS certificate and key from disk when updated * Add Discord integration * Add Webex integration * Add min_version support to select the minimum TLS version in HTTP client configuration * Add max_version support to select the maximum TLS version in HTTP client configuration * Emit warning logs when truncating messages in notifications * Support HEAD method for the /-/healty and /-/ready endpoints * Add support for reading global and local SMTP passwords from files * UI: Add 'Link' button to alerts in list * UI: Allow to choose the first day of the week as Sunday or Monday * Version 0.24.0: * Fix HTTP client configuration for the SNS receiver * Fix unclosed file descriptor after reading the silences snapshot file * Fix field names for mute_time_intervals in JSON marshaling * Ensure that the root route doesn't have any matchers * Truncate the message's title to 1024 chars to avoid hitting Slack limits * Fix the default HTML email template (email.default.html) to match with the canonical source * Detect SNS FIFO topic based on the rendered value * Avoid deleting and recreating a silence when an update is possible * api/v2: Return 200 OK when deleting an expired silence * amtool: Fix the silence's end date when adding a silence. The end date is (start date + duration) while it used to be (current time + duration). The new behavior is consistent with the update operation * Add the /api/v2 prefix to all endpoints in the OpenAPI specification and generated client code * Add --cluster.tls-config experimental flag to secure cluster traffic via mutual TLS * Add Telegram integration ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-512=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-512=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-512=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-512=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.19.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.19.1 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.19.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.19.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40577.html * https://bugzilla.suse.com/show_bug.cgi?id=1218838 * https://jira.suse.com/browse/MSQA-719 * https://jira.suse.com/browse/PED-7353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:00 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:00 -0000 Subject: SUSE-RU-2024:0511-1: moderate: Recommended update for grafana Message-ID: <170801466037.18974.8968332396640973955@smelt2.prg2.suse.org> # Recommended update for grafana Announcement ID: SUSE-RU-2024:0511-1 Rating: moderate References: * bsc#1192154 * bsc#1192696 * bsc#1200480 * bsc#1218843 * bsc#1218844 * jsc#MSQA-719 Cross-References: * CVE-2020-7753 * CVE-2021-3807 * CVE-2021-3918 * CVE-2021-43138 * CVE-2022-0155 CVSS scores: * CVE-2020-7753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3918 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3918 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43138 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-0155 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for grafana fixes the following issues: * Fixed changelog entries for the Bugzilla trackers related to previously implemented security fixes (no source code changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-511=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-511=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * grafana-9.5.8-150200.3.53.2 * grafana-debuginfo-9.5.8-150200.3.53.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * grafana-9.5.8-150200.3.53.2 * grafana-debuginfo-9.5.8-150200.3.53.2 ## References: * https://www.suse.com/security/cve/CVE-2020-7753.html * https://www.suse.com/security/cve/CVE-2021-3807.html * https://www.suse.com/security/cve/CVE-2021-3918.html * https://www.suse.com/security/cve/CVE-2021-43138.html * https://www.suse.com/security/cve/CVE-2022-0155.html * https://bugzilla.suse.com/show_bug.cgi?id=1192154 * https://bugzilla.suse.com/show_bug.cgi?id=1192696 * https://bugzilla.suse.com/show_bug.cgi?id=1200480 * https://bugzilla.suse.com/show_bug.cgi?id=1218843 * https://bugzilla.suse.com/show_bug.cgi?id=1218844 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:05 -0000 Subject: SUSE-SU-2024:0510-1: important: Security update for salt Message-ID: <170801466515.18974.8811445527378444809@smelt2.prg2.suse.org> # Security update for salt Announcement ID: SUSE-SU-2024:0510-1 Rating: important References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1219430 * bsc#1219431 * jsc#MSQA-719 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Transactional Server Module 15-SP5 An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: This update for salt fixes the following issues: Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) Bugs fixed: * Ensure that pillar refresh loads beacons from pillar without restart * Fix the aptpkg.py unit test failure * Prefer unittest.mock to python-mock in test suite * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) * Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-510=1 openSUSE-SLE-15.5-2024-510=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-510=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-510=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-510=1 * Transactional Server Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Transactional-Server-15-SP5-2024-510=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * salt-ssh-3006.0-150500.4.29.1 * salt-cloud-3006.0-150500.4.29.1 * python3-salt-testsuite-3006.0-150500.4.29.1 * salt-3006.0-150500.4.29.1 * salt-doc-3006.0-150500.4.29.1 * python3-salt-3006.0-150500.4.29.1 * salt-proxy-3006.0-150500.4.29.1 * salt-syndic-3006.0-150500.4.29.1 * salt-master-3006.0-150500.4.29.1 * salt-minion-3006.0-150500.4.29.1 * salt-transactional-update-3006.0-150500.4.29.1 * salt-api-3006.0-150500.4.29.1 * salt-standalone-formulas-configuration-3006.0-150500.4.29.1 * openSUSE Leap 15.5 (noarch) * salt-bash-completion-3006.0-150500.4.29.1 * salt-fish-completion-3006.0-150500.4.29.1 * salt-zsh-completion-3006.0-150500.4.29.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * salt-minion-3006.0-150500.4.29.1 * salt-3006.0-150500.4.29.1 * python3-salt-3006.0-150500.4.29.1 * salt-transactional-update-3006.0-150500.4.29.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * salt-minion-3006.0-150500.4.29.1 * salt-3006.0-150500.4.29.1 * salt-doc-3006.0-150500.4.29.1 * python3-salt-3006.0-150500.4.29.1 * Basesystem Module 15-SP5 (noarch) * salt-bash-completion-3006.0-150500.4.29.1 * salt-zsh-completion-3006.0-150500.4.29.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * salt-ssh-3006.0-150500.4.29.1 * salt-cloud-3006.0-150500.4.29.1 * salt-proxy-3006.0-150500.4.29.1 * salt-syndic-3006.0-150500.4.29.1 * salt-master-3006.0-150500.4.29.1 * salt-api-3006.0-150500.4.29.1 * salt-standalone-formulas-configuration-3006.0-150500.4.29.1 * Server Applications Module 15-SP5 (noarch) * salt-fish-completion-3006.0-150500.4.29.1 * Transactional Server Module 15-SP5 (aarch64 ppc64le s390x x86_64) * salt-transactional-update-3006.0-150500.4.29.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:08 -0000 Subject: SUSE-SU-2024:0509-1: important: Security update for salt Message-ID: <170801466867.18974.4587903511206951388@smelt2.prg2.suse.org> # Security update for salt Announcement ID: SUSE-SU-2024:0509-1 Rating: important References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1219430 * bsc#1219431 * jsc#MSQA-719 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: This update for salt fixes the following issues: Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) Bugs fixed: * Ensure that pillar refresh loads beacons from pillar without restart * Fix the aptpkg.py unit test failure * Prefer unittest.mock to python-mock in test suite * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) * Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-509=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-509=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-509=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-509=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-509=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-509=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-509=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-509=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-509=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-509=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-509=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-509=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-509=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-509=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-509=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * SUSE Manager Proxy 4.3 (x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Manager Proxy 4.3 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Manager Server 4.3 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * python3-salt-testsuite-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * openSUSE Leap 15.4 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-transactional-update-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * salt-syndic-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * python3-salt-3006.0-150400.8.54.1 * salt-proxy-3006.0-150400.8.54.1 * salt-standalone-formulas-configuration-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-api-3006.0-150400.8.54.1 * salt-ssh-3006.0-150400.8.54.1 * salt-master-3006.0-150400.8.54.1 * salt-cloud-3006.0-150400.8.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * salt-fish-completion-3006.0-150400.8.54.1 * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python3-salt-3006.0-150400.8.54.1 * salt-3006.0-150400.8.54.1 * salt-doc-3006.0-150400.8.54.1 * salt-minion-3006.0-150400.8.54.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * salt-zsh-completion-3006.0-150400.8.54.1 * salt-bash-completion-3006.0-150400.8.54.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:13 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:13 -0000 Subject: SUSE-SU-2024:0508-1: important: Security update for salt Message-ID: <170801467339.18974.3155128151799121149@smelt2.prg2.suse.org> # Security update for salt Announcement ID: SUSE-SU-2024:0508-1 Rating: important References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1219430 * bsc#1219431 * jsc#MSQA-719 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: This update for salt fixes the following issues: Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) Bugs fixed: * Ensure that pillar refresh loads beacons from pillar without restart * Fix the aptpkg.py unit test failure * Prefer unittest.mock to python-mock in test suite * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) * Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-508=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-508=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-508=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-508=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-508=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-508=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-508=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-508=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * salt-standalone-formulas-configuration-3006.0-150300.53.70.1 * python3-salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * python3-salt-testsuite-3006.0-150300.53.70.1 * salt-proxy-3006.0-150300.53.70.1 * salt-transactional-update-3006.0-150300.53.70.1 * salt-doc-3006.0-150300.53.70.1 * salt-master-3006.0-150300.53.70.1 * salt-cloud-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-ssh-3006.0-150300.53.70.1 * salt-syndic-3006.0-150300.53.70.1 * salt-api-3006.0-150300.53.70.1 * openSUSE Leap 15.3 (noarch) * salt-bash-completion-3006.0-150300.53.70.1 * salt-zsh-completion-3006.0-150300.53.70.1 * salt-fish-completion-3006.0-150300.53.70.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * salt-standalone-formulas-configuration-3006.0-150300.53.70.1 * python3-salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-proxy-3006.0-150300.53.70.1 * salt-doc-3006.0-150300.53.70.1 * salt-master-3006.0-150300.53.70.1 * salt-cloud-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-ssh-3006.0-150300.53.70.1 * salt-syndic-3006.0-150300.53.70.1 * salt-api-3006.0-150300.53.70.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * salt-bash-completion-3006.0-150300.53.70.1 * salt-zsh-completion-3006.0-150300.53.70.1 * salt-fish-completion-3006.0-150300.53.70.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * salt-standalone-formulas-configuration-3006.0-150300.53.70.1 * python3-salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-proxy-3006.0-150300.53.70.1 * salt-transactional-update-3006.0-150300.53.70.1 * salt-doc-3006.0-150300.53.70.1 * salt-master-3006.0-150300.53.70.1 * salt-cloud-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-ssh-3006.0-150300.53.70.1 * salt-syndic-3006.0-150300.53.70.1 * salt-api-3006.0-150300.53.70.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * salt-bash-completion-3006.0-150300.53.70.1 * salt-zsh-completion-3006.0-150300.53.70.1 * salt-fish-completion-3006.0-150300.53.70.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * salt-standalone-formulas-configuration-3006.0-150300.53.70.1 * python3-salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-proxy-3006.0-150300.53.70.1 * salt-doc-3006.0-150300.53.70.1 * salt-master-3006.0-150300.53.70.1 * salt-cloud-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-ssh-3006.0-150300.53.70.1 * salt-syndic-3006.0-150300.53.70.1 * salt-api-3006.0-150300.53.70.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * salt-bash-completion-3006.0-150300.53.70.1 * salt-zsh-completion-3006.0-150300.53.70.1 * salt-fish-completion-3006.0-150300.53.70.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * salt-standalone-formulas-configuration-3006.0-150300.53.70.1 * python3-salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-proxy-3006.0-150300.53.70.1 * salt-transactional-update-3006.0-150300.53.70.1 * salt-doc-3006.0-150300.53.70.1 * salt-master-3006.0-150300.53.70.1 * salt-cloud-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-ssh-3006.0-150300.53.70.1 * salt-syndic-3006.0-150300.53.70.1 * salt-api-3006.0-150300.53.70.1 * SUSE Enterprise Storage 7.1 (noarch) * salt-bash-completion-3006.0-150300.53.70.1 * salt-zsh-completion-3006.0-150300.53.70.1 * salt-fish-completion-3006.0-150300.53.70.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python3-salt-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-transactional-update-3006.0-150300.53.70.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python3-salt-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-transactional-update-3006.0-150300.53.70.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python3-salt-3006.0-150300.53.70.1 * salt-3006.0-150300.53.70.1 * salt-minion-3006.0-150300.53.70.1 * salt-transactional-update-3006.0-150300.53.70.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:18 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:18 -0000 Subject: SUSE-SU-2024:0507-1: important: Security update for salt Message-ID: <170801467818.18974.14187190650760375768@smelt2.prg2.suse.org> # Security update for salt Announcement ID: SUSE-SU-2024:0507-1 Rating: important References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1219430 * bsc#1219431 * jsc#MSQA-719 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: This update for salt fixes the following issues: Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) Bugs fixed: * Ensure that pillar refresh loads beacons from pillar without restart * Fix the aptpkg.py unit test failure * Prefer unittest.mock to python-mock in test suite * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) * Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-507=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-507=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-507=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * python3-salt-3006.0-150200.118.1 * salt-api-3006.0-150200.118.1 * salt-cloud-3006.0-150200.118.1 * salt-master-3006.0-150200.118.1 * salt-doc-3006.0-150200.118.1 * salt-minion-3006.0-150200.118.1 * salt-transactional-update-3006.0-150200.118.1 * salt-proxy-3006.0-150200.118.1 * salt-standalone-formulas-configuration-3006.0-150200.118.1 * salt-3006.0-150200.118.1 * salt-syndic-3006.0-150200.118.1 * salt-ssh-3006.0-150200.118.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * salt-bash-completion-3006.0-150200.118.1 * salt-zsh-completion-3006.0-150200.118.1 * salt-fish-completion-3006.0-150200.118.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * python3-salt-3006.0-150200.118.1 * salt-api-3006.0-150200.118.1 * salt-cloud-3006.0-150200.118.1 * salt-master-3006.0-150200.118.1 * salt-doc-3006.0-150200.118.1 * salt-minion-3006.0-150200.118.1 * salt-proxy-3006.0-150200.118.1 * salt-standalone-formulas-configuration-3006.0-150200.118.1 * salt-3006.0-150200.118.1 * salt-syndic-3006.0-150200.118.1 * salt-ssh-3006.0-150200.118.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * salt-bash-completion-3006.0-150200.118.1 * salt-zsh-completion-3006.0-150200.118.1 * salt-fish-completion-3006.0-150200.118.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * python3-salt-3006.0-150200.118.1 * salt-api-3006.0-150200.118.1 * salt-cloud-3006.0-150200.118.1 * salt-master-3006.0-150200.118.1 * salt-doc-3006.0-150200.118.1 * salt-minion-3006.0-150200.118.1 * salt-transactional-update-3006.0-150200.118.1 * salt-proxy-3006.0-150200.118.1 * salt-standalone-formulas-configuration-3006.0-150200.118.1 * salt-3006.0-150200.118.1 * salt-syndic-3006.0-150200.118.1 * salt-ssh-3006.0-150200.118.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * salt-bash-completion-3006.0-150200.118.1 * salt-zsh-completion-3006.0-150200.118.1 * salt-fish-completion-3006.0-150200.118.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:22 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:22 -0000 Subject: SUSE-SU-2024:0506-1: important: Security update for salt Message-ID: <170801468203.18974.8205685545875021549@smelt2.prg2.suse.org> # Security update for salt Announcement ID: SUSE-SU-2024:0506-1 Rating: important References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1219430 * bsc#1219431 * jsc#MSQA-719 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: This update for salt fixes the following issues: Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) Bugs fixed: * Ensure that pillar refresh loads beacons from pillar without restart * Fix the aptpkg.py unit test failure * Prefer unittest.mock to python-mock in test suite * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) * Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-506=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-506=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * salt-api-3006.0-150100.117.1 * python3-salt-3006.0-150100.117.1 * salt-minion-3006.0-150100.117.1 * salt-3006.0-150100.117.1 * salt-master-3006.0-150100.117.1 * salt-ssh-3006.0-150100.117.1 * salt-transactional-update-3006.0-150100.117.1 * salt-standalone-formulas-configuration-3006.0-150100.117.1 * salt-doc-3006.0-150100.117.1 * salt-cloud-3006.0-150100.117.1 * salt-proxy-3006.0-150100.117.1 * salt-syndic-3006.0-150100.117.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * salt-fish-completion-3006.0-150100.117.1 * salt-zsh-completion-3006.0-150100.117.1 * salt-bash-completion-3006.0-150100.117.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * salt-api-3006.0-150100.117.1 * python3-salt-3006.0-150100.117.1 * salt-minion-3006.0-150100.117.1 * salt-3006.0-150100.117.1 * salt-master-3006.0-150100.117.1 * salt-ssh-3006.0-150100.117.1 * salt-transactional-update-3006.0-150100.117.1 * salt-standalone-formulas-configuration-3006.0-150100.117.1 * salt-doc-3006.0-150100.117.1 * salt-cloud-3006.0-150100.117.1 * salt-proxy-3006.0-150100.117.1 * salt-syndic-3006.0-150100.117.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * salt-fish-completion-3006.0-150100.117.1 * salt-zsh-completion-3006.0-150100.117.1 * salt-bash-completion-3006.0-150100.117.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:26 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:26 -0000 Subject: SUSE-RU-2024:0505-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801468681.18974.18341245324750911097@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2024:0505-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2024-505=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-1.33.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:32 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:32 -0000 Subject: SUSE-RU-2024:0502-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801469287.18974.1980425602290255455@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2024:0502-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Debian 12 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-502=1 ## Package List: * SUSE Manager Client Tools for Debian 12 (amd64) * venv-salt-minion-3006.0-2.9.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:35 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:35 -0000 Subject: SUSE-RU-2024:0501-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801469586.18974.8144630348651686037@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2024:0501-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Debian 11 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-501=1 ## Package List: * SUSE Manager Client Tools for Debian 11 (amd64) * venv-salt-minion-3006.0-2.47.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:38 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:38 -0000 Subject: SUSE-RU-2024:0500-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801469884.18974.5938393220445457951@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2024:0500-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Debian 10 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 10 zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2024-500=1 ## Package List: * SUSE Manager Client Tools for Debian 10 (amd64) * venv-salt-minion-3006.0-2.49.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:41 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:41 -0000 Subject: SUSE-RU-202401:15252-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801470150.18974.9188999474938016475@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-202401:15252-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202401-15252=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * venv-salt-minion-3006.0-2.40.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:46 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:46 -0000 Subject: SUSE-RU-202401:15251-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801470610.18974.15793034926550519157@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-202401:15251-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202401-15251=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * venv-salt-minion-3006.0-2.49.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:48 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:48 -0000 Subject: SUSE-RU-2024:0497-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801470851.18974.7526478806130538518@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2024:0497-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-497=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-497=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-497=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-497=1 ## Package List: * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.51.2 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * venv-salt-minion-3006.0-150000.3.51.2 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.51.2 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.51.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:51 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:51 -0000 Subject: SUSE-RU-2024:0496-1: moderate: Recommended update for SUSE Manager Salt Bundle Message-ID: <170801471100.18974.2253967578651975607@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Salt Bundle Announcement ID: SUSE-RU-2024:0496-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * jsc#MSQA-719 Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that contains one feature and has four fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Ensure that pillar refresh loads beacons from pillar without restart * Add libffi to the bundle for Enterprise Linux 8 based systems to make it more compatible with the clones * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-496=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-3.49.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:52 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:52 -0000 Subject: SUSE-RU-2024:0495-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170801471265.18974.12414221694151840663@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0495-1 Rating: moderate References: * bsc#1217832 * jsc#ECO-3319 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that contains two features and has one fix can now be installed. ## Description: This update fixes the following issues: golang-github-lusitaniae-apache_exporter: * Do not strip if SUSE Linux Enterprise 15 SP3 * Exclude debug for Red Hat Enterprise Linux >= 8 * Build with Go >= 1.20 when the OS is not Red Hat Enterprise Linux * Spec file clean up prometheus-postgres_exporter: * Remove duplicated call to systemd requirements * Do not build debug if Red Hat Enterprise Linux >= 8 * Do not strip if SUSE Linux Enterprise 15 SP3 * Build at least with with Go >= 1.18 on Red Hat Enterprise Linux * Build with Go >= 1.20 elsewhere scap-security-guide: * Switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) * Updated to 0.1.70 (jsc#ECO-3319) * Add openembedded distro support * Remove DRAFT wording for OpenShift STIG * Remove test-function-check_playbook_file_removed_and_added test * scap-security-guide: Add Poky support spacecmd: * Version 4.3.26-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2024-495=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * prometheus-postgres_exporter-0.10.1-1.12.1 * golang-github-lusitaniae-apache_exporter-1.0.0-1.11.1 * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (noarch) * scap-security-guide-redhat-0.1.70-1.15.1 * spacecmd-4.3.26-1.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:53 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:53 -0000 Subject: SUSE-RU-2024:0492-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170801471384.18974.13259987565523675800@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0492-1 Rating: moderate References: * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Debian 12 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 4.3.26-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-492=1 ## Package List: * SUSE Manager Client Tools for Debian 12 (all) * spacecmd-4.3.26-3.9.1 ## References: * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:54 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:54 -0000 Subject: SUSE-RU-2024:0491-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170801471498.18974.7049285996456324572@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0491-1 Rating: moderate References: * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Debian 11 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 4.3.26-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-491=1 ## Package List: * SUSE Manager Client Tools for Debian 11 (all) * spacecmd-4.3.26-2.36.1 ## References: * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:57 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:57 -0000 Subject: SUSE-RU-2024:0490-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170801471751.18974.1578415865976462879@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0490-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1217832 * jsc#ECO-3319 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Debian 10 An update that contains two features and has five fixes can now be installed. ## Description: This update fixes the following issues: salt: * Ensure that pillar refresh loads beacons from pillar without restart * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) scap-security-guide: * Switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) * Updated to 0.1.70 (jsc#ECO-3319) * Add openembedded distro support * Remove DRAFT wording for OpenShift STIG * Remove test-function-check_playbook_file_removed_and_added test * scap-security-guide: Add Poky support spacecmd: * Version 4.3.26-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 10 zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2024-490=1 ## Package List: * SUSE Manager Client Tools for Debian 10 (all) * scap-security-guide-debian-0.1.70-2.38.1 * spacecmd-4.3.26-2.63.1 * salt-common-3006.0+ds-1+2.97.1 * salt-minion-3006.0+ds-1+2.97.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:31:58 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:31:58 -0000 Subject: SUSE-RU-202401:15249-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170801471889.18974.2139432970740266822@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-202401:15249-1 Rating: moderate References: * bsc#1217832 * jsc#ECO-3319 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that contains two features and has one fix can now be installed. ## Description: This update fixes the following issues: scap-security-guide: * Switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) * Updated to 0.1.70 (jsc#ECO-3319) * Add openembedded distro support * Remove DRAFT wording for OpenShift STIG * Remove test-function-check_playbook_file_removed_and_added test * scap-security-guide: Add Poky support spacecmd: * Version 4.3.26-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202401-15249=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (all) * scap-security-guide-ubuntu-0.1.70-2.17.4 * spacecmd-4.3.26-2.33.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:01 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:01 -0000 Subject: SUSE-RU-202401:15248-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170801472140.18974.11496560856642931315@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-202401:15248-1 Rating: moderate References: * bsc#1193948 * bsc#1211649 * bsc#1215963 * bsc#1216284 * bsc#1217832 * jsc#ECO-3319 * jsc#MSQA-719 Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that contains two features and has five fixes can now be installed. ## Description: This update fixes the following issues: salt: * Ensure that pillar refresh loads beacons from pillar without restart * Enable "KeepAlive" probes for Salt SSH executions (bsc#1211649) * Revert changes to set Salt configured user early in the stack (bsc#1216284) * Align behavior of some modules when using salt-call via symlink (bsc#1215963) * Fix gitfs " **env** " and improve cache cleaning (bsc#1193948) scap-security-guide: * Switch buggy journald plugindir remediation to write into journald.conf. (bsc#1217832) * Updated to 0.1.70 (jsc#ECO-3319) * Add openembedded distro support * Remove DRAFT wording for OpenShift STIG * Remove test-function-check_playbook_file_removed_and_added test * scap-security-guide: Add Poky support spacecmd: * Version 4.3.26-1 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202401-15248=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (all) * scap-security-guide-ubuntu-0.1.70-2.38.2 * salt-minion-3006.0+ds-1+2.119.2 * salt-common-3006.0+ds-1+2.119.2 * spacecmd-4.3.26-2.78.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1215963 * https://bugzilla.suse.com/show_bug.cgi?id=1216284 * https://bugzilla.suse.com/show_bug.cgi?id=1217832 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:03 -0000 Subject: SUSE-SU-2024:0487-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <170801472383.18974.10957273703127161388@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2024:0487-1 Rating: moderate References: * bsc#1192154 * bsc#1192696 * bsc#1193492 * bsc#1193686 * bsc#1200480 * bsc#1204023 * bsc#1218843 * bsc#1218844 * jsc#MSQA-719 Cross-References: * CVE-2020-7753 * CVE-2021-3807 * CVE-2021-3918 * CVE-2021-43138 * CVE-2021-43798 * CVE-2021-43815 * CVE-2022-0155 * CVE-2022-41715 CVSS scores: * CVE-2020-7753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3918 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3918 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43138 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43798 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43798 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43815 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43815 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-0155 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves eight vulnerabilities and contains one feature can now be installed. ## Description: This update fixes the following issues: golang-github-lusitaniae-apache_exporter: * Do not strip if SUSE Linux Enterprise 15 SP3 * Exclude debug for Red Hat Enterprise Linux >= 8 * Build with Go >= 1.20 when the OS is not Red Hat Enterprise Linux mgr-daemon: * Version 4.3.8-1 * Update translation strings prometheus-postgres_exporter: * Remove duplicated call to systemd requirements * Do not build debug if Red Hat Enterprise Linux >= 8 * Do not strip if SUSE Linux Enterprise 15 SP3 * Build at least with with Go >= 1.18 on Red Hat Enterprise Linux * Build with Go >= 1.20 elsewhere spacecmd: * Version 4.3.26-1 * Update translation strings spacewalk-client-tools: * Version 4.3.18-1 * Update translation strings uyuni-proxy-systemd-services: * Version 4.3.10-1 * Update the image version * Version 4.3.9-1 * Integrate the containerized proxy into the usual rel-eng workflow ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-487=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-487=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-487=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-487=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-487=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.20.1 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.20.1 * prometheus-postgres_exporter-0.10.1-150000.1.17.1 * openSUSE Leap 15.5 (noarch) * spacecmd-4.3.26-150000.3.113.1 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * firewalld-prometheus-config-0.1-150000.3.53.1 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.20.1 * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.20.1 * golang-github-prometheus-prometheus-2.45.0-150000.3.53.1 * grafana-debuginfo-9.5.8-150000.1.60.2 * grafana-9.5.8-150000.1.60.2 * prometheus-postgres_exporter-0.10.1-150000.1.17.1 * SUSE Manager Client Tools for SLE 15 (noarch) * spacewalk-client-setup-4.3.18-150000.3.86.2 * mgr-daemon-4.3.8-150000.1.44.1 * python3-spacewalk-check-4.3.18-150000.3.86.2 * spacewalk-check-4.3.18-150000.3.86.2 * spacewalk-client-tools-4.3.18-150000.3.86.2 * uyuni-proxy-systemd-services-4.3.10-150000.1.15.1 * spacecmd-4.3.26-150000.3.113.1 * python3-spacewalk-client-setup-4.3.18-150000.3.86.2 * python3-spacewalk-client-tools-4.3.18-150000.3.86.2 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * uyuni-proxy-systemd-services-4.3.10-150000.1.15.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.20.1 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.20.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.20.1 * golang-github-lusitaniae-apache_exporter-debuginfo-1.0.0-150000.1.20.1 ## References: * https://www.suse.com/security/cve/CVE-2020-7753.html * https://www.suse.com/security/cve/CVE-2021-3807.html * https://www.suse.com/security/cve/CVE-2021-3918.html * https://www.suse.com/security/cve/CVE-2021-43138.html * https://www.suse.com/security/cve/CVE-2021-43798.html * https://www.suse.com/security/cve/CVE-2021-43815.html * https://www.suse.com/security/cve/CVE-2022-0155.html * https://www.suse.com/security/cve/CVE-2022-41715.html * https://bugzilla.suse.com/show_bug.cgi?id=1192154 * https://bugzilla.suse.com/show_bug.cgi?id=1192696 * https://bugzilla.suse.com/show_bug.cgi?id=1193492 * https://bugzilla.suse.com/show_bug.cgi?id=1193686 * https://bugzilla.suse.com/show_bug.cgi?id=1200480 * https://bugzilla.suse.com/show_bug.cgi?id=1204023 * https://bugzilla.suse.com/show_bug.cgi?id=1218843 * https://bugzilla.suse.com/show_bug.cgi?id=1218844 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:08 -0000 Subject: SUSE-SU-2024:0486-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <170801472870.18974.14658282775552231405@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2024:0486-1 Rating: moderate References: * bsc#1192154 * bsc#1192696 * bsc#1193492 * bsc#1193686 * bsc#1200480 * bsc#1204023 * bsc#1218838 * bsc#1218843 * bsc#1218844 * jsc#MSQA-719 * jsc#PED-7353 Cross-References: * CVE-2020-7753 * CVE-2021-3807 * CVE-2021-3918 * CVE-2021-43138 * CVE-2021-43798 * CVE-2021-43815 * CVE-2022-0155 * CVE-2022-41715 * CVE-2023-40577 CVSS scores: * CVE-2020-7753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3807 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-3918 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-3918 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-43138 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43138 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2021-43798 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43798 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-43815 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-43815 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-0155 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-40577 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-40577 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves nine vulnerabilities and contains two features can now be installed. ## Description: This update fixes the following issues: golang-github-lusitaniae-apache_exporter: * Do not strip if SUSE Linux Enterprise 15 SP3 * Exclude debug for Red Hat Enterprise Linux >= 8 * Build with Go >= 1.20 when the OS is not Red Hat Enterprise Linux golang-github-prometheus-alertmanager: * Create position independent executables (PIE) * Add System/Monitoring group tag * Update to version 0.26.0 (jsc#PED-7353): https://github.com/prometheus/alertmanager/releases/tag/v0.26.0 * CVE-2023-40577: Fix stored XSS via the /api/v1/alerts endpoint in the Alertmanager UI (bsc#1218838) * Configuration: Fix empty list of receivers and inhibit_rules would cause the alertmanager to crash * Templating: Fixed a race condition when using the title function. It is now race-safe * API: Fixed duplicate receiver names in the api/v2/receivers API endpoint * API: Attempting to delete a silence now returns the correct status code, 404 instead of 500 * Clustering: Fixes a panic when tls_client_config is empty * Webhook: url is now marked as a secret. It will no longer show up in the logs as clear-text * Metrics: New label reason for alertmanager_notifications_failed_total metric to indicate the type of error of the alert delivery * Clustering: New flag --cluster.label, to help to block any traffic that is not meant for the cluster * Integrations: Add Microsoft Teams as a supported integration * Update to version 0.25.0: https://github.com/prometheus/alertmanager/releases/tag/v0.25.0 * Fail configuration loading if api_key and api_key_file are defined at the same time * Fix the alertmanager_alerts metric to avoid counting resolved alerts as active. Also added a new alertmanager_marked_alerts metric that retain the old behavior * Trim contents of Slack API URLs when reading from files * amtool: Avoid panic when the label value matcher is empty * Fail configuration loading if api_url is empty for OpsGenie * Fix email template for resolved notifications * Add proxy_url support for OAuth2 in HTTP client configuration * Reload TLS certificate and key from disk when updated * Add Discord integration * Add Webex integration * Add min_version support to select the minimum TLS version in HTTP client configuration * Add max_version support to select the maximum TLS version in * Emit warning logs when truncating messages in notifications * Support HEAD method for the /-/healty and /-/ready endpoints * Add support for reading global and local SMTP passwords from files * UI: Add 'Link' button to alerts in list * UI: Allow to choose the first day of the week as Sunday or Monday * Update to version 0.24.0: https://github.com/prometheus/alertmanager/releases/tag/v0.24.0 * Fix HTTP client configuration for the SNS receiver * Fix unclosed file descriptor after reading the silences snapshot file * Fix field names for mute_time_intervals in JSON marshaling * Ensure that the root route doesn't have any matchers * Truncate the message's title to 1024 chars to avoid hitting Slack limits * Fix the default HTML email template (email.default.html) to match with the canonical source * Detect SNS FIFO topic based on the rendered value * Avoid deleting and recreating a silence when an update is possible * api/v2: Return 200 OK when deleting an expired silence * amtool: Fix the silence's end date when adding a silence. The end date is (start date + duration) while it used to be (current time + duration). The new behavior is consistent with the update operation * Add the /api/v2 prefix to all endpoints in the OpenAPI specification and generated client code * Add --cluster.tls-config experimental flag to secure cluster traffic via mutual TLS * Add Telegram integration mgr-daemon: * Version 4.3.8-1 * Update translation strings prometheus-postgres_exporter: * Remove duplicated call to systemd requirements * Do not build debug if Red Hat Enterprise Linux >= 8 * Do not strip if SUSE Linux Enterprise 15 SP3 * Build at least with with Go >= 1.18 on Red Hat Enterprise Linux * Build with Go >= 1.20 elsewhere spacecmd: * Version 4.3.26-1 * Update translation strings spacewalk-client-tools: * Version 4.3.18-1 * Update translation strings ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-486=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-1.24.2 * golang-github-lusitaniae-apache_exporter-1.0.0-1.21.2 * grafana-9.5.8-1.60.1 * golang-github-prometheus-prometheus-2.45.0-1.50.2 * prometheus-postgres_exporter-0.10.1-1.17.2 * SUSE Manager Client Tools for SLE 12 (noarch) * python2-spacewalk-check-4.3.18-52.95.2 * spacewalk-client-tools-4.3.18-52.95.2 * spacewalk-check-4.3.18-52.95.2 * python2-spacewalk-client-tools-4.3.18-52.95.2 * mgr-daemon-4.3.8-1.44.2 * python2-spacewalk-client-setup-4.3.18-52.95.2 * spacecmd-4.3.26-38.136.2 * spacewalk-client-setup-4.3.18-52.95.2 ## References: * https://www.suse.com/security/cve/CVE-2020-7753.html * https://www.suse.com/security/cve/CVE-2021-3807.html * https://www.suse.com/security/cve/CVE-2021-3918.html * https://www.suse.com/security/cve/CVE-2021-43138.html * https://www.suse.com/security/cve/CVE-2021-43798.html * https://www.suse.com/security/cve/CVE-2021-43815.html * https://www.suse.com/security/cve/CVE-2022-0155.html * https://www.suse.com/security/cve/CVE-2022-41715.html * https://www.suse.com/security/cve/CVE-2023-40577.html * https://bugzilla.suse.com/show_bug.cgi?id=1192154 * https://bugzilla.suse.com/show_bug.cgi?id=1192696 * https://bugzilla.suse.com/show_bug.cgi?id=1193492 * https://bugzilla.suse.com/show_bug.cgi?id=1193686 * https://bugzilla.suse.com/show_bug.cgi?id=1200480 * https://bugzilla.suse.com/show_bug.cgi?id=1204023 * https://bugzilla.suse.com/show_bug.cgi?id=1218838 * https://bugzilla.suse.com/show_bug.cgi?id=1218843 * https://bugzilla.suse.com/show_bug.cgi?id=1218844 * https://jira.suse.com/browse/MSQA-719 * https://jira.suse.com/browse/PED-7353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:18 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:18 -0000 Subject: SUSE-SU-2024:0485-1: important: Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Message-ID: <170801473841.18974.3709649412632562816@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Announcement ID: SUSE-SU-2024:0485-1 Rating: important References: * bsc#1170848 * bsc#1210911 * bsc#1211254 * bsc#1211560 * bsc#1211912 * bsc#1213079 * bsc#1213507 * bsc#1213738 * bsc#1213981 * bsc#1214077 * bsc#1214791 * bsc#1215166 * bsc#1215514 * bsc#1215769 * bsc#1215810 * bsc#1215813 * bsc#1215982 * bsc#1216114 * bsc#1216394 * bsc#1216437 * bsc#1216550 * bsc#1216609 * bsc#1216657 * bsc#1216753 * bsc#1216781 * bsc#1216988 * bsc#1217069 * bsc#1217209 * bsc#1217588 * bsc#1217784 * bsc#1217869 * bsc#1218019 * bsc#1218074 * bsc#1218075 * bsc#1218089 * bsc#1218094 * bsc#1218146 * bsc#1218490 * bsc#1218615 * bsc#1218669 * bsc#1218837 * bsc#1218849 * bsc#1219151 * bsc#1219449 * bsc#1219577 * bsc#1219850 * jsc#MSQA-719 Cross-References: * CVE-2023-31582 * CVE-2023-32189 CVSS scores: * CVE-2023-31582 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-31582 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves two vulnerabilities, contains one feature and has 44 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: mgr-daemon: * Version 4.3.8-1 * Update translation strings patterns-suse-manager: * Add liberate-formula to the required packages for the server to get it installed by default spacecmd: * Version 4.3.26-1 * Update translation strings spacewalk-backend: * Version 4.3.27-1 * Fix issue in "spacewalk-repo-sync" when RPM packages contains files with size greater than 4GB (bsc#1219151) * Version 4.3.26-1 * Fix decompressing and renaming bzip2 comps files in reposync * Update query to the new credentials structure * Remove normalize_orphan_vendor_packages and move it to taskomatic (bsc#1216781) * Skip syncing packages with incorrect metadata (bsc#1213738) * Update translation strings spacewalk-certs-tools: * version 4.3.22-1 * Skip deploying the CA into the Salt directory on proxies (bsc#1219850) * Version 4.3.21-1 * Deploy the CA certificate also into the Salt filesystem (bsc#1219577) * Version 4.3.20-1 * Handle server keys in PKCS8 format in mgr-ssl-cert-setup (bsc#1218615) * Include reboot info beacon in the bootstrap script for transactional systems (bsc#1217588) spacewalk-client-tools: * Version 4.3.18-1 * Update translation strings spacewalk-web: * Version 4.3.37-1 * Fix the use of page size preference in systems and packages lists (bsc#1217209) * Fix issue displaying Ansible playbook name (bsc#1216657) * Add support for `PaygNotCompliantWarning` notification * Bump web.version to 4.3.11 susemanager-build-keys: * Version 15.4.10 * Add new Almalinux 8 GPG Key (bsc#1218849) * Refresh extended Uyuni GPG public key How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: cobbler: * Build the appendline correctly for RHEL-family <= 9 (bsc#1216437) * Notify to "systemd" when cobblerd startup is finished (bsc#1215982) * Enable ppc64(le) buildiso support (bsc#1214077) grafana-formula: * Version 0.10.0 * Replace legacy message queue metrics with Salt queue metrics * Grafana formula should not be supported in a Proxy/Retail inter-server-sync: * Version 0.3.2-1 * Fix conflict in rhndistchannelmap (bsc#1216114) jose4j: * CVE-2023-31582: Insecure Password-Based Encryption Iteration Count (bsc#1216609) liberate-formula: * Version 0.1.0 * Provide liberate-formula, a formula for converting a system to SUSE Liberty Linux patterns-suse-manager: * Add liberate-formula to the required packages for the server to get it installed by default prometheus-formula: * Version 0.8.0 * Fix federation endpoint * Add remote write configuration * Add group filtering for service discovery relabeling configuration * Version 0.7.1 * Fix PrometheusNotIngestingSamples false positive alerts (bsc#1216550) prometheus-postgres_exporter: * Do not build debug if RHEL >= 8 * Do not strip if SUSE Linux Enterprise 15 SP3 * Build at least with with Go >= 1.18 on RHEL * Build with Go >= 1.20 elsewhere saltboot-formula: * Update to version 0.1.1701196218.b6b8ca1 * Remove f-formating to be compatible with python < 3.6 * Update packaging not to package salt directories * Update to version 0.1.1692188980.9aa0455 spacecmd: * Version 4.3.26-1 * Update translation strings spacewalk-backend: * Version 4.3.27-1 * Fix issue in "spacewalk-repo-sync" when RPM packages contains files with size greater than 4GB (bsc#1219151) * Version 4.3.26-1 * Fix decompressing and renaming bzip2 comps files in reposync * Update query to the new credentials structure * Remove normalize_orphan_vendor_packages and move it to taskomatic (bsc#1216781) * Skip syncing packages with incorrect metadata (bsc#1213738) * Update translation strings spacewalk-certs-tools: * version 4.3.22-1 * Skip deploying the CA into the Salt directory on proxies (bsc#1219850) * Version 4.3.21-1 * Deploy the CA certificate also into the Salt filesystem (bsc#1219577) * Version 4.3.20-1 * Handle server keys in PKCS8 format in mgr-ssl-cert-setup (bsc#1218615) * Include reboot info beacon in the bootstrap script for transactional systems (bsc#1217588) spacewalk-client-tools: * Version 4.3.18-1 * Update translation strings spacewalk-java: * Version 4.3.71-1 * Generate server SSH key also when bootstrapping regular Minions (bsc#1219449) * Version 4.3.70-1 * Fix the use of page size preference in systems and packages lists (bsc#1217209) * Fix issue with disabling token check not working (bsc#1218669) * Enforce snakeyaml version requirement (bsc#1215166) * Improve the performance of paginated queries when syncing the reporting database (bsc#1211912, bsc#1213079) * Do not require entitlement for Pay-as-you-go SUSE Linux Enterprise Server for SAP (bsc#1217069) * Use the base product file to show the correct SUSE Manager product in the subscription matching results page * Do not require entitlements if SUSE Manager is Pay-as-you-go * Exclude SUSE Manager from subscription matching if it's Pay-as-you-go * Refactor Credentials to a proper class hierarchy * Fix unit test about duplicated packages * Prevent installation of packages with same name in a single action (bsc#1214791) * When canceling an action which has prerequisites, return hints to get the first action id which can be canceled (bsc#1216988) * Fix exception when removing a Debian package (bsc#1216781) * Fix XSS in taskomatic XML RPC handler (bsc#1210911) * Improve logging for Product Migration (bsc#1218490) * Add only 1 IP for Cloud RMT Host in /etc/hosts * Change org for orphan vendor packages that an admin can delete (bsc#1216781) * Expose the monitoring data for the Salt queue handling the Salt results * Provide total number of CPUs for SUSE Linux Enterprise Micro systems to subscription matcher when it is not used as hypervisor to match vCore subscriptions correctly (bsc#1218074) * Try to download compressed Ubuntu USN database * Add user information to system organization transfer message (bsc#1216753) * CVE-2023-32189: Fix issue with Salt SSH keys for Salt SSH Minions (bsc#1170848) * Add notification in daily email in addition to in SUSE Manager home page when SUSE Manager Pay-as-you-go is not compliant * Fix apidoc link from #top to $call.name (bsc#1213507) * Add config option to disable remote commands from web UI (bsc#1217869) * Address high rating Sonar issues * Refactor SUSE Customer Center registration flow * Avoid blocking Taskomatic thread when waiting for queued action (bsc#1211560) * Fix modify kickstart profile when using "Always newest tree" option (bsc#1215813) * Configure reboot method for SUSE Linux Enterprise Micro when applying bootstrap state (bsc#1213981) * Handle not existing known_host file in permission check * Fix handling of proxy ssh public keys * Include reboot required indication for non-Suse distros spacewalk-setup: * Version 4.3.19-1 * Update query to the new credentials structure * Fix setting SUSE Customer Center password during setup spacewalk-utils: * Version 4.3.19-1 * Add SUSE Linux Enterprise Micro 5.4 and 5.5 to spacewalk-commons-channels spacewalk-web: * Version 4.3.37-1 * Fix the use of page size preference in systems and packages lists (bsc#1217209) * Fix issue displaying Ansible playbook name (bsc#1216657) * Add support for `PaygNotCompliantWarning` notification * Bump web.version to 4.3.11 subscription-matcher: * Version 0.35 * Added missing part number * Version 0.34 * Enabled support for Long Term Service Pack Support subscriptions (bsc#1218075) * Added SUSE Linux Enterprise Micro vCore handling (bsc#1218074) * Added new SKUs and new bundles supportutils-plugin-susemanager: * Version 4.3.10-1 * Update query to the new credentials structure susemanager: * Version 4.3.34-1 * Rename Open Enterprise Server label to OES23.4 (bsc#1215514) * Verify in Yast FQDN with name returned via DNS reverse lookup * CVE-2023-32189: Fix issue with Salt SSH keys for Salt SSH Minions (bsc#1170848) susemanager-build-keys: * Version 15.4.10 * Add new Almalinux 8 GPG Key (bsc#1218849) * Refresh extended Uyuni GPG public key susemanager-docs_en: * Removed obsolete traditional to Salt migration documentation from the System Types section of the Client Configuration Guide and updated the Migrate traditional clients to Salt clients section * Fixed navigation bar of Client Configuration Guide (bsc#1218089) * Added openSUSE Leap to Supported Features navigation list in Client Configuration Guide (bsc#1218094) * Described new monitoring metrics for Salt queue in Administration Guide * Fixed xrefs for internal book references * Removed mentioning that CVE number for CVE auditing is optional (bsc#1218019) * Corrected channel names for CentOS 7 Updates and Extras in CentOS Client Configuration Guide * Documented bootstrap settings for SUSE Linux Enterprise Micro in Client Configuration Guide (bsc#1216394) * Corrected command mgr-push to mgrpush in Administration Guide (bsc#1215810) * Updated Red Hat OVAL data URL and file in CentOS Clients Registration in Client Configution Guide * Added Pay-as-you-go for Azure documentation to the Specialized Guides book * Added Pay-as-you-go limitations chapter to Pay-as-you-go Guide * Removed Ubuntu 18.04 from the list of supported clients * Fixed file location in Custom Salt Formulas section of Salt Guide * Documented using Virtualization Host formula in Client Configuration susemanager-schema: * Version 4.3.24-1 * Refactor susecredentials to support the new hierarchy * Improve performance of System (bsc#1211254) * Change schedule of system-profile-refresh to run on the 2nd Saturday of a month to not collide with normal working times (bsc#1215769) susemanager-sls: * version 4.3.40-1 * Remove automatic reboot from transactional systems bootstrap (bsc#1218146) * Version 4.3.39-1 * Change certs/RHN-ORG-TRUSTED-SSL-CERT from symlink into a real file (bsc#1219577) * Version 4.3.38-1 * Improve Pay-as-you-go instance detection (bsc#1217784) * CVE-2023-32189: Fix issue with Salt SSH keys for Salt SSH Minions (bsc#1170848) * Configure reboot method for SUSE Linux Enterprise Micro when applying bootstrap state (bsc#1213981) * Include reboot required indication for non SUSE distros susemanager-sync-data: * Version 4.3.16-1 * Fix OES 23.4 internal name (bsc#1218837) * Version 4.3.15-1 * Update release status and repository description of Open Enterprise Server 23.4 (bsc#1215514) * Add new SUSE Liberty Linux 7 Long Term Service Pack Support channel families * Rename Red Hat Enterprise Linux and Liberty 8 Base product to remove EOL CentOS 8 from the name uyuni-reportdb-schema: * Version 4.3.9-1 * Provide reportdb upgrade schema path structure How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-485=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-485=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * spacewalk-base-minimal-4.3.37-150400.3.39.7 * mgr-daemon-4.3.8-150400.3.12.5 * susemanager-build-keys-15.4.10-150400.3.23.5 * spacewalk-client-tools-4.3.18-150400.3.24.7 * susemanager-build-keys-web-15.4.10-150400.3.23.5 * spacewalk-check-4.3.18-150400.3.24.7 * python3-spacewalk-check-4.3.18-150400.3.24.7 * python3-spacewalk-client-setup-4.3.18-150400.3.24.7 * spacecmd-4.3.26-150400.3.33.5 * spacewalk-client-setup-4.3.18-150400.3.24.7 * spacewalk-base-minimal-config-4.3.37-150400.3.39.7 * spacewalk-backend-4.3.27-150400.3.38.2 * python3-spacewalk-certs-tools-4.3.22-150400.3.25.1 * spacewalk-certs-tools-4.3.22-150400.3.25.1 * python3-spacewalk-client-tools-4.3.18-150400.3.24.7 * SUSE Manager Proxy 4.3 Module 4.3 (x86_64) * patterns-suma_proxy-4.3-150400.5.9.5 * SUSE Manager Server 4.3 Module 4.3 (noarch) * spacewalk-java-config-4.3.71-150400.3.74.2 * spacewalk-base-minimal-4.3.37-150400.3.39.7 * spacewalk-backend-iss-4.3.27-150400.3.38.2 * spacewalk-backend-tools-4.3.27-150400.3.38.2 * susemanager-build-keys-15.4.10-150400.3.23.5 * susemanager-sls-4.3.40-150400.3.44.1 * susemanager-build-keys-web-15.4.10-150400.3.23.5 * uyuni-config-modules-4.3.40-150400.3.44.1 * spacewalk-backend-applet-4.3.27-150400.3.38.2 * spacewalk-base-minimal-config-4.3.37-150400.3.39.7 * spacewalk-backend-4.3.27-150400.3.38.2 * spacewalk-backend-app-4.3.27-150400.3.38.2 * spacewalk-utils-4.3.19-150400.3.21.5 * susemanager-sync-data-4.3.16-150400.3.22.2 * spacewalk-backend-config-files-4.3.27-150400.3.38.2 * spacewalk-java-lib-4.3.71-150400.3.74.2 * cobbler-3.3.3-150400.5.39.5 * spacewalk-setup-4.3.19-150400.3.30.5 * spacewalk-utils-extras-4.3.19-150400.3.21.5 * spacewalk-backend-config-files-common-4.3.27-150400.3.38.2 * uyuni-reportdb-schema-4.3.9-150400.3.12.7 * spacecmd-4.3.26-150400.3.33.5 * susemanager-docs_en-4.3-150400.9.53.5 * susemanager-schema-4.3.24-150400.3.36.7 * spacewalk-java-4.3.71-150400.3.74.2 * spacewalk-html-4.3.37-150400.3.39.7 * spacewalk-base-4.3.37-150400.3.39.7 * spacewalk-certs-tools-4.3.22-150400.3.25.1 * grafana-formula-0.10.0-150400.3.15.5 * spacewalk-java-postgresql-4.3.71-150400.3.74.2 * supportutils-plugin-susemanager-4.3.10-150400.3.18.5 * spacewalk-backend-config-files-tool-4.3.27-150400.3.38.2 * spacewalk-backend-sql-postgresql-4.3.27-150400.3.38.2 * spacewalk-backend-xml-export-libs-4.3.27-150400.3.38.2 * subscription-matcher-0.35-150400.3.19.5 * spacewalk-backend-iss-export-4.3.27-150400.3.38.2 * jose4j-0.5.1-150400.3.6.2 * python3-spacewalk-certs-tools-4.3.22-150400.3.25.1 * liberate-formula-0.1.0-150400.10.3.3 * python3-spacewalk-client-tools-4.3.18-150400.3.24.7 * spacewalk-backend-xmlrpc-4.3.27-150400.3.38.2 * spacewalk-client-tools-4.3.18-150400.3.24.7 * susemanager-schema-utility-4.3.24-150400.3.36.7 * susemanager-docs_en-pdf-4.3-150400.9.53.5 * spacewalk-backend-sql-4.3.27-150400.3.38.2 * prometheus-formula-0.8.0-150400.3.6.5 * spacewalk-backend-server-4.3.27-150400.3.38.2 * saltboot-formula-0.1.1701196218.b6b8ca1-150400.3.15.3 * spacewalk-backend-package-push-server-4.3.27-150400.3.38.2 * spacewalk-taskomatic-4.3.71-150400.3.74.2 * SUSE Manager Server 4.3 Module 4.3 (ppc64le s390x x86_64) * patterns-suma_retail-4.3-150400.5.9.5 * inter-server-sync-0.3.2-150400.3.27.5 * prometheus-postgres_exporter-0.10.1-150400.3.9.5 * susemanager-4.3.34-150400.3.45.5 * patterns-suma_server-4.3-150400.5.9.5 * inter-server-sync-debuginfo-0.3.2-150400.3.27.5 * susemanager-tools-4.3.34-150400.3.45.5 ## References: * https://www.suse.com/security/cve/CVE-2023-31582.html * https://www.suse.com/security/cve/CVE-2023-32189.html * https://bugzilla.suse.com/show_bug.cgi?id=1170848 * https://bugzilla.suse.com/show_bug.cgi?id=1210911 * https://bugzilla.suse.com/show_bug.cgi?id=1211254 * https://bugzilla.suse.com/show_bug.cgi?id=1211560 * https://bugzilla.suse.com/show_bug.cgi?id=1211912 * https://bugzilla.suse.com/show_bug.cgi?id=1213079 * https://bugzilla.suse.com/show_bug.cgi?id=1213507 * https://bugzilla.suse.com/show_bug.cgi?id=1213738 * https://bugzilla.suse.com/show_bug.cgi?id=1213981 * https://bugzilla.suse.com/show_bug.cgi?id=1214077 * https://bugzilla.suse.com/show_bug.cgi?id=1214791 * https://bugzilla.suse.com/show_bug.cgi?id=1215166 * https://bugzilla.suse.com/show_bug.cgi?id=1215514 * https://bugzilla.suse.com/show_bug.cgi?id=1215769 * https://bugzilla.suse.com/show_bug.cgi?id=1215810 * https://bugzilla.suse.com/show_bug.cgi?id=1215813 * https://bugzilla.suse.com/show_bug.cgi?id=1215982 * https://bugzilla.suse.com/show_bug.cgi?id=1216114 * https://bugzilla.suse.com/show_bug.cgi?id=1216394 * https://bugzilla.suse.com/show_bug.cgi?id=1216437 * https://bugzilla.suse.com/show_bug.cgi?id=1216550 * https://bugzilla.suse.com/show_bug.cgi?id=1216609 * https://bugzilla.suse.com/show_bug.cgi?id=1216657 * https://bugzilla.suse.com/show_bug.cgi?id=1216753 * https://bugzilla.suse.com/show_bug.cgi?id=1216781 * https://bugzilla.suse.com/show_bug.cgi?id=1216988 * https://bugzilla.suse.com/show_bug.cgi?id=1217069 * https://bugzilla.suse.com/show_bug.cgi?id=1217209 * https://bugzilla.suse.com/show_bug.cgi?id=1217588 * https://bugzilla.suse.com/show_bug.cgi?id=1217784 * https://bugzilla.suse.com/show_bug.cgi?id=1217869 * https://bugzilla.suse.com/show_bug.cgi?id=1218019 * https://bugzilla.suse.com/show_bug.cgi?id=1218074 * https://bugzilla.suse.com/show_bug.cgi?id=1218075 * https://bugzilla.suse.com/show_bug.cgi?id=1218089 * https://bugzilla.suse.com/show_bug.cgi?id=1218094 * https://bugzilla.suse.com/show_bug.cgi?id=1218146 * https://bugzilla.suse.com/show_bug.cgi?id=1218490 * https://bugzilla.suse.com/show_bug.cgi?id=1218615 * https://bugzilla.suse.com/show_bug.cgi?id=1218669 * https://bugzilla.suse.com/show_bug.cgi?id=1218837 * https://bugzilla.suse.com/show_bug.cgi?id=1218849 * https://bugzilla.suse.com/show_bug.cgi?id=1219151 * https://bugzilla.suse.com/show_bug.cgi?id=1219449 * https://bugzilla.suse.com/show_bug.cgi?id=1219577 * https://bugzilla.suse.com/show_bug.cgi?id=1219850 * https://jira.suse.com/browse/MSQA-719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:25 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:25 -0000 Subject: SUSE-SU-2024:0483-1: important: Security update for the Linux Kernel Message-ID: <170801474542.18974.9629184707079435275@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:0483-1 Rating: important References: * bsc#1065729 * bsc#1108281 * bsc#1123986 * bsc#1141539 * bsc#1181674 * bsc#1206889 * bsc#1212152 * bsc#1216702 * bsc#1216989 * bsc#1217525 * bsc#1218689 * bsc#1218713 * bsc#1218730 * bsc#1218752 * bsc#1218757 * bsc#1218768 * bsc#1218836 * bsc#1218968 * bsc#1219022 * bsc#1219053 * bsc#1219120 * bsc#1219128 * bsc#1219412 * bsc#1219434 * bsc#1219445 * bsc#1219446 Cross-References: * CVE-2021-33631 * CVE-2023-46838 * CVE-2023-47233 * CVE-2023-51042 * CVE-2023-51043 * CVE-2023-51780 * CVE-2023-51782 * CVE-2023-6040 * CVE-2024-0340 * CVE-2024-0775 * CVE-2024-1086 CVSS scores: * CVE-2021-33631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-46838 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-46838 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47233 ( NVD ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-51042 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51042 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51043 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51782 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-0340 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2024-0340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0775 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-0775 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-1086 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-1086 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 11 vulnerabilities and has 15 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730). * CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836). * CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412). * CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702). * CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120). * CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053). * CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752). * CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757). * CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689). * CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128). The following non-security bugs were fixed: * Store the old kernel changelog entries in kernel-docs package (bsc#1218713) * 9p: missing chunk of "fs/9p: Do not update file type when updating file attributes" (git-fixes). * ACPICA: Avoid cache flush inside virtual machines (git-fixes). * GFS2: Flush the GFS2 delete workqueue before stopping the kernel threads (git-fixes). * KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1219022). * UAPI: ndctl: Fix g++-unsupported initialisation in headers (git-fixes). * USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes). * USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes). * USB: serial: option: add entry for Sierra EM9191 with new firmware (git- fixes). * USB: serial: option: fix FM101R-GL defines (git-fixes). * acpi/nfit: Require opt-in for read-only label configurations (git-fixes). * acpi/nfit: improve bounds checking for 'func' (git-fixes). * affs: fix basic permission bits to actually work (git-fixes). * aio: fix mremap after fork null-deref (git-fixes). * asix: Add check for usbnet_get_endpoints (git-fixes). * bnxt_en: Log unknown link speed appropriately (git-fixes). * ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1219445). * chardev: fix error handling in cdev_device_add() (git-fixes). * configfs: fix a deadlock in configfs_symlink() (git-fixes). * configfs: fix a race in configfs_{,un}register_subsystem() (git-fixes). * configfs: fix a use-after-free in __configfs_open_file (git-fixes). * configfs: fix config_item refcnt leak in configfs_rmdir() (git-fixes). * configfs: fix memleak in configfs_release_bin_file (git-fixes). * configfs: new object reprsenting tree fragments (git-fixes). * configfs: provide exclusion between IO and removals (git-fixes). * configfs: stash the data we need into configfs_buffer at open time (git- fixes). * ext4: Avoid freeing inodes on dirty list (bsc#1216989). * ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889). * fat: add ratelimit to fat*_ent_bread() (git-fixes). * fs/exofs: fix potential memory leak in mount option parsing (git-fixes). * fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (git- fixes). * fs/fat/file.c: issue flush after the writeback of FAT (git-fixes). * fs/file.c: initialize init_files.resize_wait (git-fixes). * fs: do not audit the capability check in simple_xattr_list() (git-fixes). * fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes). * fs: orangefs: fix error return code of orangefs_revalidate_lookup() (git- fixes). * fs: ratelimit __find_get_block_slow() failure message (git-fixes). * fs: warn about impending deprecation of mandatory locks (git-fixes). * gfs2: Allow lock_nolock mount to specify jid=X (git-fixes). * gfs2: Check sb_bsize_shift after reading superblock (git-fixes). * gfs2: Do not call dlm after protocol is unmounted (git-fixes). * gfs2: Do not set GFS2_RDF_UPTODATE when the lvb is updated (git-fixes). * gfs2: Do not skip dlm unlock if glock had an lvb (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * gfs2: Fix lru_count going negative (git-fixes). * gfs2: Fix marking bitmaps non-full (git-fixes). * gfs2: Fix possible data races in gfs2_show_options() (git-fixes). * gfs2: Fix sign extension bug in gfs2_update_stats (git-fixes). * gfs2: Fix use-after-free in gfs2_glock_shrink_scan (git-fixes). * gfs2: Free rd_bits later in gfs2_clear_rgrpd to fix use-after-free (git- fixes). * gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes). * gfs2: Special-case rindex for gfs2_grow (git-fixes). * gfs2: Wake up when sd_glock_disposal becomes zero (git-fixes). * gfs2: add validation checks for size of superblock (git-fixes). * gfs2: assign rgrp glock before compute_bitstructs (git-fixes). * gfs2: check for empty rgrp tree in gfs2_ri_update (git-fixes). * gfs2: check for live vs. read-only file system in gfs2_fitrim (git-fixes). * gfs2: clear buf_in_tr when ending a transaction in sweep_bh_for_rgrps (git- fixes). * gfs2: fix use-after-free on transaction ail lists (git-fixes). * gfs2: ignore negated quota changes (git-fixes). * gfs2: initialize transaction tr_ailX_lists earlier (git-fixes). * gfs2: report "already frozen/thawed" errors (git-fixes). * gfs2: take jdata unstuff into account in do_grow (git-fixes). * gfs2_atomic_open(): fix O_EXCL|O_CREAT handling on cold dcache (git-fixes). * gtp: change NET_UDP_TUNNEL dependency to select (git-fixes). * help_next should increase position index (git-fixes). * iomap: sub-block dio needs to zeroout beyond EOF (git-fixes). * kernfs: Separate kernfs_pr_cont_buf and rename_lock (git-fixes). * kernfs: bring names in comments in line with code (git-fixes). * kernfs: fix use-after-free in __kernfs_remove (git-fixes). * libceph: use kernel_connect() (bsc#1219446). * libnvdimm/btt: Fix LBA masking during 'free list' population (git-fixes). * libnvdimm/btt: Fix a kmemdup failure check (git-fixes). * libnvdimm/btt: Remove unnecessary code in btt_freelist_init (git-fixes). * libnvdimm/btt: fix variable 'rc' set but not used (git-fixes). * libnvdimm/namespace: Fix a potential NULL pointer dereference (git-fixes). * libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes). * libnvdimm/pmem: Delete include of nd-core.h (git-fixes). * libnvdimm/pmem: fix a possible OOB access when read and write pmem (git- fixes). * libnvdimm/region: Fix label activation vs errors (git-fixes). * libnvdimm: Fix compilation warnings with W=1 (git-fixes). * libnvdimm: Out of bounds read in __nd_ioctl() (git-fixes). * libnvdimm: Validate command family indices (git-fixes). * libnvdimm: cover up changes in struct nvdimm_bus_descriptor (git-fixes). * locks: print a warning when mount fails due to lack of "mand" support (git- fixes). * mce: fix set_mce_nospec to always unmap the whole page (git-fixes). * mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases. * mlx4: handle non-napi callers to napi_poll (git-fixes). * mlxsw: spectrum: Avoid -Wformat-truncation warnings (git-fixes). * mlxsw: spectrum: Properly cleanup LAG uppers when removing port from LAG (git-fixes). * mlxsw: spectrum: Set LAG port collector only when active (git-fixes). * mm,mremap: bail out earlier in mremap_to under map pressure (bsc#1123986). * net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git- fixes). * net: (cpts) fix a missing check of clk_prepare (git-fixes). * net: dsa: bcm_sf2: Propagate error value from mdio_write (git-fixes). * net: dsa: mv88e6xxx: Work around mv886e6161 SERDES missing MII_PHYSID2 (git- fixes). * net: dsa: mv88e6xxx: avoid error message on remove from VLAN 0 (git-fixed). * net: dsa: qca8k: Enable delay for RGMII_ID mode (git-fixes). * net: ethernet: ti: fix possible object reference leak (git-fixes). * net: fec: Do not use netdev messages too early (git-fixes). * net: ks8851: Delay requesting IRQ until opened (git-fixes). * net: ks8851: Reassert reset pin if chip ID check fails (git-fixes). * net: ks8851: Set initial carrier state to down (git-fixes). * net: macb: Add null check for PCLK and HCLK (git-fixed). * net: mv643xx_eth: disable clk on error path in mv643xx_eth_shared_probe() (git-fixes). * net: mvneta: fix double free of txq->buf (git-fixes). * net: phy: sfp: warn the user when no tx_disable pin is available (git- fixes). * net: phylink: avoid resolving link state too early (git-fixes). * net: sfp: do not probe SFP module before we're attached (git-fixes). * net: stmmac: Disable EEE mode earlier in XMIT callback (git-fixes). * net: stmmac: Fallback to Platform Data clock in Watchdog conversion (git- fixes). * net: stmmac: do not overwrite discard_frame status (git-fixes). * net: stmmac: dwmac-rk: fix error handling in rk_gmac_powerup() (git-fixes). * net: stmmac: dwmac1000: Clear unused address entries (git-fixed). * net: stmmac: dwmac1000: fix out-of-bounds mac address reg setting (git- fixes). * net: stmmac: dwmac4/5: Clear unused address entries (git-fixes). * net: systemport: Fix reception of BPDUs (git-fixes). * net: xilinx: fix possible object reference leak (git-fixed). * nfsd: drop st_mutex and rp_mutex before calling move_to_close_lru() (bsc#1217525). * nvdimm/btt: do not call del_gendisk() if not needed (git-fixes). * nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes). * nvdimm: Fix badblocks clear off-by-one error (git-fixes). * nvmet-tcp: fix a crash in nvmet_req_complete() (git-fixes). * orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git- fixes). * orangefs: Fix sysfs not cleanup when dev init failed (git-fixes). * orangefs: fix orangefs df output (git-fixes). * orangefs: rate limit the client not running info message (git-fixes). * powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729). * powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes). * powerpc/pseries/memhotplug: Quieten some DLPAR operations (bsc#1065729). * powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729). * powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1065729). * preserve KABI for struct plat_stmmacenet_data (git-fixes). * preserve KABI for struct sfp_socket_ops (git-fixes). * proc: fix /proc/*/map_files lookup (git-fixes). * pstore/ram: Check start of empty przs during init (git-fixes). * pstore/ram: Fix error return code in ramoops_probe() (git-fixes). * pstore/ram: Run without kernel crash dump region (git-fixes). * pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP (git-fixes). * pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git- fixes). * r8169: fix data corruption issue on RTL8402 (git-fixes). * reiserfs: Check the return value from __getblk() (git-fixes). * reiserfs: Replace 1-element array with C99 style flex-array (git-fixes). * s390/dasd: fix double module refcount decrement (bsc#1141539). * scsi: qedf: fc_rport_priv reference counting fixes (bsc#1212152). * scsi: qla0xxx: Fix system crash due to bad pointer access (git-fixes). * sfc: initialise found bitmap in efx_ef10_mtd_probe (git-fixes). * statfs: enforce statfs[64] structure initialization (git-fixes). * tracing/trigger: Fix to return error if failed to alloc snapshot (git- fixes). * usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes). * veth: Fixing transmit return status for dropped packets (git-fixes). * vfs: make freeze_super abort when sync_filesystem returns error (git-fixes). * writeback: Export inode_io_list_del() (bsc#1216989). * x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes). * x86/alternatives: Sync core before enabling interrupts (git-fixes). * x86/asm: Ensure asm/proto.h can be included stand-alone (git-fixes). * x86/bugs: Add "unknown" reporting for MMIO Stale Data (git-fixes). * x86/build: Treat R_386_PLT32 relocation as R_386_PC32 (git-fixes). * x86/build: Turn off -fcf-protection for realmode targets (git-fixes). * x86/cpu/hygon: Fix the CPU topology evaluation for real (git-fixes). * x86/cpu: Add another Alder Lake CPU to the Intel family (git-fixes). * x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes). * x86/kvm/lapic: always disable MMIO interface in x2APIC mode (git-fixes). * x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes). * x86/lib: Fix overflow when counting digits (git-fixes). * x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). * x86/microcode/AMD: Track patch allocation size explicitly (git-fixes). * x86/microcode/intel: Do not retry microcode reloading on the APs (git- fixes). * x86/mm: Add a x86_has_pat_wp() helper (git-fixes). * x86/pat: Fix x86_has_pat_wp() (git-fixes). * x86/pat: Pass valid address to sanitize_phys() (git-fixes). * x86/pm: Add enumeration check before spec MSRs save/restore setup (git- fixes). * x86/pm: Fix false positive kmemleak report in msr_build_context() (git- fixes). * x86/purgatory: Do not generate debug info for purgatory.ro (git-fixes). * x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes). * x86/topology: Fix duplicated core ID within a package (git-fixes). * x86/topology: Fix multiple packages shown on a single-package system (git- fixes). * x86/unwind/orc: Fix unreliable stack dump with gcov (git-fixes). * x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git- fixes). * x86: Clear .brk area at early boot (git-fixes). * x86: Fix __get_wchan() for !STACKTRACE (git-fixes). * x86: Fix get_wchan() to support the ORC unwinder (git-fixes). * x86: Mark stop_this_cpu() __noreturn (git-fixes). * x86: Pin task-stack in __get_wchan() (git-fixes). * x86: **always_inline** {rd,wr}msr() (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-483=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-483=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-483=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.168.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * kernel-azure-debuginfo-4.12.14-16.168.1 * kernel-azure-base-debuginfo-4.12.14-16.168.1 * kernel-syms-azure-4.12.14-16.168.1 * kernel-azure-base-4.12.14-16.168.1 * kernel-azure-debugsource-4.12.14-16.168.1 * kernel-azure-devel-4.12.14-16.168.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.168.1 * kernel-devel-azure-4.12.14-16.168.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.168.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * kernel-azure-debuginfo-4.12.14-16.168.1 * kernel-azure-base-debuginfo-4.12.14-16.168.1 * kernel-syms-azure-4.12.14-16.168.1 * kernel-azure-base-4.12.14-16.168.1 * kernel-azure-debugsource-4.12.14-16.168.1 * kernel-azure-devel-4.12.14-16.168.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.168.1 * kernel-devel-azure-4.12.14-16.168.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc x86_64) * kernel-azure-4.12.14-16.168.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * kernel-azure-debuginfo-4.12.14-16.168.1 * kernel-azure-base-debuginfo-4.12.14-16.168.1 * kernel-syms-azure-4.12.14-16.168.1 * kernel-azure-base-4.12.14-16.168.1 * kernel-azure-debugsource-4.12.14-16.168.1 * kernel-azure-devel-4.12.14-16.168.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * kernel-source-azure-4.12.14-16.168.1 * kernel-devel-azure-4.12.14-16.168.1 ## References: * https://www.suse.com/security/cve/CVE-2021-33631.html * https://www.suse.com/security/cve/CVE-2023-46838.html * https://www.suse.com/security/cve/CVE-2023-47233.html * https://www.suse.com/security/cve/CVE-2023-51042.html * https://www.suse.com/security/cve/CVE-2023-51043.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://www.suse.com/security/cve/CVE-2023-51782.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2024-0340.html * https://www.suse.com/security/cve/CVE-2024-0775.html * https://www.suse.com/security/cve/CVE-2024-1086.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1108281 * https://bugzilla.suse.com/show_bug.cgi?id=1123986 * https://bugzilla.suse.com/show_bug.cgi?id=1141539 * https://bugzilla.suse.com/show_bug.cgi?id=1181674 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1212152 * https://bugzilla.suse.com/show_bug.cgi?id=1216702 * https://bugzilla.suse.com/show_bug.cgi?id=1216989 * https://bugzilla.suse.com/show_bug.cgi?id=1217525 * https://bugzilla.suse.com/show_bug.cgi?id=1218689 * https://bugzilla.suse.com/show_bug.cgi?id=1218713 * https://bugzilla.suse.com/show_bug.cgi?id=1218730 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1218757 * https://bugzilla.suse.com/show_bug.cgi?id=1218768 * https://bugzilla.suse.com/show_bug.cgi?id=1218836 * https://bugzilla.suse.com/show_bug.cgi?id=1218968 * https://bugzilla.suse.com/show_bug.cgi?id=1219022 * https://bugzilla.suse.com/show_bug.cgi?id=1219053 * https://bugzilla.suse.com/show_bug.cgi?id=1219120 * https://bugzilla.suse.com/show_bug.cgi?id=1219128 * https://bugzilla.suse.com/show_bug.cgi?id=1219412 * https://bugzilla.suse.com/show_bug.cgi?id=1219434 * https://bugzilla.suse.com/show_bug.cgi?id=1219445 * https://bugzilla.suse.com/show_bug.cgi?id=1219446 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:27 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:27 -0000 Subject: SUSE-SU-2024:0479-1: important: Security update for java-1_8_0-openj9 Message-ID: <170801474779.18974.18267894161453811019@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2024:0479-1 Rating: important References: * bsc#1217214 * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2023-5676 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-5676 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-5676 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine * Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214 * CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903), CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906), CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-479=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-479=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5676.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1217214 * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:32:27 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:32:27 -0000 Subject: SUSE-RU-2024:0481-1: moderate: Recommended update for sle-module-suse-manager-server-release Message-ID: <170801474718.18974.2805690899239084807@smelt2.prg2.suse.org> # Recommended update for sle-module-suse-manager-server-release Announcement ID: SUSE-RU-2024:0481-1 Rating: moderate References: * jsc#MSC-737 Affected Products: * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that contains one feature can now be installed. ## Description: This update for sle-module-suse-manager-server-release provides the following fix: * Adjust the EOL date for the product. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-481=1 ## Package List: * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * sle-module-suse-manager-server-release-4.3-150400.10.4.1 ## References: * https://jira.suse.com/browse/MSC-737 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:35:29 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:35:29 -0000 Subject: SUSE-SU-2024:0479-1: important: Security update for java-1_8_0-openj9 Message-ID: <170801492950.19896.6271248151627687947@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2024:0479-1 Rating: important References: * bsc#1217214 * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2023-5676 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-5676 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-5676 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine * Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214 * CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903), CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906), CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-479=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-479=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5676.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1217214 * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:38:31 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:38:31 -0000 Subject: SUSE-SU-2024:0479-1: important: Security update for java-1_8_0-openj9 Message-ID: <170801511145.19797.17825909374015674980@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2024:0479-1 Rating: important References: * bsc#1217214 * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2023-5676 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-5676 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-5676 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine * Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214 * CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903), CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906), CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-479=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-479=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5676.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1217214 * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 16:41:33 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 16:41:33 -0000 Subject: SUSE-SU-2024:0479-1: important: Security update for java-1_8_0-openj9 Message-ID: <170801529375.19797.18347632613287415226@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2024:0479-1 Rating: important References: * bsc#1217214 * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2023-5676 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-5676 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-5676 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine * Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214 * CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903), CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906), CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-479=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-479=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5676.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1217214 * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0520-1: important: Security update for postgresql15 Message-ID: <170802900302.3808.949300813117176711@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2024:0520-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql15 fixes the following issues: Upgrade to 15.6: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-520=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-520=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-520=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-520=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql15-server-devel-debuginfo-15.6-3.22.1 * postgresql15-devel-debuginfo-15.6-3.22.1 * postgresql15-server-devel-15.6-3.22.1 * postgresql15-devel-15.6-3.22.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * postgresql15-pltcl-15.6-3.22.1 * postgresql15-plpython-debuginfo-15.6-3.22.1 * postgresql15-plpython-15.6-3.22.1 * postgresql15-contrib-debuginfo-15.6-3.22.1 * postgresql15-contrib-15.6-3.22.1 * postgresql15-plperl-15.6-3.22.1 * postgresql15-server-15.6-3.22.1 * postgresql15-debugsource-15.6-3.22.1 * postgresql15-plperl-debuginfo-15.6-3.22.1 * postgresql15-debuginfo-15.6-3.22.1 * postgresql15-pltcl-debuginfo-15.6-3.22.1 * postgresql15-server-debuginfo-15.6-3.22.1 * postgresql15-15.6-3.22.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql15-docs-15.6-3.22.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql15-pltcl-15.6-3.22.1 * postgresql15-plpython-debuginfo-15.6-3.22.1 * postgresql15-plpython-15.6-3.22.1 * postgresql15-contrib-debuginfo-15.6-3.22.1 * postgresql15-contrib-15.6-3.22.1 * postgresql15-plperl-15.6-3.22.1 * postgresql15-server-15.6-3.22.1 * postgresql15-debugsource-15.6-3.22.1 * postgresql15-plperl-debuginfo-15.6-3.22.1 * postgresql15-debuginfo-15.6-3.22.1 * postgresql15-pltcl-debuginfo-15.6-3.22.1 * postgresql15-server-debuginfo-15.6-3.22.1 * postgresql15-15.6-3.22.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql15-docs-15.6-3.22.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * postgresql15-pltcl-15.6-3.22.1 * postgresql15-plpython-debuginfo-15.6-3.22.1 * postgresql15-plpython-15.6-3.22.1 * postgresql15-contrib-debuginfo-15.6-3.22.1 * postgresql15-contrib-15.6-3.22.1 * postgresql15-plperl-15.6-3.22.1 * postgresql15-server-15.6-3.22.1 * postgresql15-debugsource-15.6-3.22.1 * postgresql15-plperl-debuginfo-15.6-3.22.1 * postgresql15-debuginfo-15.6-3.22.1 * postgresql15-pltcl-debuginfo-15.6-3.22.1 * postgresql15-server-debuginfo-15.6-3.22.1 * postgresql15-15.6-3.22.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql15-docs-15.6-3.22.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 20:30:05 -0000 Subject: SUSE-SU-2024:0519-1: important: Security update for webkit2gtk3 Message-ID: <170802900598.3808.6465880402133441652@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0519-1 Rating: important References: * bsc#1219113 * bsc#1219604 Cross-References: * CVE-2014-1745 * CVE-2023-40414 * CVE-2023-42833 * CVE-2024-23206 * CVE-2024-23213 * CVE-2024-23222 CVSS scores: * CVE-2023-40414 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40414 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42833 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42833 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23206 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23206 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23213 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.42.5 (bsc#1219604): * CVE-2024-23222: Fixed processing maliciously crafted web content that may have led to arbitrary code execution (bsc#1219113). * CVE-2024-23206: Fixed fingerprint user via maliciously crafted webpages (bsc#1219604). * CVE-2024-23213: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). * CVE-2023-40414: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). * CVE-2014-1745: Fixed denial-of-service or potentially disclose memory contents while processing maliciously crafted files (bsc#1219604). * CVE-2023-42833: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-519=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-519=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-519=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-519=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-519=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-519=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-519=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libwebkit2gtk-4_0-37-2.42.5-150200.104.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150200.104.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150200.104.1 * webkit2gtk3-debugsource-2.42.5-150200.104.1 * webkit2gtk3-devel-2.42.5-150200.104.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150200.104.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-2.42.5-150200.104.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150200.104.1 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.42.5-150200.104.1 ## References: * https://www.suse.com/security/cve/CVE-2014-1745.html * https://www.suse.com/security/cve/CVE-2023-40414.html * https://www.suse.com/security/cve/CVE-2023-42833.html * https://www.suse.com/security/cve/CVE-2024-23206.html * https://www.suse.com/security/cve/CVE-2024-23213.html * https://www.suse.com/security/cve/CVE-2024-23222.html * https://bugzilla.suse.com/show_bug.cgi?id=1219113 * https://bugzilla.suse.com/show_bug.cgi?id=1219604 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 20:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 20:30:08 -0000 Subject: SUSE-SU-2024:0518-1: moderate: Security update for openssl-3 Message-ID: <170802900818.3808.18367945444952743809@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2024:0518-1 Rating: moderate References: * bsc#1218690 * bsc#1218810 * bsc#1219243 Cross-References: * CVE-2023-6129 * CVE-2023-6237 * CVE-2024-0727 CVSS scores: * CVE-2023-6129 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2023-6129 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-6237 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0727 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-0727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2023-6129: Fixed vector register clobbering on PowerPC. (bsc#1218690) * CVE-2023-6237: Fixed excessive time spent checking invalid RSA public keys. (bsc#1218810) * CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-518=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-518=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-518=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-518=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-518=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-518=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-518=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-518=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-518=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-518=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-518=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-518=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-518=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-518=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-518=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Manager Proxy 4.3 (x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * openSUSE Leap 15.4 (x86_64) * libopenssl-3-devel-32bit-3.0.8-150400.4.49.1 * libopenssl3-32bit-3.0.8-150400.4.49.1 * libopenssl3-32bit-debuginfo-3.0.8-150400.4.49.1 * openSUSE Leap 15.4 (noarch) * openssl-3-doc-3.0.8-150400.4.49.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libopenssl3-64bit-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-64bit-3.0.8-150400.4.49.1 * libopenssl3-64bit-3.0.8-150400.4.49.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssl-3-debugsource-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssl-3-debuginfo-3.0.8-150400.4.49.1 * libopenssl-3-devel-3.0.8-150400.4.49.1 * libopenssl3-debuginfo-3.0.8-150400.4.49.1 * openssl-3-debugsource-3.0.8-150400.4.49.1 * openssl-3-3.0.8-150400.4.49.1 * libopenssl3-3.0.8-150400.4.49.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6129.html * https://www.suse.com/security/cve/CVE-2023-6237.html * https://www.suse.com/security/cve/CVE-2024-0727.html * https://bugzilla.suse.com/show_bug.cgi?id=1218690 * https://bugzilla.suse.com/show_bug.cgi?id=1218810 * https://bugzilla.suse.com/show_bug.cgi?id=1219243 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 20:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 20:30:11 -0000 Subject: SUSE-SU-2024:0517-1: moderate: Security update for libaom Message-ID: <170802901151.3808.1909321013743983963@smelt2.prg2.suse.org> # Security update for libaom Announcement ID: SUSE-SU-2024:0517-1 Rating: moderate References: * bsc#1218429 Cross-References: * CVE-2023-6879 CVSS scores: * CVE-2023-6879 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libaom fixes the following issues: * CVE-2023-6879: Fixed a heap buffer overflow when increasing the video frame resolution (bsc#1218429). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Real Time 15 SP4 zypper in -t patch SUSE-SLE-Product-RT-15-SP4-2024-517=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-517=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-517=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-517=1 ## Package List: * SUSE Linux Enterprise Real Time 15 SP4 (x86_64) * libaom3-3.2.0-150400.3.3.1 * libaom-debugsource-3.2.0-150400.3.3.1 * libaom3-debuginfo-3.2.0-150400.3.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libaom-debugsource-3.2.0-150400.3.3.1 * aom-tools-3.2.0-150400.3.3.1 * libaom3-debuginfo-3.2.0-150400.3.3.1 * aom-tools-debuginfo-3.2.0-150400.3.3.1 * libaom3-3.2.0-150400.3.3.1 * libaom-devel-3.2.0-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * libaom-devel-doc-3.2.0-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libaom3-32bit-3.2.0-150400.3.3.1 * libaom3-32bit-debuginfo-3.2.0-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libaom3-64bit-debuginfo-3.2.0-150400.3.3.1 * libaom3-64bit-3.2.0-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libaom-debugsource-3.2.0-150400.3.3.1 * aom-tools-3.2.0-150400.3.3.1 * libaom3-debuginfo-3.2.0-150400.3.3.1 * aom-tools-debuginfo-3.2.0-150400.3.3.1 * libaom3-3.2.0-150400.3.3.1 * libaom-devel-3.2.0-150400.3.3.1 * openSUSE Leap 15.5 (noarch) * libaom-devel-doc-3.2.0-150400.3.3.1 * openSUSE Leap 15.5 (x86_64) * libaom3-32bit-3.2.0-150400.3.3.1 * libaom3-32bit-debuginfo-3.2.0-150400.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libaom3-3.2.0-150400.3.3.1 * libaom-debugsource-3.2.0-150400.3.3.1 * libaom3-debuginfo-3.2.0-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6879.html * https://bugzilla.suse.com/show_bug.cgi?id=1218429 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 15 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Feb 2024 20:30:12 -0000 Subject: SUSE-SU-2024:0479-1: important: Security update for java-1_8_0-openj9 Message-ID: <170802901268.3808.15134452959173923331@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2024:0479-1 Rating: important References: * bsc#1217214 * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218909 * bsc#1218911 Cross-References: * CVE-2023-5676 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-5676 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-5676 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine * Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214 * CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903), CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906), CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-479=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-479=1 ## Package List: * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-debugsource-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-headless-debuginfo-1.8.0.402-150200.3.42.1 * java-1_8_0-openj9-debuginfo-1.8.0.402-150200.3.42.1 * openSUSE Leap 15.5 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5676.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1217214 * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 16 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Feb 2024 12:30:02 -0000 Subject: SUSE-RU-2024:0521-1: important: Recommended update for libsolv Message-ID: <170808660246.9245.16184174290847434624@smelt2.prg2.suse.org> # Recommended update for libsolv Announcement ID: SUSE-RU-2024:0521-1 Rating: important References: * bsc#1215698 * bsc#1218782 * bsc#1218831 * bsc#1219442 * jsc#PED-6218 Affected Products: * SUSE CaaS Platform 4.0 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 ESPOS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 An update that contains one feature and has four fixes can now be installed. ## Description: This update for libsolv, libzypp fixes the following issues: * build for multiple python versions [jsc#PED-6218] * applydeltaprm: Create target directory if it does not exist (bsc#1219442) * Fix problems with EINTR in ExternalDataSource::getline (bsc#1215698) * CheckAccessDeleted: fix running_in_container detection (bsc#1218782) * Detect CURLOPT_REDIR_PROTOCOLS_STR availability at runtime (bsc#1218831) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP1 zypper in -t patch SUSE-SLE-INSTALLER-15-SP1-2024-521=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 ESPOS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2024-521=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2024-521=1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2024-521=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2024-521=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2024-521=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * SUSE Linux Enterprise Server 15 SP1 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.31-150100.3.128.2 * libsolv-tools-0.7.28-150100.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 ESPOS 15-SP1 (aarch64 x86_64) * libzypp-17.31.31-150100.3.128.2 * libzypp-debuginfo-17.31.31-150100.3.128.2 * libsolv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-devel-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-debuginfo-0.7.28-150100.4.16.1 * libsolv-debugsource-0.7.28-150100.4.16.1 * libsolv-devel-0.7.28-150100.4.16.1 * libzypp-debugsource-17.31.31-150100.3.128.2 * perl-solv-0.7.28-150100.4.16.1 * ruby-solv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-0.7.28-150100.4.16.1 * perl-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-0.7.28-150100.4.16.1 * libzypp-devel-17.31.31-150100.3.128.2 * ruby-solv-0.7.28-150100.4.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libzypp-17.31.31-150100.3.128.2 * libzypp-debuginfo-17.31.31-150100.3.128.2 * libsolv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-devel-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-debuginfo-0.7.28-150100.4.16.1 * libsolv-debugsource-0.7.28-150100.4.16.1 * libsolv-devel-0.7.28-150100.4.16.1 * libzypp-debugsource-17.31.31-150100.3.128.2 * perl-solv-0.7.28-150100.4.16.1 * ruby-solv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-0.7.28-150100.4.16.1 * perl-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-0.7.28-150100.4.16.1 * libzypp-devel-17.31.31-150100.3.128.2 * ruby-solv-0.7.28-150100.4.16.1 * SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1 (x86_64) * libzypp-17.31.31-150100.3.128.2 * libzypp-debuginfo-17.31.31-150100.3.128.2 * libsolv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-devel-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-debuginfo-0.7.28-150100.4.16.1 * libsolv-debugsource-0.7.28-150100.4.16.1 * libsolv-devel-0.7.28-150100.4.16.1 * libzypp-debugsource-17.31.31-150100.3.128.2 * perl-solv-0.7.28-150100.4.16.1 * ruby-solv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-0.7.28-150100.4.16.1 * perl-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-0.7.28-150100.4.16.1 * libzypp-devel-17.31.31-150100.3.128.2 * ruby-solv-0.7.28-150100.4.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libzypp-17.31.31-150100.3.128.2 * libzypp-debuginfo-17.31.31-150100.3.128.2 * libsolv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-devel-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-debuginfo-0.7.28-150100.4.16.1 * libsolv-debugsource-0.7.28-150100.4.16.1 * libsolv-devel-0.7.28-150100.4.16.1 * libzypp-debugsource-17.31.31-150100.3.128.2 * perl-solv-0.7.28-150100.4.16.1 * ruby-solv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-0.7.28-150100.4.16.1 * perl-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-0.7.28-150100.4.16.1 * libzypp-devel-17.31.31-150100.3.128.2 * ruby-solv-0.7.28-150100.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libzypp-17.31.31-150100.3.128.2 * libzypp-debuginfo-17.31.31-150100.3.128.2 * libsolv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-devel-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-debuginfo-0.7.28-150100.4.16.1 * libsolv-debugsource-0.7.28-150100.4.16.1 * libsolv-devel-0.7.28-150100.4.16.1 * libzypp-debugsource-17.31.31-150100.3.128.2 * perl-solv-0.7.28-150100.4.16.1 * ruby-solv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-0.7.28-150100.4.16.1 * perl-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-0.7.28-150100.4.16.1 * libzypp-devel-17.31.31-150100.3.128.2 * ruby-solv-0.7.28-150100.4.16.1 * SUSE CaaS Platform 4.0 (x86_64) * libzypp-17.31.31-150100.3.128.2 * libzypp-debuginfo-17.31.31-150100.3.128.2 * libsolv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-devel-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-debuginfo-0.7.28-150100.4.16.1 * libsolv-debugsource-0.7.28-150100.4.16.1 * libsolv-devel-0.7.28-150100.4.16.1 * libzypp-debugsource-17.31.31-150100.3.128.2 * perl-solv-0.7.28-150100.4.16.1 * ruby-solv-debuginfo-0.7.28-150100.4.16.1 * python3-solv-0.7.28-150100.4.16.1 * perl-solv-debuginfo-0.7.28-150100.4.16.1 * libsolv-tools-0.7.28-150100.4.16.1 * libzypp-devel-17.31.31-150100.3.128.2 * ruby-solv-0.7.28-150100.4.16.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215698 * https://bugzilla.suse.com/show_bug.cgi?id=1218782 * https://bugzilla.suse.com/show_bug.cgi?id=1218831 * https://bugzilla.suse.com/show_bug.cgi?id=1219442 * https://jira.suse.com/browse/PED-6218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 16 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0523-1: important: Security update for postgresql12 Message-ID: <170810100217.2347.12624567768374802384@smelt2.prg2.suse.org> # Security update for postgresql12 Announcement ID: SUSE-SU-2024:0523-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql12 fixes the following issues: Upgrade to 12.18: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-523=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-523=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-523=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-523=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-523=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-523=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql12-test-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-llvmjit-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-llvmjit-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-llvmjit-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * openSUSE Leap 15.5 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql12-docs-12.18-150200.8.57.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 16 16:33:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Feb 2024 16:33:03 -0000 Subject: SUSE-SU-2024:0523-1: important: Security update for postgresql12 Message-ID: <170810118376.1481.17614711124176473099@smelt2.prg2.suse.org> # Security update for postgresql12 Announcement ID: SUSE-SU-2024:0523-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql12 fixes the following issues: Upgrade to 12.18: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-523=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-523=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-523=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-523=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-523=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-523=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql12-test-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-llvmjit-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-llvmjit-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-llvmjit-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * openSUSE Leap 15.5 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql12-docs-12.18-150200.8.57.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 16 16:36:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Feb 2024 16:36:05 -0000 Subject: SUSE-SU-2024:0523-1: important: Security update for postgresql12 Message-ID: <170810136587.2775.17048003931816202841@smelt2.prg2.suse.org> # Security update for postgresql12 Announcement ID: SUSE-SU-2024:0523-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql12 fixes the following issues: Upgrade to 12.18: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-523=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-523=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-523=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-523=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-523=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-523=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-523=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-llvmjit-12.18-150200.8.57.1 * postgresql12-llvmjit-devel-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-test-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-llvmjit-debuginfo-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * openSUSE Leap 15.5 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql12-docs-12.18-150200.8.57.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql12-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-12.18-150200.8.57.1 * postgresql12-debugsource-12.18-150200.8.57.1 * postgresql12-contrib-debuginfo-12.18-150200.8.57.1 * postgresql12-plpython-12.18-150200.8.57.1 * postgresql12-server-12.18-150200.8.57.1 * postgresql12-plperl-12.18-150200.8.57.1 * postgresql12-server-devel-12.18-150200.8.57.1 * postgresql12-plpython-debuginfo-12.18-150200.8.57.1 * postgresql12-server-debuginfo-12.18-150200.8.57.1 * postgresql12-server-devel-debuginfo-12.18-150200.8.57.1 * postgresql12-devel-12.18-150200.8.57.1 * postgresql12-pltcl-debuginfo-12.18-150200.8.57.1 * postgresql12-debuginfo-12.18-150200.8.57.1 * postgresql12-pltcl-12.18-150200.8.57.1 * postgresql12-contrib-12.18-150200.8.57.1 * postgresql12-plperl-debuginfo-12.18-150200.8.57.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql12-docs-12.18-150200.8.57.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 16 16:36:08 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Feb 2024 16:36:08 -0000 Subject: SUSE-SU-2024:0522-1: important: Security update for postgresql13 Message-ID: <170810136873.2775.5471484569095952510@smelt2.prg2.suse.org> # Security update for postgresql13 Announcement ID: SUSE-SU-2024:0522-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Galera for Ericsson 15 SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql13 fixes the following issues: Upgrade to 13.14: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-522=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-522=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-522=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-522=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-522=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-522=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-522=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-522=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-522=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-522=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-522=1 * Galera for Ericsson 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-ERICSSON-2024-522=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-522=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-llvmjit-devel-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-llvmjit-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-llvmjit-debuginfo-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-llvmjit-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-llvmjit-debuginfo-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-llvmjit-devel-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-test-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * openSUSE Leap 15.5 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-llvmjit-devel-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-llvmjit-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-llvmjit-debuginfo-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-llvmjit-devel-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-llvmjit-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-llvmjit-debuginfo-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-llvmjit-devel-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-llvmjit-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-llvmjit-debuginfo-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * Galera for Ericsson 15 SP5 (x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * Galera for Ericsson 15 SP5 (noarch) * postgresql13-docs-13.14-150200.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql13-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-server-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-debuginfo-13.14-150200.5.53.1 * postgresql13-13.14-150200.5.53.1 * postgresql13-contrib-debuginfo-13.14-150200.5.53.1 * postgresql13-debuginfo-13.14-150200.5.53.1 * postgresql13-plperl-13.14-150200.5.53.1 * postgresql13-contrib-13.14-150200.5.53.1 * postgresql13-devel-13.14-150200.5.53.1 * postgresql13-pltcl-13.14-150200.5.53.1 * postgresql13-plperl-debuginfo-13.14-150200.5.53.1 * postgresql13-server-devel-13.14-150200.5.53.1 * postgresql13-plpython-debuginfo-13.14-150200.5.53.1 * postgresql13-pltcl-debuginfo-13.14-150200.5.53.1 * postgresql13-debugsource-13.14-150200.5.53.1 * postgresql13-server-13.14-150200.5.53.1 * postgresql13-plpython-13.14-150200.5.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql13-docs-13.14-150200.5.53.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 08:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 08:30:01 -0000 Subject: SUSE-SU-2024:0526-1: important: Security update for openvswitch Message-ID: <170833140176.27951.11898113526068666000@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0526-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-526=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-526=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-526=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * openvswitch-devel-2.13.2-150200.9.31.1 * openvswitch-pki-2.13.2-150200.9.31.1 * libopenvswitch-2_13-0-debuginfo-2.13.2-150200.9.31.1 * openvswitch-ipsec-2.13.2-150200.9.31.1 * ovn-central-20.03.1-150200.9.31.1 * ovn-devel-20.03.1-150200.9.31.1 * openvswitch-vtep-2.13.2-150200.9.31.1 * ovn-docker-20.03.1-150200.9.31.1 * python3-ovs-2.13.2-150200.9.31.1 * openvswitch-test-2.13.2-150200.9.31.1 * openvswitch-debuginfo-2.13.2-150200.9.31.1 * libovn-20_03-0-debuginfo-20.03.1-150200.9.31.1 * ovn-host-20.03.1-150200.9.31.1 * libovn-20_03-0-20.03.1-150200.9.31.1 * openvswitch-vtep-debuginfo-2.13.2-150200.9.31.1 * openvswitch-2.13.2-150200.9.31.1 * openvswitch-test-debuginfo-2.13.2-150200.9.31.1 * openvswitch-debugsource-2.13.2-150200.9.31.1 * libopenvswitch-2_13-0-2.13.2-150200.9.31.1 * ovn-vtep-20.03.1-150200.9.31.1 * ovn-20.03.1-150200.9.31.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * openvswitch-devel-2.13.2-150200.9.31.1 * openvswitch-pki-2.13.2-150200.9.31.1 * libopenvswitch-2_13-0-debuginfo-2.13.2-150200.9.31.1 * openvswitch-ipsec-2.13.2-150200.9.31.1 * ovn-central-20.03.1-150200.9.31.1 * ovn-devel-20.03.1-150200.9.31.1 * openvswitch-vtep-2.13.2-150200.9.31.1 * ovn-docker-20.03.1-150200.9.31.1 * python3-ovs-2.13.2-150200.9.31.1 * openvswitch-test-2.13.2-150200.9.31.1 * openvswitch-debuginfo-2.13.2-150200.9.31.1 * libovn-20_03-0-debuginfo-20.03.1-150200.9.31.1 * ovn-host-20.03.1-150200.9.31.1 * libovn-20_03-0-20.03.1-150200.9.31.1 * openvswitch-vtep-debuginfo-2.13.2-150200.9.31.1 * openvswitch-2.13.2-150200.9.31.1 * openvswitch-test-debuginfo-2.13.2-150200.9.31.1 * openvswitch-debugsource-2.13.2-150200.9.31.1 * libopenvswitch-2_13-0-2.13.2-150200.9.31.1 * ovn-vtep-20.03.1-150200.9.31.1 * ovn-20.03.1-150200.9.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * openvswitch-devel-2.13.2-150200.9.31.1 * openvswitch-pki-2.13.2-150200.9.31.1 * libopenvswitch-2_13-0-debuginfo-2.13.2-150200.9.31.1 * openvswitch-ipsec-2.13.2-150200.9.31.1 * ovn-central-20.03.1-150200.9.31.1 * ovn-devel-20.03.1-150200.9.31.1 * openvswitch-vtep-2.13.2-150200.9.31.1 * ovn-docker-20.03.1-150200.9.31.1 * python3-ovs-2.13.2-150200.9.31.1 * openvswitch-test-2.13.2-150200.9.31.1 * openvswitch-debuginfo-2.13.2-150200.9.31.1 * libovn-20_03-0-debuginfo-20.03.1-150200.9.31.1 * ovn-host-20.03.1-150200.9.31.1 * libovn-20_03-0-20.03.1-150200.9.31.1 * openvswitch-vtep-debuginfo-2.13.2-150200.9.31.1 * openvswitch-2.13.2-150200.9.31.1 * openvswitch-test-debuginfo-2.13.2-150200.9.31.1 * openvswitch-debugsource-2.13.2-150200.9.31.1 * libopenvswitch-2_13-0-2.13.2-150200.9.31.1 * ovn-vtep-20.03.1-150200.9.31.1 * ovn-20.03.1-150200.9.31.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 08:30:09 -0000 Subject: SUSE-SU-2024:0525-1: important: Security update for libssh Message-ID: <170833140922.27951.14218385397988231663@smelt2.prg2.suse.org> # Security update for libssh Announcement ID: SUSE-SU-2024:0525-1 Rating: important References: * bsc#1158095 * bsc#1168699 * bsc#1174713 * bsc#1189608 * bsc#1211188 * bsc#1211190 * bsc#1218126 * bsc#1218186 * bsc#1218209 * jsc#PED-7719 Cross-References: * CVE-2019-14889 * CVE-2020-16135 * CVE-2020-1730 * CVE-2021-3634 * CVE-2023-1667 * CVE-2023-2283 * CVE-2023-48795 * CVE-2023-6004 * CVE-2023-6918 CVSS scores: * CVE-2019-14889 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2019-14889 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2019-14889 ( NVD ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2020-16135 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-16135 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-1730 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2020-1730 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-3634 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2021-3634 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1667 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-1667 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2283 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-2283 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-6004 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6004 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6918 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-6918 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves nine vulnerabilities and contains one feature can now be installed. ## Description: This update for libssh fixes the following issues: Update to version 0.9.8 (jsc#PED-7719): * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes Update to version 0.9.7: * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code Update to version 0.9.6 (bsc#1189608, CVE-2021-3634): * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6 Update to 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite Update to version 0.9.4 * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security- release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699) Update to version 0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer Update to version 0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197) Update to version 0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166) * Split out configuration to separate package to not mess up the library packaging and coinstallation Update to verion 0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures * Add libssh client and server config files ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-525=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-525=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-525=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-525=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-525=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-525=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-525=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-525=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-525=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-525=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libssh-devel-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Enterprise Storage 7.1 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150200.13.3.1 * libssh4-32bit-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libssh4-debuginfo-0.9.8-150200.13.3.1 * libssh-config-0.9.8-150200.13.3.1 * libssh4-0.9.8-150200.13.3.1 * libssh-debugsource-0.9.8-150200.13.3.1 ## References: * https://www.suse.com/security/cve/CVE-2019-14889.html * https://www.suse.com/security/cve/CVE-2020-16135.html * https://www.suse.com/security/cve/CVE-2020-1730.html * https://www.suse.com/security/cve/CVE-2021-3634.html * https://www.suse.com/security/cve/CVE-2023-1667.html * https://www.suse.com/security/cve/CVE-2023-2283.html * https://www.suse.com/security/cve/CVE-2023-48795.html * https://www.suse.com/security/cve/CVE-2023-6004.html * https://www.suse.com/security/cve/CVE-2023-6918.html * https://bugzilla.suse.com/show_bug.cgi?id=1158095 * https://bugzilla.suse.com/show_bug.cgi?id=1168699 * https://bugzilla.suse.com/show_bug.cgi?id=1174713 * https://bugzilla.suse.com/show_bug.cgi?id=1189608 * https://bugzilla.suse.com/show_bug.cgi?id=1211188 * https://bugzilla.suse.com/show_bug.cgi?id=1211190 * https://bugzilla.suse.com/show_bug.cgi?id=1218126 * https://bugzilla.suse.com/show_bug.cgi?id=1218186 * https://bugzilla.suse.com/show_bug.cgi?id=1218209 * https://jira.suse.com/browse/PED-7719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 08:39:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 08:39:15 -0000 Subject: SUSE-SU-2024:0524-1: important: Security update for openvswitch Message-ID: <170833195590.31332.10079182660941483586@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0524-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * openSUSE Leap 15.3 (noarch) * ovn-doc-20.06.2-150300.19.17.1 * openvswitch-doc-2.14.2-150300.19.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 11:22:51 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 11:22:51 -0000 Subject: SUSE-RU-2023:4063-1: moderate: Recommended update for glibc Message-ID: <170834177104.1077.3981525733517011972@smelt2.prg2.suse.org> # Recommended update for glibc Announcement ID: SUSE-RU-2023:4063-1 Rating: moderate References: * bsc#1215286 * bsc#1215504 * jsc#PED-4908 Cross-References: * CVE-2023-4813 CVSS scores: * CVE-2023-4813 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4813 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability, contains one feature and has one fix can now be installed. ## Description: This update of glibc fixes the following issues: Security issue fixed: * CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931) Other issues fixed: * S390: Fix relocation of _nl_current_LC_CATETORY_used in static build (bsc#1215504, BZ #19860) * added GB18030-2022 charmap (jsc#PED-4908, BZ #30243) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-4063=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-4063=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-4063=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-4063=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * glibc-debugsource-2.22-114.31.1 * glibc-debuginfo-2.22-114.31.1 * glibc-devel-static-2.22-114.31.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * glibc-info-2.22-114.31.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * glibc-profile-2.22-114.31.1 * glibc-locale-debuginfo-2.22-114.31.1 * nscd-debuginfo-2.22-114.31.1 * glibc-2.22-114.31.1 * glibc-devel-debuginfo-2.22-114.31.1 * glibc-debuginfo-2.22-114.31.1 * glibc-devel-2.22-114.31.1 * nscd-2.22-114.31.1 * glibc-debugsource-2.22-114.31.1 * glibc-locale-2.22-114.31.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * glibc-i18ndata-2.22-114.31.1 * glibc-info-2.22-114.31.1 * glibc-html-2.22-114.31.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * glibc-locale-32bit-2.22-114.31.1 * glibc-profile-32bit-2.22-114.31.1 * glibc-debuginfo-32bit-2.22-114.31.1 * glibc-locale-debuginfo-32bit-2.22-114.31.1 * glibc-devel-32bit-2.22-114.31.1 * glibc-devel-debuginfo-32bit-2.22-114.31.1 * glibc-32bit-2.22-114.31.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * glibc-profile-2.22-114.31.1 * glibc-locale-debuginfo-2.22-114.31.1 * nscd-debuginfo-2.22-114.31.1 * glibc-2.22-114.31.1 * glibc-devel-debuginfo-2.22-114.31.1 * glibc-debuginfo-2.22-114.31.1 * glibc-devel-2.22-114.31.1 * nscd-2.22-114.31.1 * glibc-debugsource-2.22-114.31.1 * glibc-locale-2.22-114.31.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * glibc-i18ndata-2.22-114.31.1 * glibc-info-2.22-114.31.1 * glibc-html-2.22-114.31.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * glibc-locale-32bit-2.22-114.31.1 * glibc-profile-32bit-2.22-114.31.1 * glibc-debuginfo-32bit-2.22-114.31.1 * glibc-locale-debuginfo-32bit-2.22-114.31.1 * glibc-devel-32bit-2.22-114.31.1 * glibc-devel-debuginfo-32bit-2.22-114.31.1 * glibc-32bit-2.22-114.31.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * glibc-profile-2.22-114.31.1 * glibc-locale-debuginfo-2.22-114.31.1 * nscd-debuginfo-2.22-114.31.1 * glibc-2.22-114.31.1 * glibc-devel-debuginfo-2.22-114.31.1 * glibc-debuginfo-2.22-114.31.1 * glibc-devel-2.22-114.31.1 * nscd-2.22-114.31.1 * glibc-debugsource-2.22-114.31.1 * glibc-locale-2.22-114.31.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * glibc-i18ndata-2.22-114.31.1 * glibc-info-2.22-114.31.1 * glibc-html-2.22-114.31.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * glibc-locale-32bit-2.22-114.31.1 * glibc-profile-32bit-2.22-114.31.1 * glibc-debuginfo-32bit-2.22-114.31.1 * glibc-locale-debuginfo-32bit-2.22-114.31.1 * glibc-devel-32bit-2.22-114.31.1 * glibc-devel-debuginfo-32bit-2.22-114.31.1 * glibc-32bit-2.22-114.31.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4813.html * https://bugzilla.suse.com/show_bug.cgi?id=1215286 * https://bugzilla.suse.com/show_bug.cgi?id=1215504 * https://jira.suse.com/browse/PED-4908 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 11:23:28 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 11:23:28 -0000 Subject: SUSE-SU-2023:2881-1: important: Security update for perl Message-ID: <170834180833.1129.900022813153911767@smelt2.prg2.suse.org> # Security update for perl Announcement ID: SUSE-SU-2023:2881-1 Rating: important References: * bsc#1210999 Cross-References: * CVE-2023-31484 CVSS scores: * CVE-2023-31484 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2023-31484 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE OpenStack Cloud 9 * SUSE OpenStack Cloud Crowbar 9 An update that solves one vulnerability can now be installed. ## Description: This update for perl fixes the following issues: * CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 zypper in -t patch SUSE-SLE-SERVER-12-SP4-ESPOS-2023-2881=1 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2023-2881=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2881=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2881=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2881=1 * SUSE OpenStack Cloud 9 zypper in -t patch SUSE-OpenStack-Cloud-9-2023-2881=1 * SUSE OpenStack Cloud Crowbar 9 zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2023-2881=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 zypper in -t patch SUSE-SLE-SAP-12-SP4-2023-2881=1 * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2023-2881=1 ## Package List: * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (aarch64 x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (x86_64) * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (aarch64 ppc64le s390x x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (s390x x86_64) * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * SUSE OpenStack Cloud 9 (x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE OpenStack Cloud 9 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE OpenStack Cloud Crowbar 9 (x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE OpenStack Cloud Crowbar 9 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 (noarch) * perl-doc-5.18.2-12.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 (x86_64) * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (x86_64) * perl-debugsource-5.18.2-12.26.1 * perl-5.18.2-12.26.1 * perl-32bit-5.18.2-12.26.1 * perl-debuginfo-32bit-5.18.2-12.26.1 * perl-base-5.18.2-12.26.1 * perl-debuginfo-5.18.2-12.26.1 * perl-base-debuginfo-5.18.2-12.26.1 * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (noarch) * perl-doc-5.18.2-12.26.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31484.html * https://bugzilla.suse.com/show_bug.cgi?id=1210999 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0529-1: important: Security update for dpdk Message-ID: <170834580318.7677.6191351428682681408@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0529-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-529=1 SUSE-2024-529=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-529=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * dpdk-debuginfo-19.11.10-150500.5.3.1 * dpdk-tools-debuginfo-19.11.10-150500.5.3.1 * dpdk-devel-debuginfo-19.11.10-150500.5.3.1 * dpdk-examples-19.11.10-150500.5.3.1 * dpdk-kmp-default-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-examples-debuginfo-19.11.10-150500.5.3.1 * libdpdk-20_0-19.11.10-150500.5.3.1 * dpdk-debugsource-19.11.10-150500.5.3.1 * dpdk-tools-19.11.10-150500.5.3.1 * dpdk-19.11.10-150500.5.3.1 * dpdk-devel-19.11.10-150500.5.3.1 * libdpdk-20_0-debuginfo-19.11.10-150500.5.3.1 * openSUSE Leap 15.5 (noarch) * dpdk-doc-19.11.10-150500.5.3.1 * dpdk-thunderx-doc-19.11.10-150500.5.3.1 * openSUSE Leap 15.5 (aarch64) * dpdk-thunderx-19.11.10-150500.5.3.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-thunderx-devel-19.11.10-150500.5.3.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150500.5.3.1 * dpdk-thunderx-debuginfo-19.11.10-150500.5.3.1 * dpdk-thunderx-examples-debuginfo-19.11.10-150500.5.3.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-thunderx-tools-19.11.10-150500.5.3.1 * dpdk-thunderx-debugsource-19.11.10-150500.5.3.1 * dpdk-thunderx-tools-debuginfo-19.11.10-150500.5.3.1 * dpdk-thunderx-examples-19.11.10-150500.5.3.1 * Legacy Module 15-SP5 (aarch64 ppc64le x86_64) * dpdk-debuginfo-19.11.10-150500.5.3.1 * dpdk-tools-debuginfo-19.11.10-150500.5.3.1 * dpdk-devel-debuginfo-19.11.10-150500.5.3.1 * dpdk-kmp-default-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * libdpdk-20_0-19.11.10-150500.5.3.1 * dpdk-debugsource-19.11.10-150500.5.3.1 * dpdk-tools-19.11.10-150500.5.3.1 * dpdk-19.11.10-150500.5.3.1 * dpdk-devel-19.11.10-150500.5.3.1 * libdpdk-20_0-debuginfo-19.11.10-150500.5.3.1 * Legacy Module 15-SP5 (aarch64) * dpdk-thunderx-19.11.10-150500.5.3.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-thunderx-devel-19.11.10-150500.5.3.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150500.5.3.1 * dpdk-thunderx-debuginfo-19.11.10-150500.5.3.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 * dpdk-thunderx-debugsource-19.11.10-150500.5.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 12:30:05 -0000 Subject: SUSE-RU-2024:0527-1: moderate: Recommended update for conmon Message-ID: <170834580524.7677.7743265195274863062@smelt2.prg2.suse.org> # Recommended update for conmon Announcement ID: SUSE-RU-2024:0527-1 Rating: moderate References: * bsc#1215806 * bsc#1217773 Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for conmon fixes the following issues: * New upstream release 2.1.10 Bug fixes: * Fix incorrect free in conn_sock * logging: Respect log-size-max immediately after open * New upstream release 2.1.9 Bug fixes: * fix some issues flagged by SAST scan * src: fix write after end of buffer * src: open all files with O_CLOEXEC * oom-score: restore oom score before running exit command Features: * Forward more messages on the sd-notify socket * logging: -l passthrough accepts TTYs * [bsc#1215806] Update to version 2.1.8: * stdio: ignore EIO for terminals (bsc#1217773) * ensure console socket buffers are properly sized * conmon: drop return after pexit() * ctrl: make accept4 failures fatal * logging: avoid opening /dev/null for each write * oom: restore old OOM score * Use default umask 0022 * cli: log parsing errors to stderr * Changes to build conmon for riscv64 * Changes to build conmon for ppc64le * Fix close_other_fds on FreeBSD ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-527=1 openSUSE-SLE-15.5-2024-527=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-527=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-527=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * conmon-2.1.10-150500.9.9.1 * conmon-debuginfo-2.1.10-150500.9.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * conmon-2.1.10-150500.9.9.1 * conmon-debuginfo-2.1.10-150500.9.9.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * conmon-2.1.10-150500.9.9.1 * conmon-debuginfo-2.1.10-150500.9.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215806 * https://bugzilla.suse.com/show_bug.cgi?id=1217773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 12:30:05 -0000 Subject: SUSE-SU-2024:0524-1: important: Security update for openvswitch Message-ID: <170834580589.7677.16441186020383079078@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0524-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * openSUSE Leap 15.3 (noarch) * openvswitch-doc-2.14.2-150300.19.17.1 * ovn-doc-20.06.2-150300.19.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 12:33:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 12:33:07 -0000 Subject: SUSE-SU-2024:0524-1: important: Security update for openvswitch Message-ID: <170834598739.7677.15179961505670453064@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0524-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * openSUSE Leap 15.3 (noarch) * openvswitch-doc-2.14.2-150300.19.17.1 * ovn-doc-20.06.2-150300.19.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 12:36:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 12:36:08 -0000 Subject: SUSE-SU-2024:0524-1: important: Security update for openvswitch Message-ID: <170834616889.7677.7210029893641308245@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0524-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * openSUSE Leap 15.3 (noarch) * openvswitch-doc-2.14.2-150300.19.17.1 * ovn-doc-20.06.2-150300.19.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 12:39:11 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 12:39:11 -0000 Subject: SUSE-SU-2024:0524-1: important: Security update for openvswitch Message-ID: <170834635159.2665.12947488008440528548@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0524-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * openSUSE Leap 15.3 (noarch) * openvswitch-doc-2.14.2-150300.19.17.1 * ovn-doc-20.06.2-150300.19.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * openvswitch-2.14.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0531-1: important: Security update for dpdk Message-ID: <170836020553.8476.12650449789004001668@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0531-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-531=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-531=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-531=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-531=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-531=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le x86_64) * dpdk-devel-19.11.4-150300.21.1 * dpdk-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-tools-debuginfo-19.11.4-150300.21.1 * dpdk-debugsource-19.11.4-150300.21.1 * dpdk-debuginfo-19.11.4-150300.21.1 * libdpdk-20_0-19.11.4-150300.21.1 * dpdk-devel-debuginfo-19.11.4-150300.21.1 * dpdk-tools-19.11.4-150300.21.1 * dpdk-examples-debuginfo-19.11.4-150300.21.1 * dpdk-examples-19.11.4-150300.21.1 * dpdk-19.11.4-150300.21.1 * libdpdk-20_0-debuginfo-19.11.4-150300.21.1 * openSUSE Leap 15.3 (noarch) * dpdk-doc-19.11.4-150300.21.1 * dpdk-thunderx-doc-19.11.4-150300.21.1 * openSUSE Leap 15.3 (aarch64 x86_64) * dpdk-kmp-preempt-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * openSUSE Leap 15.3 (aarch64) * dpdk-thunderx-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-devel-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-thunderx-debugsource-19.11.4-150300.21.1 * dpdk-thunderx-kmp-preempt-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-thunderx-19.11.4-150300.21.1 * dpdk-thunderx-examples-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-devel-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-tools-19.11.4-150300.21.1 * dpdk-thunderx-kmp-preempt-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-thunderx-examples-19.11.4-150300.21.1 * dpdk-thunderx-tools-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * dpdk-devel-19.11.4-150300.21.1 * dpdk-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-tools-debuginfo-19.11.4-150300.21.1 * dpdk-debugsource-19.11.4-150300.21.1 * dpdk-debuginfo-19.11.4-150300.21.1 * libdpdk-20_0-19.11.4-150300.21.1 * dpdk-devel-debuginfo-19.11.4-150300.21.1 * dpdk-tools-19.11.4-150300.21.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-19.11.4-150300.21.1 * libdpdk-20_0-debuginfo-19.11.4-150300.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * dpdk-thunderx-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-devel-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-thunderx-debugsource-19.11.4-150300.21.1 * dpdk-thunderx-19.11.4-150300.21.1 * dpdk-thunderx-devel-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le x86_64) * dpdk-devel-19.11.4-150300.21.1 * dpdk-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-tools-debuginfo-19.11.4-150300.21.1 * dpdk-debugsource-19.11.4-150300.21.1 * dpdk-debuginfo-19.11.4-150300.21.1 * libdpdk-20_0-19.11.4-150300.21.1 * dpdk-devel-debuginfo-19.11.4-150300.21.1 * dpdk-tools-19.11.4-150300.21.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-19.11.4-150300.21.1 * libdpdk-20_0-debuginfo-19.11.4-150300.21.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * dpdk-thunderx-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-devel-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-thunderx-debugsource-19.11.4-150300.21.1 * dpdk-thunderx-19.11.4-150300.21.1 * dpdk-thunderx-devel-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * dpdk-devel-19.11.4-150300.21.1 * dpdk-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-tools-debuginfo-19.11.4-150300.21.1 * dpdk-debugsource-19.11.4-150300.21.1 * dpdk-debuginfo-19.11.4-150300.21.1 * libdpdk-20_0-19.11.4-150300.21.1 * dpdk-devel-debuginfo-19.11.4-150300.21.1 * dpdk-tools-19.11.4-150300.21.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-19.11.4-150300.21.1 * libdpdk-20_0-debuginfo-19.11.4-150300.21.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * dpdk-devel-19.11.4-150300.21.1 * dpdk-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-tools-debuginfo-19.11.4-150300.21.1 * dpdk-debugsource-19.11.4-150300.21.1 * dpdk-debuginfo-19.11.4-150300.21.1 * libdpdk-20_0-19.11.4-150300.21.1 * dpdk-devel-debuginfo-19.11.4-150300.21.1 * dpdk-tools-19.11.4-150300.21.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-19.11.4-150300.21.1 * libdpdk-20_0-debuginfo-19.11.4-150300.21.1 * SUSE Enterprise Storage 7.1 (aarch64) * dpdk-thunderx-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-devel-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150300.59.147-150300.21.1 * dpdk-thunderx-debugsource-19.11.4-150300.21.1 * dpdk-thunderx-19.11.4-150300.21.1 * dpdk-thunderx-devel-debuginfo-19.11.4-150300.21.1 * dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150300.59.147-150300.21.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 16:30:07 -0000 Subject: SUSE-SU-2024:0530-1: important: Security update for dpdk Message-ID: <170836020786.8476.573406492745202885@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0530-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-530=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-530=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-530=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libdpdk-20_0-19.11.4-150200.3.25.1 * dpdk-19.11.4-150200.3.25.1 * dpdk-debuginfo-19.11.4-150200.3.25.1 * dpdk-kmp-default-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-devel-debuginfo-19.11.4-150200.3.25.1 * dpdk-tools-debuginfo-19.11.4-150200.3.25.1 * dpdk-devel-19.11.4-150200.3.25.1 * dpdk-tools-19.11.4-150200.3.25.1 * dpdk-debugsource-19.11.4-150200.3.25.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * libdpdk-20_0-debuginfo-19.11.4-150200.3.25.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64) * dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-thunderx-devel-19.11.4-150200.3.25.1 * dpdk-thunderx-19.11.4-150200.3.25.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-thunderx-debugsource-19.11.4-150200.3.25.1 * dpdk-thunderx-debuginfo-19.11.4-150200.3.25.1 * dpdk-thunderx-devel-debuginfo-19.11.4-150200.3.25.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le x86_64) * libdpdk-20_0-19.11.4-150200.3.25.1 * dpdk-19.11.4-150200.3.25.1 * dpdk-debuginfo-19.11.4-150200.3.25.1 * dpdk-kmp-default-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-devel-debuginfo-19.11.4-150200.3.25.1 * dpdk-tools-debuginfo-19.11.4-150200.3.25.1 * dpdk-devel-19.11.4-150200.3.25.1 * dpdk-tools-19.11.4-150200.3.25.1 * dpdk-debugsource-19.11.4-150200.3.25.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * libdpdk-20_0-debuginfo-19.11.4-150200.3.25.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64) * dpdk-thunderx-kmp-default-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-thunderx-devel-19.11.4-150200.3.25.1 * dpdk-thunderx-19.11.4-150200.3.25.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-thunderx-debugsource-19.11.4-150200.3.25.1 * dpdk-thunderx-debuginfo-19.11.4-150200.3.25.1 * dpdk-thunderx-devel-debuginfo-19.11.4-150200.3.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libdpdk-20_0-19.11.4-150200.3.25.1 * dpdk-19.11.4-150200.3.25.1 * dpdk-debuginfo-19.11.4-150200.3.25.1 * dpdk-kmp-default-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * dpdk-devel-debuginfo-19.11.4-150200.3.25.1 * dpdk-tools-debuginfo-19.11.4-150200.3.25.1 * dpdk-devel-19.11.4-150200.3.25.1 * dpdk-tools-19.11.4-150200.3.25.1 * dpdk-debugsource-19.11.4-150200.3.25.1 * dpdk-kmp-default-debuginfo-19.11.4_k5.3.18_150200.24.175-150200.3.25.1 * libdpdk-20_0-debuginfo-19.11.4-150200.3.25.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 19 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Feb 2024 16:30:08 -0000 Subject: SUSE-SU-2024:0524-1: important: Security update for openvswitch Message-ID: <170836020870.8476.11591461132889948882@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0524-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-524=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * openSUSE Leap 15.3 (noarch) * ovn-doc-20.06.2-150300.19.17.1 * openvswitch-doc-2.14.2-150300.19.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * openvswitch-2.14.2-150300.19.17.1 * ovn-host-debuginfo-20.06.2-150300.19.17.1 * openvswitch-test-debuginfo-2.14.2-150300.19.17.1 * openvswitch-devel-2.14.2-150300.19.17.1 * python3-ovs-2.14.2-150300.19.17.1 * openvswitch-test-2.14.2-150300.19.17.1 * ovn-central-20.06.2-150300.19.17.1 * ovn-vtep-20.06.2-150300.19.17.1 * openvswitch-ipsec-2.14.2-150300.19.17.1 * openvswitch-vtep-debuginfo-2.14.2-150300.19.17.1 * openvswitch-pki-2.14.2-150300.19.17.1 * libovn-20_06-0-20.06.2-150300.19.17.1 * ovn-host-20.06.2-150300.19.17.1 * libovn-20_06-0-debuginfo-20.06.2-150300.19.17.1 * ovn-central-debuginfo-20.06.2-150300.19.17.1 * libopenvswitch-2_14-0-2.14.2-150300.19.17.1 * openvswitch-vtep-2.14.2-150300.19.17.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150300.19.17.1 * ovn-docker-20.06.2-150300.19.17.1 * ovn-20.06.2-150300.19.17.1 * ovn-debuginfo-20.06.2-150300.19.17.1 * openvswitch-debuginfo-2.14.2-150300.19.17.1 * ovn-devel-20.06.2-150300.19.17.1 * openvswitch-debugsource-2.14.2-150300.19.17.1 * ovn-vtep-debuginfo-20.06.2-150300.19.17.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0535-1: moderate: Recommended update for supportutils-plugin-suse-public-cloud Message-ID: <170841780304.12644.13162297111873156558@smelt2.prg2.suse.org> # Recommended update for supportutils-plugin-suse-public-cloud Announcement ID: SUSE-RU-2024:0535-1 Rating: moderate References: * bsc#1218762 * bsc#1218763 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for supportutils-plugin-suse-public-cloud fixes the following issues: * Update to version 1.0.9 (bsc#1218762, bsc#1218763) * Remove duplicate data collection for the plugin itself * Collect archive metering data when available * Query billing flavor status ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-535=1 ## Package List: * Public Cloud Module 12 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-6.22.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218762 * https://bugzilla.suse.com/show_bug.cgi?id=1218763 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 08:30:04 -0000 Subject: SUSE-RU-2024:0534-1: moderate: Recommended update for supportutils-plugin-suse-public-cloud Message-ID: <170841780437.12644.11727605668947737906@smelt2.prg2.suse.org> # Recommended update for supportutils-plugin-suse-public-cloud Announcement ID: SUSE-RU-2024:0534-1 Rating: moderate References: * bsc#1218762 * bsc#1218763 Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for supportutils-plugin-suse-public-cloud fixes the following issues: * Update to version 1.0.9 (bsc#1218762, bsc#1218763) * Remove duplicate data collection for the plugin itself * Collect archive metering data when available * Query billing flavor status ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-534=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-534=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-534=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-534=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-534=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-534=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-534=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2024-534=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-534=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-534=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-534=1 ## Package List: * Public Cloud Module 15-SP5 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * openSUSE Leap 15.5 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * Public Cloud Module 15-SP1 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * Public Cloud Module 15-SP2 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * Public Cloud Module 15-SP3 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 * Public Cloud Module 15-SP4 (noarch) * supportutils-plugin-suse-public-cloud-1.0.9-150000.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218762 * https://bugzilla.suse.com/show_bug.cgi?id=1218763 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 08:30:05 -0000 Subject: SUSE-RU-2024:0533-1: moderate: Recommended update for SUMA PAYG Message-ID: <170841780581.12644.7553959361242233401@smelt2.prg2.suse.org> # Recommended update for SUMA PAYG Announcement ID: SUSE-RU-2024:0533-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for suma-azure-adapter-config-llc, suma-azure-adapter-config-ltd fixes the following issues: suma-azure-adapter-config-llc was updated to version 20240112: * Version 20240112: * Added archive feature options suma-azure-adapter-config-ltd was updated to version 20240112: * Version 20240112: * Add archive feature options ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-533=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-533=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-533=1 ## Package List: * openSUSE Leap 15.4 (noarch) * suma-azure-adapter-config-ltd-20240112-150400.9.6.1 * suma-azure-adapter-config-llc-20240112-150400.9.9.1 * Public Cloud Module 15-SP4 (noarch) * suma-azure-adapter-config-ltd-20240112-150400.9.6.1 * suma-azure-adapter-config-llc-20240112-150400.9.9.1 * Public Cloud Module 15-SP5 (noarch) * suma-azure-adapter-config-ltd-20240112-150400.9.6.1 * suma-azure-adapter-config-llc-20240112-150400.9.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 08:30:07 -0000 Subject: SUSE-RU-2024:0532-1: moderate: Recommended update for SUMA PAYG Message-ID: <170841780703.12644.8921656989399373871@smelt2.prg2.suse.org> # Recommended update for SUMA PAYG Announcement ID: SUSE-RU-2024:0532-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for suma-amazon-adapter-config-llc, suma-amazon-adapter-config-ltd fixes the following issues: suma-amazon-adapter-config-llc was updated to version 20240112: * Version 20240112: * Added archive feature options suma-amazon-adapter-config-ltd was updated to version 20240112: * Version 20240112: * Add archive feature options * Version 20231103: * Update license to BSD-2-Clause ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-532=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-532=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-532=1 ## Package List: * openSUSE Leap 15.4 (noarch) * suma-amazon-adapter-config-llc-20240112-150400.9.6.1 * suma-amazon-adapter-config-ltd-20240112-150400.9.9.1 * Public Cloud Module 15-SP4 (noarch) * suma-amazon-adapter-config-llc-20240112-150400.9.6.1 * suma-amazon-adapter-config-ltd-20240112-150400.9.9.1 * Public Cloud Module 15-SP5 (noarch) * suma-amazon-adapter-config-llc-20240112-150400.9.6.1 * suma-amazon-adapter-config-ltd-20240112-150400.9.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 12:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 12:30:01 -0000 Subject: SUSE-RU-2024:0536-1: moderate: Recommended update for fence-agents Message-ID: <170843220134.26234.5651480308067081653@smelt2.prg2.suse.org> # Recommended update for fence-agents Announcement ID: SUSE-RU-2024:0536-1 Rating: moderate References: * jsc#PED-7701 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for fence-agents fixes the following issue: * Update fence-agents package with fence_aws and fence_ibm_powervs (jsc#PED-7701) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-536=1 openSUSE-SLE-15.5-2024-536=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-536=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * fence-agents-devel-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-amt_ws-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-debugsource-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-debuginfo-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * fence-agents-debugsource-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-debuginfo-4.12.1+git.1677142927.bf55c675-150500.4.3.1 * fence-agents-devel-4.12.1+git.1677142927.bf55c675-150500.4.3.1 ## References: * https://jira.suse.com/browse/PED-7701 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0546-1: important: Security update for postgresql16 Message-ID: <170844660253.14508.12963031357182334638@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2024:0546-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgrade to 16.2: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-546=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-546=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-546=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-546=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql16-server-devel-debuginfo-16.2-3.10.1 * postgresql16-devel-16.2-3.10.1 * postgresql16-devel-debuginfo-16.2-3.10.1 * postgresql16-server-devel-16.2-3.10.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libecpg6-16.2-3.10.1 * postgresql16-16.2-3.10.1 * libecpg6-debuginfo-16.2-3.10.1 * postgresql16-debugsource-16.2-3.10.1 * postgresql16-plpython-debuginfo-16.2-3.10.1 * postgresql16-plpython-16.2-3.10.1 * libpq5-debuginfo-16.2-3.10.1 * postgresql16-plperl-16.2-3.10.1 * postgresql16-server-16.2-3.10.1 * postgresql16-contrib-debuginfo-16.2-3.10.1 * postgresql16-contrib-16.2-3.10.1 * postgresql16-pltcl-debuginfo-16.2-3.10.1 * postgresql16-server-debuginfo-16.2-3.10.1 * libpq5-16.2-3.10.1 * postgresql16-debuginfo-16.2-3.10.1 * postgresql16-pltcl-16.2-3.10.1 * postgresql16-plperl-debuginfo-16.2-3.10.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql16-docs-16.2-3.10.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libecpg6-debuginfo-32bit-16.2-3.10.1 * libpq5-32bit-16.2-3.10.1 * libpq5-debuginfo-32bit-16.2-3.10.1 * libecpg6-32bit-16.2-3.10.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libecpg6-16.2-3.10.1 * postgresql16-16.2-3.10.1 * libecpg6-debuginfo-16.2-3.10.1 * postgresql16-debugsource-16.2-3.10.1 * postgresql16-plpython-debuginfo-16.2-3.10.1 * postgresql16-plpython-16.2-3.10.1 * libpq5-debuginfo-16.2-3.10.1 * postgresql16-plperl-16.2-3.10.1 * postgresql16-server-16.2-3.10.1 * postgresql16-contrib-debuginfo-16.2-3.10.1 * postgresql16-contrib-16.2-3.10.1 * postgresql16-pltcl-debuginfo-16.2-3.10.1 * postgresql16-server-debuginfo-16.2-3.10.1 * libpq5-16.2-3.10.1 * postgresql16-debuginfo-16.2-3.10.1 * postgresql16-pltcl-16.2-3.10.1 * postgresql16-plperl-debuginfo-16.2-3.10.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql16-docs-16.2-3.10.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libecpg6-debuginfo-32bit-16.2-3.10.1 * libpq5-32bit-16.2-3.10.1 * libpq5-debuginfo-32bit-16.2-3.10.1 * libecpg6-32bit-16.2-3.10.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libecpg6-16.2-3.10.1 * postgresql16-16.2-3.10.1 * libecpg6-debuginfo-16.2-3.10.1 * postgresql16-debugsource-16.2-3.10.1 * postgresql16-plpython-debuginfo-16.2-3.10.1 * postgresql16-plpython-16.2-3.10.1 * libpq5-debuginfo-16.2-3.10.1 * postgresql16-plperl-16.2-3.10.1 * postgresql16-server-16.2-3.10.1 * postgresql16-contrib-debuginfo-16.2-3.10.1 * postgresql16-contrib-16.2-3.10.1 * postgresql16-pltcl-debuginfo-16.2-3.10.1 * postgresql16-server-debuginfo-16.2-3.10.1 * libpq5-16.2-3.10.1 * postgresql16-debuginfo-16.2-3.10.1 * postgresql16-pltcl-16.2-3.10.1 * postgresql16-plperl-debuginfo-16.2-3.10.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql16-docs-16.2-3.10.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libecpg6-debuginfo-32bit-16.2-3.10.1 * libpq5-32bit-16.2-3.10.1 * libpq5-debuginfo-32bit-16.2-3.10.1 * libecpg6-32bit-16.2-3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 16:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 16:30:04 -0000 Subject: SUSE-SU-2024:0545-1: important: Security update for webkit2gtk3 Message-ID: <170844660455.14508.16275411120882556059@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0545-1 Rating: important References: * bsc#1219113 * bsc#1219604 Cross-References: * CVE-2014-1745 * CVE-2023-40414 * CVE-2023-42833 * CVE-2024-23206 * CVE-2024-23213 * CVE-2024-23222 CVSS scores: * CVE-2023-40414 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40414 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42833 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42833 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23206 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23206 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23213 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.42.5 (bsc#1219604): * CVE-2024-23222: Fixed processing maliciously crafted web content that may have led to arbitrary code execution (bsc#1219113). * CVE-2024-23206: Fixed fingerprint user via maliciously crafted webpages (bsc#1219604). * CVE-2024-23213: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). * CVE-2023-40414: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). * CVE-2014-1745: Fixed denial-of-service or potentially disclose memory contents while processing maliciously crafted files (bsc#1219604). * CVE-2023-42833: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-545=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-545=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-545=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-545=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-545=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libwebkit2gtk-4_0-37-2.42.5-2.168.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-2.168.2 * typelib-1_0-JavaScriptCore-4_0-2.42.5-2.168.2 * typelib-1_0-WebKit2-4_0-2.42.5-2.168.2 * libjavascriptcoregtk-4_0-18-2.42.5-2.168.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-2.168.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-2.168.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-2.168.2 * webkit2gtk-4_0-injected-bundles-2.42.5-2.168.2 * webkit2gtk3-debugsource-2.42.5-2.168.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * libwebkit2gtk3-lang-2.42.5-2.168.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.42.5-2.168.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-2.168.2 * typelib-1_0-JavaScriptCore-4_0-2.42.5-2.168.2 * typelib-1_0-WebKit2-4_0-2.42.5-2.168.2 * libjavascriptcoregtk-4_0-18-2.42.5-2.168.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-2.168.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-2.168.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-2.168.2 * webkit2gtk-4_0-injected-bundles-2.42.5-2.168.2 * webkit2gtk3-debugsource-2.42.5-2.168.2 * SUSE Linux Enterprise Server 12 SP5 (noarch) * libwebkit2gtk3-lang-2.42.5-2.168.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libwebkit2gtk-4_0-37-2.42.5-2.168.2 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-2.168.2 * typelib-1_0-JavaScriptCore-4_0-2.42.5-2.168.2 * typelib-1_0-WebKit2-4_0-2.42.5-2.168.2 * libjavascriptcoregtk-4_0-18-2.42.5-2.168.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-2.168.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-2.168.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-2.168.2 * webkit2gtk-4_0-injected-bundles-2.42.5-2.168.2 * webkit2gtk3-debugsource-2.42.5-2.168.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * libwebkit2gtk3-lang-2.42.5-2.168.2 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-2.42.5-2.168.2 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-debugsource-2.42.5-2.168.2 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-2.168.2 * webkit2gtk3-devel-2.42.5-2.168.2 ## References: * https://www.suse.com/security/cve/CVE-2014-1745.html * https://www.suse.com/security/cve/CVE-2023-40414.html * https://www.suse.com/security/cve/CVE-2023-42833.html * https://www.suse.com/security/cve/CVE-2024-23206.html * https://www.suse.com/security/cve/CVE-2024-23213.html * https://www.suse.com/security/cve/CVE-2024-23222.html * https://bugzilla.suse.com/show_bug.cgi?id=1219113 * https://bugzilla.suse.com/show_bug.cgi?id=1219604 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 16:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 16:30:06 -0000 Subject: SUSE-SU-2024:0544-1: important: Security update for openvswitch Message-ID: <170844660637.14508.7651465949373852687@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0544-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-544=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-544=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-544=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libopenvswitch-2_11-0-2.11.5-3.21.1 * openvswitch-debuginfo-2.11.5-3.21.1 * libopenvswitch-2_11-0-debuginfo-2.11.5-3.21.1 * openvswitch-debugsource-2.11.5-3.21.1 * openvswitch-2.11.5-3.21.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libopenvswitch-2_11-0-2.11.5-3.21.1 * openvswitch-debuginfo-2.11.5-3.21.1 * libopenvswitch-2_11-0-debuginfo-2.11.5-3.21.1 * openvswitch-debugsource-2.11.5-3.21.1 * openvswitch-2.11.5-3.21.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libopenvswitch-2_11-0-2.11.5-3.21.1 * openvswitch-debuginfo-2.11.5-3.21.1 * libopenvswitch-2_11-0-debuginfo-2.11.5-3.21.1 * openvswitch-debugsource-2.11.5-3.21.1 * openvswitch-2.11.5-3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 16:30:08 -0000 Subject: SUSE-SU-2024:0543-1: important: Security update for libssh2_org Message-ID: <170844660814.14508.10154878799119326548@smelt2.prg2.suse.org> # Security update for libssh2_org Announcement ID: SUSE-SU-2024:0543-1 Rating: important References: * bsc#1218971 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libssh2_org fixes the following issues: * Always add the KEX pseudo-methods "ext-info-c" and "kex-strict- c-v00 at openssh.com" when configuring custom method list. [bsc#1218971, CVE-2023-48795] * The strict-kex extension is announced in the list of available KEX methods. However, when the default KEX method list is modified or replaced, the extension is not added back automatically. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-543=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-543=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-543=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-543=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libssh2_org-debugsource-1.11.0-29.12.1 * libssh2-devel-1.11.0-29.12.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libssh2-1-1.11.0-29.12.1 * libssh2-1-debuginfo-1.11.0-29.12.1 * libssh2_org-debugsource-1.11.0-29.12.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libssh2-1-32bit-1.11.0-29.12.1 * libssh2-1-debuginfo-32bit-1.11.0-29.12.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libssh2-1-1.11.0-29.12.1 * libssh2-1-debuginfo-1.11.0-29.12.1 * libssh2_org-debugsource-1.11.0-29.12.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libssh2-1-32bit-1.11.0-29.12.1 * libssh2-1-debuginfo-32bit-1.11.0-29.12.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libssh2-1-1.11.0-29.12.1 * libssh2-1-debuginfo-1.11.0-29.12.1 * libssh2_org-debugsource-1.11.0-29.12.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libssh2-1-32bit-1.11.0-29.12.1 * libssh2-1-debuginfo-32bit-1.11.0-29.12.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 16:30:09 -0000 Subject: SUSE-SU-2024:0542-1: important: Security update for postgresql12 Message-ID: <170844660977.14508.12240519812255057248@smelt2.prg2.suse.org> # Security update for postgresql12 Announcement ID: SUSE-SU-2024:0542-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql12 fixes the following issues: Upgrade to 12.18: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-542=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-542=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-542=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-542=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql12-debugsource-12.18-3.52.1 * postgresql12-devel-debuginfo-12.18-3.52.1 * postgresql12-devel-12.18-3.52.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (ppc64le s390x x86_64) * postgresql12-server-devel-12.18-3.52.1 * postgresql12-server-devel-debuginfo-12.18-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * postgresql12-12.18-3.52.1 * postgresql12-plperl-12.18-3.52.1 * postgresql12-pltcl-12.18-3.52.1 * postgresql12-pltcl-debuginfo-12.18-3.52.1 * postgresql12-plpython-debuginfo-12.18-3.52.1 * postgresql12-contrib-debuginfo-12.18-3.52.1 * postgresql12-plpython-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-contrib-12.18-3.52.1 * postgresql12-server-debuginfo-12.18-3.52.1 * postgresql12-server-12.18-3.52.1 * postgresql12-debuginfo-12.18-3.52.1 * postgresql12-plperl-debuginfo-12.18-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql12-docs-12.18-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql12-12.18-3.52.1 * postgresql12-plperl-12.18-3.52.1 * postgresql12-pltcl-12.18-3.52.1 * postgresql12-pltcl-debuginfo-12.18-3.52.1 * postgresql12-plpython-debuginfo-12.18-3.52.1 * postgresql12-contrib-debuginfo-12.18-3.52.1 * postgresql12-plpython-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-contrib-12.18-3.52.1 * postgresql12-server-debuginfo-12.18-3.52.1 * postgresql12-server-12.18-3.52.1 * postgresql12-debuginfo-12.18-3.52.1 * postgresql12-plperl-debuginfo-12.18-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql12-docs-12.18-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * postgresql12-12.18-3.52.1 * postgresql12-plperl-12.18-3.52.1 * postgresql12-pltcl-12.18-3.52.1 * postgresql12-pltcl-debuginfo-12.18-3.52.1 * postgresql12-plpython-debuginfo-12.18-3.52.1 * postgresql12-contrib-debuginfo-12.18-3.52.1 * postgresql12-plpython-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-contrib-12.18-3.52.1 * postgresql12-server-debuginfo-12.18-3.52.1 * postgresql12-server-12.18-3.52.1 * postgresql12-debuginfo-12.18-3.52.1 * postgresql12-plperl-debuginfo-12.18-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql12-docs-12.18-3.52.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:30:06 -0000 Subject: SUSE-SU-2024:0558-1: important: Security update for libssh2_org Message-ID: <170846100673.7777.13474551398473833891@smelt2.prg2.suse.org> # Security update for libssh2_org Announcement ID: SUSE-SU-2024:0558-1 Rating: important References: * bsc#1218971 Cross-References: * CVE-2023-48795 CVSS scores: * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for libssh2_org fixes the following issues: * Always add the KEX pseudo-methods "ext-info-c" and "kex-strict- c-v00 at openssh.com" when configuring custom method list. [bsc#1218971, CVE-2023-48795] * The strict-kex extension is announced in the list of available KEX methods. However, when the default KEX method list is modified or replaced, the extension is not added back automatically. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-558=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-558=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-558=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-558=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-558=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-558=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-558=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-558=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-558=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-558=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-558=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-558=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-558=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-558=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-558=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-558=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-558=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-558=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-558=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-558=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-558=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-558=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-558=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-558=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-558=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-558=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-558=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * openSUSE Leap 15.5 (x86_64) * libssh2-1-32bit-1.11.0-150000.4.25.1 * libssh2-1-32bit-debuginfo-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-1.11.0-150000.4.25.1 * libssh2-1-32bit-debuginfo-1.11.0-150000.4.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libssh2-1-32bit-1.11.0-150000.4.25.1 * libssh2-1-32bit-debuginfo-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libssh2-1-32bit-1.11.0-150000.4.25.1 * libssh2-1-32bit-debuginfo-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Manager Proxy 4.3 (x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2-devel-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libssh2-1-1.11.0-150000.4.25.1 * libssh2-1-debuginfo-1.11.0-150000.4.25.1 * libssh2_org-debugsource-1.11.0-150000.4.25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-48795.html * https://bugzilla.suse.com/show_bug.cgi?id=1218971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:30:09 -0000 Subject: SUSE-SU-2024:0557-1: moderate: Security update for python-pycryptodomex Message-ID: <170846100945.7777.16767347166398569609@smelt2.prg2.suse.org> # Security update for python-pycryptodomex Announcement ID: SUSE-SU-2024:0557-1 Rating: moderate References: * bsc#1218564 Cross-References: * CVE-2023-52323 CVSS scores: * CVE-2023-52323 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52323 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-pycryptodomex fixes the following issues: * CVE-2023-52323: Fixed a side-channel in the OAEP decryption, exploitable by a Manger attack (bsc#1218564). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-557=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-557=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-557=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-557=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-pycryptodomex-3.9.9-150300.3.3.1 * python-pycryptodomex-debugsource-3.9.9-150300.3.3.1 * python-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python3-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python2-pycryptodomex-3.9.9-150300.3.3.1 * python2-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python3-pycryptodomex-3.9.9-150300.3.3.1 * python3-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python-pycryptodomex-debugsource-3.9.9-150300.3.3.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python3-pycryptodomex-3.9.9-150300.3.3.1 * python3-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python-pycryptodomex-debugsource-3.9.9-150300.3.3.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python3-pycryptodomex-3.9.9-150300.3.3.1 * python3-pycryptodomex-debuginfo-3.9.9-150300.3.3.1 * python-pycryptodomex-debugsource-3.9.9-150300.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52323.html * https://bugzilla.suse.com/show_bug.cgi?id=1218564 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:30:12 -0000 Subject: SUSE-SU-2024:0556-1: moderate: Security update for libxml2 Message-ID: <170846101246.7777.17616801761426346939@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2024:0556-1 Rating: moderate References: * bsc#1219576 Cross-References: * CVE-2024-25062 CVSS scores: * CVE-2024-25062 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25062 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-556=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-556=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-556=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-556=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libxml2-devel-2.9.4-46.71.1 * libxml2-debugsource-2.9.4-46.71.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * python-libxml2-debuginfo-2.9.4-46.71.1 * libxml2-2-debuginfo-2.9.4-46.71.1 * libxml2-debugsource-2.9.4-46.71.1 * python-libxml2-debugsource-2.9.4-46.71.1 * libxml2-tools-debuginfo-2.9.4-46.71.1 * libxml2-2-2.9.4-46.71.1 * libxml2-tools-2.9.4-46.71.1 * python-libxml2-2.9.4-46.71.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * libxml2-doc-2.9.4-46.71.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libxml2-2-32bit-2.9.4-46.71.1 * libxml2-2-debuginfo-32bit-2.9.4-46.71.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * python-libxml2-debuginfo-2.9.4-46.71.1 * libxml2-2-debuginfo-2.9.4-46.71.1 * libxml2-debugsource-2.9.4-46.71.1 * python-libxml2-debugsource-2.9.4-46.71.1 * libxml2-tools-debuginfo-2.9.4-46.71.1 * libxml2-2-2.9.4-46.71.1 * libxml2-tools-2.9.4-46.71.1 * python-libxml2-2.9.4-46.71.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * libxml2-doc-2.9.4-46.71.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libxml2-2-32bit-2.9.4-46.71.1 * libxml2-2-debuginfo-32bit-2.9.4-46.71.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * python-libxml2-debuginfo-2.9.4-46.71.1 * libxml2-2-debuginfo-2.9.4-46.71.1 * libxml2-debugsource-2.9.4-46.71.1 * python-libxml2-debugsource-2.9.4-46.71.1 * libxml2-tools-debuginfo-2.9.4-46.71.1 * libxml2-2-2.9.4-46.71.1 * libxml2-tools-2.9.4-46.71.1 * python-libxml2-2.9.4-46.71.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * libxml2-doc-2.9.4-46.71.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libxml2-2-32bit-2.9.4-46.71.1 * libxml2-2-debuginfo-32bit-2.9.4-46.71.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25062.html * https://bugzilla.suse.com/show_bug.cgi?id=1219576 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:30:14 -0000 Subject: SUSE-SU-2024:0555-1: moderate: Security update for libxml2 Message-ID: <170846101414.7777.2756835311233232869@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2024:0555-1 Rating: moderate References: * bsc#1219576 Cross-References: * CVE-2024-25062 CVSS scores: * CVE-2024-25062 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25062 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-555=1 openSUSE-SLE-15.5-2024-555=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-555=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-555=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-555=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libxml2-debugsource-2.10.3-150500.5.14.1 * libxml2-devel-2.10.3-150500.5.14.1 * python311-libxml2-debuginfo-2.10.3-150500.5.14.1 * python311-libxml2-2.10.3-150500.5.14.1 * libxml2-python-debugsource-2.10.3-150500.5.14.1 * libxml2-2-debuginfo-2.10.3-150500.5.14.1 * python3-libxml2-debuginfo-2.10.3-150500.5.14.1 * libxml2-tools-2.10.3-150500.5.14.1 * python3-libxml2-2.10.3-150500.5.14.1 * libxml2-tools-debuginfo-2.10.3-150500.5.14.1 * libxml2-2-2.10.3-150500.5.14.1 * openSUSE Leap 15.5 (x86_64) * libxml2-devel-32bit-2.10.3-150500.5.14.1 * libxml2-2-32bit-2.10.3-150500.5.14.1 * libxml2-2-32bit-debuginfo-2.10.3-150500.5.14.1 * openSUSE Leap 15.5 (noarch) * libxml2-doc-2.10.3-150500.5.14.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libxml2-devel-64bit-2.10.3-150500.5.14.1 * libxml2-2-64bit-debuginfo-2.10.3-150500.5.14.1 * libxml2-2-64bit-2.10.3-150500.5.14.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libxml2-debugsource-2.10.3-150500.5.14.1 * libxml2-python-debugsource-2.10.3-150500.5.14.1 * libxml2-2-debuginfo-2.10.3-150500.5.14.1 * python3-libxml2-debuginfo-2.10.3-150500.5.14.1 * libxml2-tools-2.10.3-150500.5.14.1 * python3-libxml2-2.10.3-150500.5.14.1 * libxml2-tools-debuginfo-2.10.3-150500.5.14.1 * libxml2-2-2.10.3-150500.5.14.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libxml2-debugsource-2.10.3-150500.5.14.1 * libxml2-devel-2.10.3-150500.5.14.1 * libxml2-python-debugsource-2.10.3-150500.5.14.1 * libxml2-2-debuginfo-2.10.3-150500.5.14.1 * python3-libxml2-debuginfo-2.10.3-150500.5.14.1 * libxml2-tools-2.10.3-150500.5.14.1 * python3-libxml2-2.10.3-150500.5.14.1 * libxml2-tools-debuginfo-2.10.3-150500.5.14.1 * libxml2-2-2.10.3-150500.5.14.1 * Basesystem Module 15-SP5 (x86_64) * libxml2-2-32bit-2.10.3-150500.5.14.1 * libxml2-2-32bit-debuginfo-2.10.3-150500.5.14.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-libxml2-debuginfo-2.10.3-150500.5.14.1 * python311-libxml2-2.10.3-150500.5.14.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25062.html * https://bugzilla.suse.com/show_bug.cgi?id=1219576 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:30:16 -0000 Subject: SUSE-SU-2024:0554-1: important: Security update for dpdk Message-ID: <170846101682.7777.1873553643935013259@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0554-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-554=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le x86_64) * dpdk-devel-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-devel-18.11.9-3.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64) * dpdk-thunderx-devel-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-devel-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libdpdk-18_11-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64) * dpdk-thunderx-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le x86_64) * libdpdk-18_11-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64) * dpdk-thunderx-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-18.11.9-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libdpdk-18_11-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:33:19 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:33:19 -0000 Subject: SUSE-SU-2024:0554-1: important: Security update for dpdk Message-ID: <170846119969.7777.7428811108996891025@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0554-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-554=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le x86_64) * dpdk-devel-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-devel-18.11.9-3.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64) * dpdk-thunderx-devel-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-devel-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libdpdk-18_11-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64) * dpdk-thunderx-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le x86_64) * libdpdk-18_11-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64) * dpdk-thunderx-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-18.11.9-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libdpdk-18_11-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:21 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:21 -0000 Subject: SUSE-SU-2024:0554-1: important: Security update for dpdk Message-ID: <170846138195.11402.14428173358589822121@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0554-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-554=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-554=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le x86_64) * dpdk-devel-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * dpdk-debuginfo-18.11.9-3.29.1 * dpdk-devel-debuginfo-18.11.9-3.29.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64) * dpdk-thunderx-devel-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-devel-18.11.9-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * dpdk-debuginfo-18.11.9-3.29.1 * libdpdk-18_11-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64) * dpdk-thunderx-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-18.11.9-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le x86_64) * dpdk-debuginfo-18.11.9-3.29.1 * libdpdk-18_11-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64) * dpdk-thunderx-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-thunderx-debugsource-18.11.9-3.29.1 * dpdk-thunderx-18.11.9-3.29.1 * dpdk-thunderx-debuginfo-18.11.9-3.29.1 * dpdk-thunderx-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * dpdk-debuginfo-18.11.9-3.29.1 * libdpdk-18_11-18.11.9-3.29.1 * dpdk-tools-debuginfo-18.11.9-3.29.1 * dpdk-18.11.9-3.29.1 * dpdk-debugsource-18.11.9-3.29.1 * libdpdk-18_11-debuginfo-18.11.9-3.29.1 * dpdk-tools-18.11.9-3.29.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * dpdk-kmp-default-18.11.9_k4.12.14_122.189-3.29.1 * dpdk-kmp-default-debuginfo-18.11.9_k4.12.14_122.189-3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:24 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:24 -0000 Subject: SUSE-SU-2024:0553-1: important: Security update for openvswitch Message-ID: <170846138410.11402.8339873493396743307@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2024:0553-1 Rating: important References: * bsc#1219059 Cross-References: * CVE-2024-22563 CVSS scores: * CVE-2024-22563 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22563 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openvswitch fixes the following issues: * CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-553=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-553=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-553=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-553=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-553=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-553=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-553=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-553=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-553=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-553=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-553=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * openSUSE Leap 15.4 (noarch) * openvswitch-doc-2.14.2-150400.24.20.1 * ovn-doc-20.06.2-150400.24.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * openSUSE Leap 15.5 (noarch) * openvswitch-doc-2.14.2-150400.24.20.1 * ovn-doc-20.06.2-150400.24.20.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * openvswitch-debugsource-2.14.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Manager Proxy 4.3 (x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ovn-central-debuginfo-20.06.2-150400.24.20.1 * ovn-central-20.06.2-150400.24.20.1 * openvswitch-test-2.14.2-150400.24.20.1 * ovn-devel-20.06.2-150400.24.20.1 * ovn-vtep-20.06.2-150400.24.20.1 * openvswitch-devel-2.14.2-150400.24.20.1 * ovn-debuginfo-20.06.2-150400.24.20.1 * openvswitch-vtep-debuginfo-2.14.2-150400.24.20.1 * ovn-20.06.2-150400.24.20.1 * openvswitch-vtep-2.14.2-150400.24.20.1 * openvswitch-test-debuginfo-2.14.2-150400.24.20.1 * openvswitch-debugsource-2.14.2-150400.24.20.1 * libovn-20_06-0-20.06.2-150400.24.20.1 * python3-ovs-2.14.2-150400.24.20.1 * openvswitch-2.14.2-150400.24.20.1 * ovn-docker-20.06.2-150400.24.20.1 * ovn-host-20.06.2-150400.24.20.1 * ovn-vtep-debuginfo-20.06.2-150400.24.20.1 * libovn-20_06-0-debuginfo-20.06.2-150400.24.20.1 * openvswitch-pki-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-2.14.2-150400.24.20.1 * openvswitch-ipsec-2.14.2-150400.24.20.1 * libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.20.1 * ovn-host-debuginfo-20.06.2-150400.24.20.1 * openvswitch-debuginfo-2.14.2-150400.24.20.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22563.html * https://bugzilla.suse.com/show_bug.cgi?id=1219059 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:26 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:26 -0000 Subject: SUSE-SU-2024:0552-1: important: Security update for postgresql14 Message-ID: <170846138679.11402.17655401134055363770@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2024:0552-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql14 fixes the following issues: Upgrade to 14.11: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-552=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-552=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-552=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-552=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-552=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-552=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-552=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-552=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-552=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-552=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-552=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-552=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-552=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-552=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-552=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-552=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-552=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-552=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Manager Server 4.3 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-llvmjit-devel-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-llvmjit-debuginfo-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-llvmjit-14.11-150200.5.39.1 * postgresql14-test-14.11-150200.5.39.1 * openSUSE Leap 15.5 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-llvmjit-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-llvmjit-devel-14.11-150200.5.39.1 * postgresql14-llvmjit-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * Legacy Module 15-SP5 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-llvmjit-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-llvmjit-14.11-150200.5.39.1 * postgresql14-test-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql14-docs-14.11-150200.5.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * postgresql14-debugsource-14.11-150200.5.39.1 * postgresql14-server-debuginfo-14.11-150200.5.39.1 * postgresql14-debuginfo-14.11-150200.5.39.1 * postgresql14-pltcl-debuginfo-14.11-150200.5.39.1 * postgresql14-devel-14.11-150200.5.39.1 * postgresql14-server-14.11-150200.5.39.1 * postgresql14-14.11-150200.5.39.1 * postgresql14-contrib-debuginfo-14.11-150200.5.39.1 * postgresql14-server-devel-14.11-150200.5.39.1 * postgresql14-pltcl-14.11-150200.5.39.1 * postgresql14-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-contrib-14.11-150200.5.39.1 * postgresql14-plperl-debuginfo-14.11-150200.5.39.1 * postgresql14-plperl-14.11-150200.5.39.1 * postgresql14-server-devel-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-debuginfo-14.11-150200.5.39.1 * postgresql14-plpython-14.11-150200.5.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postgresql14-docs-14.11-150200.5.39.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:29 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:29 -0000 Subject: SUSE-SU-2024:0551-1: important: Security update for postgresql15 Message-ID: <170846138969.11402.17427718731059325258@smelt2.prg2.suse.org> # Security update for postgresql15 Announcement ID: SUSE-SU-2024:0551-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql15 fixes the following issues: Upgrade to 15.6: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-551=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-551=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-551=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-551=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-551=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-551=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-551=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-551=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-551=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-551=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-551=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-551=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-551=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-551=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-551=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-test-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-llvmjit-15.6-150200.5.22.1 * postgresql15-llvmjit-debuginfo-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-llvmjit-devel-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * openSUSE Leap 15.5 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * Server Applications Module 15-SP5 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Manager Server 4.3 (noarch) * postgresql15-docs-15.6-150200.5.22.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * postgresql15-15.6-150200.5.22.1 * postgresql15-plpython-debuginfo-15.6-150200.5.22.1 * postgresql15-server-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-15.6-150200.5.22.1 * postgresql15-devel-15.6-150200.5.22.1 * postgresql15-debuginfo-15.6-150200.5.22.1 * postgresql15-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-plpython-15.6-150200.5.22.1 * postgresql15-server-devel-debuginfo-15.6-150200.5.22.1 * postgresql15-contrib-15.6-150200.5.22.1 * postgresql15-server-15.6-150200.5.22.1 * postgresql15-server-devel-15.6-150200.5.22.1 * postgresql15-debugsource-15.6-150200.5.22.1 * postgresql15-plperl-debuginfo-15.6-150200.5.22.1 * postgresql15-pltcl-debuginfo-15.6-150200.5.22.1 * postgresql15-plperl-15.6-150200.5.22.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql15-docs-15.6-150200.5.22.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:32 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:32 -0000 Subject: SUSE-SU-2024:0550-1: important: Security update for postgresql16 Message-ID: <170846139243.11402.17944621072911110696@smelt2.prg2.suse.org> # Security update for postgresql16 Announcement ID: SUSE-SU-2024:0550-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql16 fixes the following issues: Upgrade to 16.2: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-550=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-550=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-550=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-550=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-550=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-550=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-550=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-550=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-550=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-550=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-550=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-550=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-550=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-550=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-550=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-550=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-550=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-550=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-550=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Manager Proxy 4.3 (x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Manager Server 4.3 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Manager Server 4.3 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * postgresql16-mini-debugsource-16.2-150200.5.10.1 * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-devel-mini-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-test-16.2-150200.5.10.1 * postgresql16-llvmjit-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-devel-mini-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-llvmjit-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * postgresql16-llvmjit-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * openSUSE Leap 15.5 (x86_64) * libecpg6-32bit-debuginfo-16.2-150200.5.10.1 * libecpg6-32bit-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * openSUSE Leap 15.5 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libpq5-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * Basesystem Module 15-SP5 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql16-llvmjit-devel-16.2-150200.5.10.1 * postgresql16-llvmjit-debuginfo-16.2-150200.5.10.1 * postgresql16-llvmjit-16.2-150200.5.10.1 * postgresql16-test-16.2-150200.5.10.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * postgresql16-server-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * Server Applications Module 15-SP5 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libpq5-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * postgresql16-server-devel-debuginfo-16.2-150200.5.10.1 * postgresql16-server-devel-16.2-150200.5.10.1 * postgresql16-devel-debuginfo-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * postgresql16-plperl-16.2-150200.5.10.1 * postgresql16-plperl-debuginfo-16.2-150200.5.10.1 * postgresql16-debuginfo-16.2-150200.5.10.1 * postgresql16-server-16.2-150200.5.10.1 * libpq5-16.2-150200.5.10.1 * postgresql16-contrib-debuginfo-16.2-150200.5.10.1 * postgresql16-pltcl-16.2-150200.5.10.1 * postgresql16-16.2-150200.5.10.1 * postgresql16-pltcl-debuginfo-16.2-150200.5.10.1 * postgresql16-contrib-16.2-150200.5.10.1 * postgresql16-devel-16.2-150200.5.10.1 * postgresql16-plpython-debuginfo-16.2-150200.5.10.1 * postgresql16-plpython-16.2-150200.5.10.1 * postgresql16-server-debuginfo-16.2-150200.5.10.1 * postgresql16-debugsource-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postgresql16-docs-16.2-150200.5.10.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libpq5-16.2-150200.5.10.1 * libecpg6-debuginfo-16.2-150200.5.10.1 * libecpg6-16.2-150200.5.10.1 * libpq5-debuginfo-16.2-150200.5.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libpq5-32bit-debuginfo-16.2-150200.5.10.1 * libpq5-32bit-16.2-150200.5.10.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:38 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:38 -0000 Subject: SUSE-SU-2024:0548-1: important: Security update for webkit2gtk3 Message-ID: <170846139834.11402.12327517212584782468@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2024:0548-1 Rating: important References: * bsc#1219113 * bsc#1219604 Cross-References: * CVE-2014-1745 * CVE-2023-40414 * CVE-2023-42833 * CVE-2024-23206 * CVE-2024-23213 * CVE-2024-23222 CVSS scores: * CVE-2023-40414 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-40414 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42833 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-42833 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23206 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23206 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-23213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23213 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23222 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.42.5 (bsc#1219604): * CVE-2024-23222: Fixed processing maliciously crafted web content that may have led to arbitrary code execution (bsc#1219113). * CVE-2024-23206: Fixed fingerprint user via maliciously crafted webpages (bsc#1219604). * CVE-2024-23213: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). * CVE-2023-40414: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). * CVE-2014-1745: Fixed denial-of-service or potentially disclose memory contents while processing maliciously crafted files (bsc#1219604). * CVE-2023-42833: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-548=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-548=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-548=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-548=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-548=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-548=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-548=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-548=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-548=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-548=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-548=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-548=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-548=1 ## Package List: * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-minibrowser-2.42.5-150400.4.75.1 * webkit-jsc-6.0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit-6_0-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-minibrowser-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-6_0-2.42.5-150400.4.75.1 * webkit2gtk4-minibrowser-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-minibrowser-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * webkit-jsc-4.1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit-jsc-4.1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * webkit-jsc-4-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * webkit-jsc-6.0-2.42.5-150400.4.75.1 * webkit2gtk3-minibrowser-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * webkit-jsc-4-debuginfo-2.42.5-150400.4.75.1 * openSUSE Leap 15.4 (x86_64) * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-32bit-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-32bit-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-32bit-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-32bit-2.42.5-150400.4.75.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-64bit-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-64bit-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-64bit-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-64bit-2.42.5-150400.4.75.1 * openSUSE Leap 15.5 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-minibrowser-2.42.5-150400.4.75.1 * webkit-jsc-6.0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit-6_0-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-minibrowser-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-6_0-2.42.5-150400.4.75.1 * webkit2gtk4-minibrowser-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-minibrowser-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * webkit-jsc-4.1-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit-jsc-4.1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * webkit-jsc-4-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * webkit-jsc-6.0-2.42.5-150400.4.75.1 * webkit2gtk3-minibrowser-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * webkit-jsc-4-debuginfo-2.42.5-150400.4.75.1 * openSUSE Leap 15.5 (x86_64) * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-32bit-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-32bit-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-32bit-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-32bit-2.42.5-150400.4.75.1 * Basesystem Module 15-SP5 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * Desktop Applications Module 15-SP5 (noarch) * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * Development Tools Module 15-SP5 (noarch) * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 * WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-devel-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk4-debugsource-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk3-debugsource-2.42.5-150400.4.75.1 * libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 * libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 * libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 * webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * SUSE Manager Proxy 4.3 (x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-debuginfo-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 * libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 * typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-debugsource-2.42.5-150400.4.75.1 * webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 * libwebkit2gtk-4_0-37-debuginfo-2.42.5-150400.4.75.1 * typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.42.5-150400.4.75.1 ## References: * https://www.suse.com/security/cve/CVE-2014-1745.html * https://www.suse.com/security/cve/CVE-2023-40414.html * https://www.suse.com/security/cve/CVE-2023-42833.html * https://www.suse.com/security/cve/CVE-2024-23206.html * https://www.suse.com/security/cve/CVE-2024-23213.html * https://www.suse.com/security/cve/CVE-2024-23222.html * https://bugzilla.suse.com/show_bug.cgi?id=1219113 * https://bugzilla.suse.com/show_bug.cgi?id=1219604 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:40 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:40 -0000 Subject: SUSE-RU-2024:0547-1: moderate: Recommended update for rpmlint Message-ID: <170846140091.11402.17835674804449225833@smelt2.prg2.suse.org> # Recommended update for rpmlint Announcement ID: SUSE-RU-2024:0547-1 Rating: moderate References: * bsc#1218850 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for rpmlint fixes the following issues: * remove Erlang-related tests (bsc#1218850) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-547=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-547=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-547=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-547=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-547=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-547=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * rpmlint-1.10-150000.7.81.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * rpmlint-1.10-150000.7.81.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-1.10-150400.23.18.2 * rpmlint-mini-debuginfo-1.10-150400.23.18.2 * rpmlint-mini-debugsource-1.10-150400.23.18.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rpmlint-mini-1.10-150400.23.18.2 * rpmlint-mini-debuginfo-1.10-150400.23.18.2 * rpmlint-mini-debugsource-1.10-150400.23.18.2 * openSUSE Leap 15.5 (noarch) * rpmlint-1.10-150000.7.81.1 * Development Tools Module 15-SP5 (noarch) * rpmlint-1.10-150000.7.81.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpmlint-mini-1.10-150400.23.18.2 * rpmlint-mini-debuginfo-1.10-150400.23.18.2 * rpmlint-mini-debugsource-1.10-150400.23.18.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * rpmlint-1.10-150000.7.81.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * rpmlint-mini-1.10-150400.23.18.2 * rpmlint-mini-debuginfo-1.10-150400.23.18.2 * rpmlint-mini-debugsource-1.10-150400.23.18.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218850 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:41 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:41 -0000 Subject: SUSE-SU-2024:0542-1: important: Security update for postgresql12 Message-ID: <170846140156.11402.7449142110014656321@smelt2.prg2.suse.org> # Security update for postgresql12 Announcement ID: SUSE-SU-2024:0542-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql12 fixes the following issues: Upgrade to 12.18: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-542=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-542=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-542=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-542=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql12-devel-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-devel-debuginfo-12.18-3.52.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (ppc64le s390x x86_64) * postgresql12-server-devel-12.18-3.52.1 * postgresql12-server-devel-debuginfo-12.18-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * postgresql12-plpython-12.18-3.52.1 * postgresql12-contrib-12.18-3.52.1 * postgresql12-contrib-debuginfo-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-server-12.18-3.52.1 * postgresql12-plperl-12.18-3.52.1 * postgresql12-server-debuginfo-12.18-3.52.1 * postgresql12-plperl-debuginfo-12.18-3.52.1 * postgresql12-plpython-debuginfo-12.18-3.52.1 * postgresql12-debuginfo-12.18-3.52.1 * postgresql12-pltcl-debuginfo-12.18-3.52.1 * postgresql12-12.18-3.52.1 * postgresql12-pltcl-12.18-3.52.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql12-docs-12.18-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql12-plpython-12.18-3.52.1 * postgresql12-contrib-12.18-3.52.1 * postgresql12-contrib-debuginfo-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-server-12.18-3.52.1 * postgresql12-plperl-12.18-3.52.1 * postgresql12-server-debuginfo-12.18-3.52.1 * postgresql12-plperl-debuginfo-12.18-3.52.1 * postgresql12-plpython-debuginfo-12.18-3.52.1 * postgresql12-debuginfo-12.18-3.52.1 * postgresql12-pltcl-debuginfo-12.18-3.52.1 * postgresql12-12.18-3.52.1 * postgresql12-pltcl-12.18-3.52.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql12-docs-12.18-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * postgresql12-plpython-12.18-3.52.1 * postgresql12-contrib-12.18-3.52.1 * postgresql12-contrib-debuginfo-12.18-3.52.1 * postgresql12-debugsource-12.18-3.52.1 * postgresql12-server-12.18-3.52.1 * postgresql12-plperl-12.18-3.52.1 * postgresql12-server-debuginfo-12.18-3.52.1 * postgresql12-plperl-debuginfo-12.18-3.52.1 * postgresql12-plpython-debuginfo-12.18-3.52.1 * postgresql12-debuginfo-12.18-3.52.1 * postgresql12-pltcl-debuginfo-12.18-3.52.1 * postgresql12-12.18-3.52.1 * postgresql12-pltcl-12.18-3.52.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql12-docs-12.18-3.52.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:43 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:43 -0000 Subject: SUSE-SU-2024:0541-1: important: Security update for postgresql13 Message-ID: <170846140326.11402.17996572738613393450@smelt2.prg2.suse.org> # Security update for postgresql13 Announcement ID: SUSE-SU-2024:0541-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql13 fixes the following issues: Upgrade to 13.14: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-541=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-541=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-541=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-541=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql13-debugsource-13.14-3.46.1 * postgresql13-devel-debuginfo-13.14-3.46.1 * postgresql13-devel-13.14-3.46.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (ppc64le s390x x86_64) * postgresql13-server-devel-13.14-3.46.1 * postgresql13-server-devel-debuginfo-13.14-3.46.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * postgresql13-pltcl-debuginfo-13.14-3.46.1 * postgresql13-contrib-debuginfo-13.14-3.46.1 * postgresql13-debugsource-13.14-3.46.1 * postgresql13-plpython-debuginfo-13.14-3.46.1 * postgresql13-debuginfo-13.14-3.46.1 * postgresql13-13.14-3.46.1 * postgresql13-plpython-13.14-3.46.1 * postgresql13-pltcl-13.14-3.46.1 * postgresql13-server-13.14-3.46.1 * postgresql13-plperl-debuginfo-13.14-3.46.1 * postgresql13-plperl-13.14-3.46.1 * postgresql13-server-debuginfo-13.14-3.46.1 * postgresql13-contrib-13.14-3.46.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql13-docs-13.14-3.46.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql13-pltcl-debuginfo-13.14-3.46.1 * postgresql13-contrib-debuginfo-13.14-3.46.1 * postgresql13-debugsource-13.14-3.46.1 * postgresql13-plpython-debuginfo-13.14-3.46.1 * postgresql13-debuginfo-13.14-3.46.1 * postgresql13-13.14-3.46.1 * postgresql13-plpython-13.14-3.46.1 * postgresql13-pltcl-13.14-3.46.1 * postgresql13-server-13.14-3.46.1 * postgresql13-plperl-debuginfo-13.14-3.46.1 * postgresql13-plperl-13.14-3.46.1 * postgresql13-server-debuginfo-13.14-3.46.1 * postgresql13-contrib-13.14-3.46.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql13-docs-13.14-3.46.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * postgresql13-pltcl-debuginfo-13.14-3.46.1 * postgresql13-contrib-debuginfo-13.14-3.46.1 * postgresql13-debugsource-13.14-3.46.1 * postgresql13-plpython-debuginfo-13.14-3.46.1 * postgresql13-debuginfo-13.14-3.46.1 * postgresql13-13.14-3.46.1 * postgresql13-plpython-13.14-3.46.1 * postgresql13-pltcl-13.14-3.46.1 * postgresql13-server-13.14-3.46.1 * postgresql13-plperl-debuginfo-13.14-3.46.1 * postgresql13-plperl-13.14-3.46.1 * postgresql13-server-debuginfo-13.14-3.46.1 * postgresql13-contrib-13.14-3.46.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql13-docs-13.14-3.46.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:34 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:34 -0000 Subject: SUSE-SU-2024:0549-1: moderate: Security update for openssl-1_1 Message-ID: <170846139499.11402.1170261532079308992@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2024:0549-1 Rating: moderate References: * bsc#1219243 Cross-References: * CVE-2024-0727 CVSS scores: * CVE-2024-0727 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2024-0727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-549=1 SUSE-2024-549=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-549=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-549=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * openssl-1_1-debugsource-1.1.1l-150500.17.25.1 * libopenssl1_1-debuginfo-1.1.1l-150500.17.25.1 * libopenssl-1_1-devel-1.1.1l-150500.17.25.1 * openssl-1_1-1.1.1l-150500.17.25.1 * openssl-1_1-debuginfo-1.1.1l-150500.17.25.1 * libopenssl1_1-hmac-1.1.1l-150500.17.25.1 * libopenssl1_1-1.1.1l-150500.17.25.1 * openSUSE Leap 15.5 (x86_64) * libopenssl1_1-32bit-1.1.1l-150500.17.25.1 * libopenssl1_1-hmac-32bit-1.1.1l-150500.17.25.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.25.1 * libopenssl-1_1-devel-32bit-1.1.1l-150500.17.25.1 * openSUSE Leap 15.5 (noarch) * openssl-1_1-doc-1.1.1l-150500.17.25.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libopenssl-1_1-devel-64bit-1.1.1l-150500.17.25.1 * libopenssl1_1-64bit-1.1.1l-150500.17.25.1 * libopenssl1_1-hmac-64bit-1.1.1l-150500.17.25.1 * libopenssl1_1-64bit-debuginfo-1.1.1l-150500.17.25.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * openssl-1_1-debugsource-1.1.1l-150500.17.25.1 * libopenssl1_1-debuginfo-1.1.1l-150500.17.25.1 * libopenssl-1_1-devel-1.1.1l-150500.17.25.1 * openssl-1_1-1.1.1l-150500.17.25.1 * openssl-1_1-debuginfo-1.1.1l-150500.17.25.1 * libopenssl1_1-hmac-1.1.1l-150500.17.25.1 * libopenssl1_1-1.1.1l-150500.17.25.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debugsource-1.1.1l-150500.17.25.1 * libopenssl1_1-debuginfo-1.1.1l-150500.17.25.1 * libopenssl-1_1-devel-1.1.1l-150500.17.25.1 * openssl-1_1-1.1.1l-150500.17.25.1 * openssl-1_1-debuginfo-1.1.1l-150500.17.25.1 * libopenssl1_1-hmac-1.1.1l-150500.17.25.1 * libopenssl1_1-1.1.1l-150500.17.25.1 * Basesystem Module 15-SP5 (x86_64) * libopenssl1_1-32bit-1.1.1l-150500.17.25.1 * libopenssl1_1-hmac-32bit-1.1.1l-150500.17.25.1 * libopenssl1_1-32bit-debuginfo-1.1.1l-150500.17.25.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0727.html * https://bugzilla.suse.com/show_bug.cgi?id=1219243 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:44 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:44 -0000 Subject: SUSE-SU-2024:0540-1: important: Security update for postgresql14 Message-ID: <170846140492.11402.5003112263958475638@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2024:0540-1 Rating: important References: * bsc#1219679 Cross-References: * CVE-2024-0985 CVSS scores: * CVE-2024-0985 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-0985 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for postgresql14 fixes the following issues: Upgrade to 14.11: * CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-540=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-540=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-540=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-540=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql14-devel-14.11-3.36.1 * postgresql14-debugsource-14.11-3.36.1 * postgresql14-devel-debuginfo-14.11-3.36.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (ppc64le s390x x86_64) * postgresql14-server-devel-debuginfo-14.11-3.36.1 * postgresql14-server-devel-14.11-3.36.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * postgresql14-server-debuginfo-14.11-3.36.1 * postgresql14-debugsource-14.11-3.36.1 * postgresql14-pltcl-debuginfo-14.11-3.36.1 * postgresql14-plperl-14.11-3.36.1 * postgresql14-server-14.11-3.36.1 * postgresql14-plperl-debuginfo-14.11-3.36.1 * postgresql14-14.11-3.36.1 * postgresql14-debuginfo-14.11-3.36.1 * postgresql14-pltcl-14.11-3.36.1 * postgresql14-contrib-14.11-3.36.1 * postgresql14-contrib-debuginfo-14.11-3.36.1 * postgresql14-plpython-14.11-3.36.1 * postgresql14-plpython-debuginfo-14.11-3.36.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql14-docs-14.11-3.36.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * postgresql14-server-debuginfo-14.11-3.36.1 * postgresql14-debugsource-14.11-3.36.1 * postgresql14-pltcl-debuginfo-14.11-3.36.1 * postgresql14-plperl-14.11-3.36.1 * postgresql14-server-14.11-3.36.1 * postgresql14-plperl-debuginfo-14.11-3.36.1 * postgresql14-14.11-3.36.1 * postgresql14-debuginfo-14.11-3.36.1 * postgresql14-pltcl-14.11-3.36.1 * postgresql14-contrib-14.11-3.36.1 * postgresql14-contrib-debuginfo-14.11-3.36.1 * postgresql14-plpython-14.11-3.36.1 * postgresql14-plpython-debuginfo-14.11-3.36.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql14-docs-14.11-3.36.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * postgresql14-server-debuginfo-14.11-3.36.1 * postgresql14-debugsource-14.11-3.36.1 * postgresql14-pltcl-debuginfo-14.11-3.36.1 * postgresql14-plperl-14.11-3.36.1 * postgresql14-server-14.11-3.36.1 * postgresql14-plperl-debuginfo-14.11-3.36.1 * postgresql14-14.11-3.36.1 * postgresql14-debuginfo-14.11-3.36.1 * postgresql14-pltcl-14.11-3.36.1 * postgresql14-contrib-14.11-3.36.1 * postgresql14-contrib-debuginfo-14.11-3.36.1 * postgresql14-plpython-14.11-3.36.1 * postgresql14-plpython-debuginfo-14.11-3.36.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql14-docs-14.11-3.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-0985.html * https://bugzilla.suse.com/show_bug.cgi?id=1219679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:48 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:48 -0000 Subject: SUSE-SU-2024:0539-1: important: Security update for libssh Message-ID: <170846140866.11402.3552747743070208822@smelt2.prg2.suse.org> # Security update for libssh Announcement ID: SUSE-SU-2024:0539-1 Rating: important References: * bsc#1158095 * bsc#1168699 * bsc#1174713 * bsc#1189608 * bsc#1211188 * bsc#1211190 * bsc#1218126 * bsc#1218186 * bsc#1218209 * jsc#PED-7719 Cross-References: * CVE-2019-14889 * CVE-2020-16135 * CVE-2020-1730 * CVE-2021-3634 * CVE-2023-1667 * CVE-2023-2283 * CVE-2023-48795 * CVE-2023-6004 * CVE-2023-6918 CVSS scores: * CVE-2019-14889 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2019-14889 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2019-14889 ( NVD ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2020-16135 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-16135 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-1730 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2020-1730 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2021-3634 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2021-3634 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1667 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-1667 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2283 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-2283 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-48795 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-6004 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6004 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-6918 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-6918 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves nine vulnerabilities and contains one feature can now be installed. ## Description: This update for libssh fixes the following issues: Update to version 0.9.8 (jsc#PED-7719): * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209) * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126) * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186) * Allow @ in usernames when parsing from URI composes Update to version 0.9.7 * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm guessing (bsc#1211188) * Fix CVE-2023-2283: a possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190) * Fix several memory leaks in GSSAPI handling code Update to version 0.9.6 (bsc#1189608, CVE-2021-3634) * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6 Update to version 0.9.5 (bsc#1174713, CVE-2020-16135): * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite Update to version 0.9.4: * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security- release/ * Fix possible Denial of Service attack when using AES-CTR-ciphers CVE-2020-1730 (bsc#1168699) Update to version 0.9.3: * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095) * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer Update to version 0.9.2: * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197) Update to version 0.9.1: * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166) Update to verion 0.9.0: * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures * Add libssh client and server config files ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-539=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-539=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-539=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-539=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libssh-devel-0.9.8-3.12.2 * libssh4-debuginfo-0.9.8-3.12.2 * libssh4-0.9.8-3.12.2 * libssh-debugsource-0.9.8-3.12.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libssh4-debuginfo-0.9.8-3.12.2 * libssh-config-0.9.8-3.12.2 * libssh4-0.9.8-3.12.2 * libssh-debugsource-0.9.8-3.12.2 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libssh4-32bit-0.9.8-3.12.2 * libssh4-debuginfo-32bit-0.9.8-3.12.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libssh4-debuginfo-0.9.8-3.12.2 * libssh-config-0.9.8-3.12.2 * libssh4-0.9.8-3.12.2 * libssh-debugsource-0.9.8-3.12.2 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libssh4-32bit-0.9.8-3.12.2 * libssh4-debuginfo-32bit-0.9.8-3.12.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libssh4-debuginfo-0.9.8-3.12.2 * libssh-config-0.9.8-3.12.2 * libssh4-0.9.8-3.12.2 * libssh-debugsource-0.9.8-3.12.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libssh4-32bit-0.9.8-3.12.2 * libssh4-debuginfo-32bit-0.9.8-3.12.2 ## References: * https://www.suse.com/security/cve/CVE-2019-14889.html * https://www.suse.com/security/cve/CVE-2020-16135.html * https://www.suse.com/security/cve/CVE-2020-1730.html * https://www.suse.com/security/cve/CVE-2021-3634.html * https://www.suse.com/security/cve/CVE-2023-1667.html * https://www.suse.com/security/cve/CVE-2023-2283.html * https://www.suse.com/security/cve/CVE-2023-48795.html * https://www.suse.com/security/cve/CVE-2023-6004.html * https://www.suse.com/security/cve/CVE-2023-6918.html * https://bugzilla.suse.com/show_bug.cgi?id=1158095 * https://bugzilla.suse.com/show_bug.cgi?id=1168699 * https://bugzilla.suse.com/show_bug.cgi?id=1174713 * https://bugzilla.suse.com/show_bug.cgi?id=1189608 * https://bugzilla.suse.com/show_bug.cgi?id=1211188 * https://bugzilla.suse.com/show_bug.cgi?id=1211190 * https://bugzilla.suse.com/show_bug.cgi?id=1218126 * https://bugzilla.suse.com/show_bug.cgi?id=1218186 * https://bugzilla.suse.com/show_bug.cgi?id=1218209 * https://jira.suse.com/browse/PED-7719 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:36:51 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:36:51 -0000 Subject: SUSE-SU-2024:0538-1: moderate: Security update for hdf5 Message-ID: <170846141182.11402.12299858802422320343@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:0538-1 Rating: moderate References: * bsc#1011205 * bsc#1093641 * bsc#1125882 * bsc#1167400 * bsc#1207973 * jsc#PED-7816 Cross-References: * CVE-2016-4332 * CVE-2018-11202 * CVE-2019-8396 * CVE-2020-10812 * CVE-2021-37501 CVSS scores: * CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: * Improved support for collective I/O (for both writes and reads). * Reduction of copying of application data buffers passed to H5Dwrite. * Addition of support for incremental file space allocation for filtered datasets created in parallel. * Addition of support for HDF5's "don't filter partial edge chunks" flag * Addition of proper support for HDF5 fill values with the feature. * Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. * Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the H5check_version function. * Unified handling of collective metadata reads to correctly fix old bugs. * Fixed several potential MPI deadlocks in library failure conditions. * Fixed an issue with collective metadata reads being permanently disabled after a dataset chunk lookup operation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-538=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-538=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-538=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-538=1 ## Package List: * openSUSE Leap 15.4 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (aarch64 x86_64) * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2016-4332.html * https://www.suse.com/security/cve/CVE-2018-11202.html * https://www.suse.com/security/cve/CVE-2019-8396.html * https://www.suse.com/security/cve/CVE-2020-10812.html * https://www.suse.com/security/cve/CVE-2021-37501.html * https://bugzilla.suse.com/show_bug.cgi?id=1011205 * https://bugzilla.suse.com/show_bug.cgi?id=1093641 * https://bugzilla.suse.com/show_bug.cgi?id=1125882 * https://bugzilla.suse.com/show_bug.cgi?id=1167400 * https://bugzilla.suse.com/show_bug.cgi?id=1207973 * https://jira.suse.com/browse/PED-7816 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 20 20:39:54 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Feb 2024 20:39:54 -0000 Subject: SUSE-SU-2024:0538-1: moderate: Security update for hdf5 Message-ID: <170846159471.12759.5644646893084387905@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:0538-1 Rating: moderate References: * bsc#1011205 * bsc#1093641 * bsc#1125882 * bsc#1167400 * bsc#1207973 * jsc#PED-7816 Cross-References: * CVE-2016-4332 * CVE-2018-11202 * CVE-2019-8396 * CVE-2020-10812 * CVE-2021-37501 CVSS scores: * CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: * Improved support for collective I/O (for both writes and reads). * Reduction of copying of application data buffers passed to H5Dwrite. * Addition of support for incremental file space allocation for filtered datasets created in parallel. * Addition of support for HDF5's "don't filter partial edge chunks" flag * Addition of proper support for HDF5 fill values with the feature. * Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. * Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the H5check_version function. * Unified handling of collective metadata reads to correctly fix old bugs. * Fixed several potential MPI deadlocks in library failure conditions. * Fixed an issue with collective metadata reads being permanently disabled after a dataset chunk lookup operation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-538=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-538=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-538=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-538=1 ## Package List: * openSUSE Leap 15.4 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (aarch64 x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2016-4332.html * https://www.suse.com/security/cve/CVE-2018-11202.html * https://www.suse.com/security/cve/CVE-2019-8396.html * https://www.suse.com/security/cve/CVE-2020-10812.html * https://www.suse.com/security/cve/CVE-2021-37501.html * https://bugzilla.suse.com/show_bug.cgi?id=1011205 * https://bugzilla.suse.com/show_bug.cgi?id=1093641 * https://bugzilla.suse.com/show_bug.cgi?id=1125882 * https://bugzilla.suse.com/show_bug.cgi?id=1167400 * https://bugzilla.suse.com/show_bug.cgi?id=1207973 * https://jira.suse.com/browse/PED-7816 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:02 -0000 Subject: SUSE-RU-2024:0571-1: important: Recommended update for python-base Message-ID: <170850420251.16176.11722399418681229454@smelt2.prg2.suse.org> # Recommended update for python-base Announcement ID: SUSE-RU-2024:0571-1 Rating: important References: * bsc#1212263 * jsc#MSC-724 Affected Products: * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that contains one feature and has one fix can now be installed. ## Description: This update for python-base contains the following fixes: * Added `python-xml` to Package Hub SLE-15-SP4 (no source changes) (bsc#1212263, ijsc#MSC-724) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-571=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-571=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-571=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-571=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-571=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-571=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-571=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-571=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-571=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-571=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * openSUSE Leap 15.5 (x86_64) * libpython2_7-1_0-32bit-2.7.18-150000.62.1 * python-base-32bit-2.7.18-150000.62.1 * python-base-32bit-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.62.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python-base-debugsource-2.7.18-150000.62.1 * python-base-2.7.18-150000.62.1 * python-xml-2.7.18-150000.62.1 * python-devel-2.7.18-150000.62.1 * python-xml-debuginfo-2.7.18-150000.62.1 * python-base-debuginfo-2.7.18-150000.62.1 * libpython2_7-1_0-2.7.18-150000.62.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.62.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212263 * https://jira.suse.com/browse/MSC-724 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:04 -0000 Subject: SUSE-RU-2024:0570-1: moderate: Recommended update for sapwmp Message-ID: <170850420463.16176.8983510373702123866@smelt2.prg2.suse.org> # Recommended update for sapwmp Announcement ID: SUSE-RU-2024:0570-1 Rating: moderate References: * bsc#1217897 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SAP Applications Module 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that has one fix can now be installed. ## Description: This update for sapwmp fixes the following issues: * capture: Wait for StartTransientUnit() job finish (bsc#1217897) * capture: Rework verbose logging * Add a switch for disable OS detection ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-570=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-570=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-570=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * sapwmp-0.1+git.1707179910.c6f5238-150400.3.3.1 * sapwmp-debuginfo-0.1+git.1707179910.c6f5238-150400.3.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * sapwmp-0.1+git.1707179910.c6f5238-150400.3.3.1 * sapwmp-debuginfo-0.1+git.1707179910.c6f5238-150400.3.3.1 * SAP Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * sapwmp-0.1+git.1707179910.c6f5238-150400.3.3.1 * sapwmp-debuginfo-0.1+git.1707179910.c6f5238-150400.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217897 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:06 -0000 Subject: SUSE-RU-2024:0569-1: important: Recommended update for suseconnect-ng Message-ID: <170850420617.16176.1723515857254293922@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0569-1 Rating: important References: * bsc#1219425 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2024-569=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-569=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-569=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-569=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-569=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-569=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-569=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-569=1 ## Package List: * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libsuseconnect-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ruby-bindings-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-1.7.0~git2.21ba08e-150100.3.20.1 * libsuseconnect-1.7.0~git2.21ba08e-150100.3.20.1 * suseconnect-ng-debuginfo-1.7.0~git2.21ba08e-150100.3.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:08 -0000 Subject: SUSE-RU-2024:0568-1: important: Recommended update for suseconnect-ng Message-ID: <170850420850.16176.12001701772609094086@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0568-1 Rating: important References: * bsc#1219425 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-568=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-568=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-568=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * suseconnect-ng-debuginfo-1.7.0~git0.5338270-3.9.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-3.9.1 * libsuseconnect-1.7.0~git0.5338270-3.9.1 * suseconnect-ng-1.7.0~git0.5338270-3.9.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-3.9.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.7.0~git0.5338270-3.9.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-3.9.1 * libsuseconnect-1.7.0~git0.5338270-3.9.1 * suseconnect-ng-1.7.0~git0.5338270-3.9.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-3.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * suseconnect-ng-debuginfo-1.7.0~git0.5338270-3.9.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-3.9.1 * libsuseconnect-1.7.0~git0.5338270-3.9.1 * suseconnect-ng-1.7.0~git0.5338270-3.9.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:09 -0000 Subject: SUSE-RU-2024:0567-1: important: Recommended update for suseconnect-ng Message-ID: <170850420993.16176.8283014584064634076@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0567-1 Rating: important References: * bsc#1219425 Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-567=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-567=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150300.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150300.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:11 -0000 Subject: SUSE-RU-2024:0566-1: important: Recommended update for suseconnect-ng Message-ID: <170850421141.16176.17064568590146933430@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0566-1 Rating: important References: * bsc#1219425 Affected Products: * SUSE Linux Enterprise Micro 5.1 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-566=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150300.3.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:30:12 -0000 Subject: SUSE-RU-2024:0565-1: important: Recommended update for suseconnect-ng Message-ID: <170850421291.16176.14282968387309936627@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0565-1 Rating: important References: * bsc#1219425 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-565=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-565=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-565=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-565=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-565=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-565=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-565=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-565=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-565=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-565=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-565=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-565=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Proxy 4.3 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:33:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:33:14 -0000 Subject: SUSE-RU-2024:0565-1: important: Recommended update for suseconnect-ng Message-ID: <170850439423.16176.14482958400636652671@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0565-1 Rating: important References: * bsc#1219425 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-565=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-565=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-565=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-565=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-565=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-565=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-565=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-565=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-565=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-565=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-565=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-565=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Proxy 4.3 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:15 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:15 -0000 Subject: SUSE-RU-2024:0565-1: important: Recommended update for suseconnect-ng Message-ID: <170850457533.16176.17858553158108744743@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0565-1 Rating: important References: * bsc#1219425 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-565=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-565=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-565=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-565=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-565=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-565=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-565=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-565=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-565=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-565=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-565=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-565=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-565=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Proxy 4.3 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * suseconnect-ruby-bindings-1.7.0~git0.5338270-150400.3.25.1 * suseconnect-ng-1.7.0~git0.5338270-150400.3.25.1 * libsuseconnect-1.7.0~git0.5338270-150400.3.25.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:17 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:17 -0000 Subject: SUSE-RU-2024:0564-1: important: Recommended update for suseconnect-ng Message-ID: <170850457719.16176.1095571196163852801@smelt2.prg2.suse.org> # Recommended update for suseconnect-ng Announcement ID: SUSE-RU-2024:0564-1 Rating: important References: * bsc#1219425 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for suseconnect-ng fixes the following issues: * Allow SUSEConnect on read write transactional systems (bsc#1219425) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-564=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-564=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-564=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ng-1.7.0~git0.5338270-150500.3.15.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150500.3.15.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * suseconnect-ng-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150500.3.15.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libsuseconnect-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ruby-bindings-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ng-1.7.0~git0.5338270-150500.3.15.1 * libsuseconnect-debuginfo-1.7.0~git0.5338270-150500.3.15.1 * suseconnect-ng-debuginfo-1.7.0~git0.5338270-150500.3.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:18 -0000 Subject: SUSE-RU-2024:0563-1: important: Recommended update for ffmpeg Message-ID: <170850457891.16176.9431314583229603109@smelt2.prg2.suse.org> # Recommended update for ffmpeg Announcement ID: SUSE-RU-2024:0563-1 Rating: important References: * bsc#1205435 Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for ffmpeg contains the following fixes: * Added `libavresample3` and `libavformat57` to subpackages for Package Hub SLE-15-SP5 (bsc#1205435) * Fix RPM package build with new `binutils` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-563=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-563=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-563=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-563=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-563=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-563=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-563=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-563=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-563=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-563=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-563=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-563=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-563=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-563=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-563=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-563=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavresample3-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavresample3-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavformat-devel-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavcodec-devel-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavresample3-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavresample3-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavresample3-3.4.2-150200.11.34.2 * libavcodec-devel-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat-devel-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libavresample3-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libavformat-devel-3.4.2-150200.11.34.2 * libavfilter6-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-private-devel-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libavfilter6-debuginfo-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * ffmpeg-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavdevice57-debuginfo-3.4.2-150200.11.34.2 * libavcodec-devel-3.4.2-150200.11.34.2 * libavdevice57-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * libavdevice-devel-3.4.2-150200.11.34.2 * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libavresample-devel-3.4.2-150200.11.34.2 * libavfilter-devel-3.4.2-150200.11.34.2 * openSUSE Leap 15.5 (x86_64) * libavcodec57-32bit-3.4.2-150200.11.34.2 * libavutil55-32bit-3.4.2-150200.11.34.2 * libavresample3-32bit-3.4.2-150200.11.34.2 * libpostproc54-32bit-debuginfo-3.4.2-150200.11.34.2 * libavdevice57-32bit-debuginfo-3.4.2-150200.11.34.2 * libswresample2-32bit-debuginfo-3.4.2-150200.11.34.2 * libavformat57-32bit-3.4.2-150200.11.34.2 * libavdevice57-32bit-3.4.2-150200.11.34.2 * libavfilter6-32bit-3.4.2-150200.11.34.2 * libavformat57-32bit-debuginfo-3.4.2-150200.11.34.2 * libavresample3-32bit-debuginfo-3.4.2-150200.11.34.2 * libswscale4-32bit-debuginfo-3.4.2-150200.11.34.2 * libswresample2-32bit-3.4.2-150200.11.34.2 * libavcodec57-32bit-debuginfo-3.4.2-150200.11.34.2 * libavutil55-32bit-debuginfo-3.4.2-150200.11.34.2 * libpostproc54-32bit-3.4.2-150200.11.34.2 * libswscale4-32bit-3.4.2-150200.11.34.2 * libavfilter6-32bit-debuginfo-3.4.2-150200.11.34.2 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libswresample2-3.4.2-150200.11.34.2 * libswscale4-3.4.2-150200.11.34.2 * libpostproc54-3.4.2-150200.11.34.2 * libpostproc54-debuginfo-3.4.2-150200.11.34.2 * libavutil55-debuginfo-3.4.2-150200.11.34.2 * libswresample-devel-3.4.2-150200.11.34.2 * libavutil55-3.4.2-150200.11.34.2 * libswresample2-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libswscale-devel-3.4.2-150200.11.34.2 * libavutil-devel-3.4.2-150200.11.34.2 * libswscale4-debuginfo-3.4.2-150200.11.34.2 * libpostproc-devel-3.4.2-150200.11.34.2 * libavcodec57-3.4.2-150200.11.34.2 * libavcodec57-debuginfo-3.4.2-150200.11.34.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * ffmpeg-debugsource-3.4.2-150200.11.34.2 * libavresample3-3.4.2-150200.11.34.2 * libavfilter6-debuginfo-3.4.2-150200.11.34.2 * libavdevice57-debuginfo-3.4.2-150200.11.34.2 * ffmpeg-debuginfo-3.4.2-150200.11.34.2 * libavformat57-3.4.2-150200.11.34.2 * ffmpeg-3.4.2-150200.11.34.2 * libavdevice57-3.4.2-150200.11.34.2 * libavformat57-debuginfo-3.4.2-150200.11.34.2 * libavfilter6-3.4.2-150200.11.34.2 * libavresample3-debuginfo-3.4.2-150200.11.34.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205435 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:20 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:20 -0000 Subject: SUSE-RU-2024:0562-1: important: Recommended update for openblas Message-ID: <170850458073.16176.13686892368058225351@smelt2.prg2.suse.org> # Recommended update for openblas Announcement ID: SUSE-RU-2024:0562-1 Rating: important References: * bsc#1217608 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 An update that has one fix can now be installed. ## Description: This update for openblas contains the following fixes: * Added `libopenblas_pthreads0` to Package Hub SLE-15-SP4 on architecture s390 (no source changes) (bsc#1217608) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-562=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-562=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2024-562=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-562=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-562=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-562=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-562=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-562=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-562=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-562=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-562=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libopenblas_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * openblas_pthreads-devel-static-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * libopenblas_serial0-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp-devel-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * libopenblas_serial0-debuginfo-0.3.20-150400.4.2.1 * openblas-pthreads_0_3_20-gnu-hpc-devel-static-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas-pthreads_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * openblas_serial-devel-static-0.3.20-150400.4.2.1 * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas-gnu-hpc-0.3.20-150400.4.2.1 * libopenblas-pthreads-gnu-hpc-devel-0.3.20-150400.4.2.1 * openblas_openmp-devel-static-0.3.20-150400.4.2.1 * libopenblas-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * libopenblas_serial-devel-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * openblas_0_3_20-gnu-hpc-devel-static-0.3.20-150400.4.2.1 * libopenblas-pthreads-gnu-hpc-0.3.20-150400.4.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libopenblas_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas_0_3_20-gnu-hpc-devel-static-0.3.20-150400.4.2.1 * openblas_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * openblas-pthreads_0_3_20-gnu-hpc-devel-static-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas-pthreads_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * SUSE Package Hub 15 15-SP4 (s390x) * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libopenblas_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas-pthreads_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas-gnu-hpc-0.3.20-150400.4.2.1 * libopenblas-pthreads-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * libopenblas-pthreads-gnu-hpc-0.3.20-150400.4.2.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libopenblas_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-0.3.20-150400.4.2.1 * openblas-pthreads_0_3_20-gnu-hpc-debugsource-0.3.20-150400.4.2.1 * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas-gnu-hpc-0.3.20-150400.4.2.1 * libopenblas-pthreads-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas-gnu-hpc-devel-0.3.20-150400.4.2.1 * libopenblas-pthreads_0_3_20-gnu-hpc-devel-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * libopenblas_0_3_20-gnu-hpc-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * libopenblas-pthreads-gnu-hpc-0.3.20-150400.4.2.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openblas_serial-debugsource-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * libopenblas_openmp-devel-0.3.20-150400.4.2.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * SUSE Manager Proxy 4.3 (x86_64) * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openblas_serial-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openblas_serial-debugsource-0.3.20-150400.4.2.1 * openblas_openmp-debugsource-0.3.20-150400.4.2.1 * libopenblas_openmp0-0.3.20-150400.4.2.1 * libopenblas_openmp0-debuginfo-0.3.20-150400.4.2.1 * openblas-common-devel-0.3.20-150400.4.2.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * openblas_pthreads-debugsource-0.3.20-150400.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.20-150400.4.2.1 * libopenblas_pthreads0-0.3.20-150400.4.2.1 * libopenblas_pthreads-devel-0.3.20-150400.4.2.1 * SUSE Manager Server 4.3 (s390x) * libopenblas_openmp-devel-0.3.20-150400.4.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217608 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:22 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:22 -0000 Subject: SUSE-RU-2024:0561-1: important: Recommended update for openblas Message-ID: <170850458258.16176.4876494731627213896@smelt2.prg2.suse.org> # Recommended update for openblas Announcement ID: SUSE-RU-2024:0561-1 Rating: important References: * bsc#1217608 Affected Products: * Basesystem Module 15-SP5 * HPC Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for openblas contains the following fixes: * Added `libopenblas_pthreads0` to Package Hub SLE-15-SP5 for architecture s390 (no source changes) (bsc#1217608) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-561=1 openSUSE-SLE-15.5-2024-561=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-561=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-561=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-561=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libopenblas-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu12-hpc-0.3.21-150500.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.21-150500.4.2.1 * openblas_pthreads-debugsource-0.3.21-150500.4.2.1 * openblas_serial-debugsource-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu12-hpc-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu12-hpc-debuginfo-0.3.21-150500.4.2.1 * libopenblas_serial0-0.3.21-150500.4.2.1 * openblas-common-devel-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu-hpc-0.3.21-150500.4.2.1 * openblas_0_3_21-gnu12-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu12-hpc-debuginfo-0.3.21-150500.4.2.1 * libopenblas_serial-devel-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu-hpc-0.3.21-150500.4.2.1 * openblas_openmp-debugsource-0.3.21-150500.4.2.1 * libopenblas_openmp0-debuginfo-0.3.21-150500.4.2.1 * libopenblas_pthreads-devel-0.3.21-150500.4.2.1 * libopenblas_openmp-devel-0.3.21-150500.4.2.1 * libopenblas-gnu12-hpc-devel-0.3.21-150500.4.2.1 * libopenblas_openmp0-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu12-hpc-devel-0.3.21-150500.4.2.1 * openblas_0_3_21-gnu-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu12-hpc-devel-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu-hpc-debugsource-0.3.21-150500.4.2.1 * openblas_openmp-devel-static-0.3.21-150500.4.2.1 * libopenblas_pthreads0-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu-hpc-devel-static-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu-hpc-debuginfo-0.3.21-150500.4.2.1 * openblas_0_3_21-gnu-hpc-devel-static-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu12-hpc-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu12-hpc-devel-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu-hpc-debuginfo-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu12-hpc-devel-static-0.3.21-150500.4.2.1 * openblas_pthreads-devel-static-0.3.21-150500.4.2.1 * libopenblas_serial0-debuginfo-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas-gnu12-hpc-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu12-hpc-debugsource-0.3.21-150500.4.2.1 * openblas_0_3_21-gnu12-hpc-devel-static-0.3.21-150500.4.2.1 * openblas_serial-devel-static-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu-hpc-devel-0.3.21-150500.4.2.1 * openSUSE Leap 15.5 (x86_64) * libopenblas_pthreads0-32bit-0.3.21-150500.4.2.1 * libopenblas_serial0-32bit-debuginfo-0.3.21-150500.4.2.1 * libopenblas_openmp0-32bit-debuginfo-0.3.21-150500.4.2.1 * libopenblas_serial-devel-32bit-0.3.21-150500.4.2.1 * libopenblas_pthreads0-32bit-debuginfo-0.3.21-150500.4.2.1 * libopenblas_openmp0-32bit-0.3.21-150500.4.2.1 * libopenblas_serial0-32bit-0.3.21-150500.4.2.1 * libopenblas_pthreads-devel-32bit-0.3.21-150500.4.2.1 * libopenblas_openmp-devel-32bit-0.3.21-150500.4.2.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libopenblas_openmp0-64bit-debuginfo-0.3.21-150500.4.2.1 * libopenblas_pthreads-devel-64bit-0.3.21-150500.4.2.1 * libopenblas_pthreads0-64bit-0.3.21-150500.4.2.1 * libopenblas_pthreads0-64bit-debuginfo-0.3.21-150500.4.2.1 * libopenblas_serial0-64bit-debuginfo-0.3.21-150500.4.2.1 * libopenblas_openmp-devel-64bit-0.3.21-150500.4.2.1 * libopenblas_openmp0-64bit-0.3.21-150500.4.2.1 * libopenblas_serial-devel-64bit-0.3.21-150500.4.2.1 * libopenblas_serial0-64bit-0.3.21-150500.4.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openblas_openmp-debugsource-0.3.21-150500.4.2.1 * libopenblas_openmp0-debuginfo-0.3.21-150500.4.2.1 * openblas_serial-debugsource-0.3.21-150500.4.2.1 * libopenblas_openmp0-0.3.21-150500.4.2.1 * openblas-common-devel-0.3.21-150500.4.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le x86_64) * libopenblas_pthreads0-0.3.21-150500.4.2.1 * openblas_pthreads-debugsource-0.3.21-150500.4.2.1 * libopenblas_pthreads0-debuginfo-0.3.21-150500.4.2.1 * libopenblas_pthreads-devel-0.3.21-150500.4.2.1 * Basesystem Module 15-SP5 (s390x) * libopenblas_openmp-devel-0.3.21-150500.4.2.1 * HPC Module 15-SP5 (aarch64 x86_64) * libopenblas-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu12-hpc-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu12-hpc-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu12-hpc-debuginfo-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu-hpc-0.3.21-150500.4.2.1 * openblas_0_3_21-gnu12-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu12-hpc-debuginfo-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas-gnu12-hpc-devel-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu12-hpc-devel-0.3.21-150500.4.2.1 * openblas_0_3_21-gnu-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu12-hpc-devel-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu-hpc-debuginfo-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu12-hpc-0.3.21-150500.4.2.1 * libopenblas-pthreads_0_3_21-gnu12-hpc-devel-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu-hpc-debuginfo-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas-gnu12-hpc-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu12-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas_0_3_21-gnu-hpc-devel-0.3.21-150500.4.2.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * openblas_0_3_21-gnu-hpc-debugsource-0.3.21-150500.4.2.1 * openblas-pthreads_0_3_21-gnu-hpc-debugsource-0.3.21-150500.4.2.1 * libopenblas-gnu-hpc-devel-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas-gnu-hpc-0.3.21-150500.4.2.1 * libopenblas-pthreads-gnu-hpc-devel-0.3.21-150500.4.2.1 * SUSE Package Hub 15 15-SP5 (s390x) * libopenblas_pthreads0-debuginfo-0.3.21-150500.4.2.1 * libopenblas_pthreads0-0.3.21-150500.4.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217608 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:24 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:24 -0000 Subject: SUSE-RU-2024:0560-1: moderate: Recommended update for Java Message-ID: <170850458451.16176.10973482741328670925@smelt2.prg2.suse.org> # Recommended update for Java Announcement ID: SUSE-RU-2024:0560-1 Rating: moderate References: * bsc#1215973 Cross-References: * CVE-2023-37460 CVSS scores: * CVE-2023-37460 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-37460 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for Java fixes the following issues: plexus-archiver was updated from version 4.2.1 to 4.8.0: * Changes of 4.8.0: * Security issues fixed: * CVE-2023-37460: Avoid override target symlink by standard file in AbstractUnArchiver (bsc#1215973) * New features and improvements: * Added tzst alias for tar.zst archiver/unarchived * Bugs fixed: * Detect permissions for addFile * Maintenance: * Removed public modifier from JUnit 5 tests * Use https in scm/url * Removed junit-jupiter-engine from project dependencies * Removed parent and reports menu from site * Cleanup after "veryLargeJar" test * Override project.url * Changes of 4.7.1: * Bugs fixed: * Don't apply umask on unknown perms (Win) * Changes of 4.7.0: * New features and improvements: * add umask support and use 022 in RB mode * Use NIO Files for creating temporary files * Deprecate the JAR Index feature (JDK-8302819) * Added Archiver aliases for tar.* * Maintenance: * Use JUnit TempDir to manage temporary files in tests * Override uId and gId for Tar in test * Bump maven-resources-plugin from 2.7 to 3.3.1 * Changes of 4.6.3: * New features and improvements: * Fixed path traversal vulnerability The vulnerability affects only directories whose name begins with the same prefix as the destination directory. For example malicious archive may extract file in /opt/directory instead of /opt/dir. * Changes of 4.6.2: * Bugs fixed: * Fixed regression in handling symbolic links * Changes of 4.6.1: * Bugs fixed: * Normalize file separators before warning about equal archive entries * Changes of 4.6.0: * New features and improvements: * keep file/directory permissions in Reproducible Builds mode * Changes of 4.5.0: * New features and improvements: * Added zstd (un)archiver support * Bugs fixed: * Fixed UnArchiver#isOverwrite not working as expected * Changes of 4.4.0: * New features and improvements: * Drop legacy plexus API and use only JSR330 components * Changes of 4.3.0: * New features and improvements: * Require Java 8 * Refactor to use FileTime API * Rename setTime method to setZipEntryTime * Convert InputStreamSupplier to lambdas * Bugs fixed: * Reproducible Builds not working when using modular jar * Changes of 4.2.7: * New features and improvements: * Respect order of META-INF/ and META-INF/MANIFEST.MF entries in a JAR file * Changes of 4.2.6: * New features and improvements: * FileInputStream, FileOutputStream, FileReader and FileWriter are no longer used * Code cleanup * Changes of 4.2.5: * New features and improvements: * Speed improvements * Bugs fixed: * Fixed use of a mismatching Unicode path extra field in zip unarchiving * Changes of 4.2.4: * Bugs fixed: * Fixed unjustified warning about casing for directory entries * Changes of 4.2.2: * Bugs fixed: * DirectoryArchiver fails for symlinks if a parent directory doesn't exist objectweb-asm was updated to version 9.6: * Changes of version 9.6: * New Opcodes.V22 constant for Java 22 * Bugs fixed: * Analyzer produces frames that have different locals than those detected by JRE bytecode verifier * Invalid stackmap generated when the instruction stream has new instruction after invokespecial to * Analyzer can fail to catch thrown exceptions * `asm-analysis` Frame allocates an array unnecessarily inside `executeInvokeInsn` * Fixed bug in `CheckFrameAnalyzer` with static methods * Changes of version 9.5: * New Opcodes.V21 constant for Java 21 * New readBytecodeInstructionOffset hook in ClassReader * Added more detailed exception messages * Javadoc improvements and fixes * Bugs fixed: * Silent removal of zero-valued entries from the line-number table * Changes of version 9.4: * Changes: * New Opcodes.V20 constant for Java 20 * Added more checks in CheckClassAdapter * Javadoc improvements and fixes * `module-info` classes can be built without Gradle and Bnd * Parent POM updated to `org.ow2:ow2:1.5.1` * Bugs fixed: +`CheckClassAdapter` is no longer transparent for MAXLOCALS \+ Added public `getDelegate` method to all visitor classes \+ Analyzer does not compute optimal maxLocals for static methods \+ Fixed `SignatureWriter` when a generic type has a depth over 30 \+ Skip remap inner class name if not changed in Remapper maven-archiver was updated from version 3.5.0 to 3.6.1: * Changes of 3.6.1: * New Features: * Deprecated the JAR Index feature (JDK-8302819) * Task: * Refreshed download page * Prefer JDK features over plexus-utils, plexus-io * Changes of 3.6.0: * Task: * Require Java 8 * Drop m-shared-utils from deps maven-assembly-plugin was updated from version 3.3.0 to 3.6.0: * Changes of 3.6.0: * Bugs fixed: * finalName as readonly parameter makes common usecases very complicated * Symbolic links get copied with absolute path * Warning if using Maven 3.9.1 * Minimal default Manifest configuration of jar archiver should be respected * New Features: * Support Zstandard compression format * Improvements: * In RB mode, apply 022 umask to ignore environment group write umask * Added system requirements history * Task: * Dropped deprecated repository element * Support running build on Java 20 * Refresh download page * Cleanup declared dependencies * Avoid using deprecated methods of `plexus-archiver` * Changes of 3.5.0: * Bugs fixed: * File permissions removed during assembly:single since 3.2.0 * Changes of 3.4.2: * Bugs fixed: * Fixed Excludes filtering * Task: * Fixed examples to refer to https instead of http * Changes of 3.4.1: * Bugs fixed: * Fixed error build with shared assemblies * Changes of 3.4.0: * Bugs fixed: * dependencySet includes filter with classifier breaks include of artifacts without classifier * Task: * Speed improvements * Update plugin (requires Maven 3.2.5+) * Assembly plugin resolves too much, even plugins used to build dependencies * Deprecated the repository element in assembly descriptor * Upgraded to Java 8, drop unused dependencies maven-common-artifact-filters was updated from version 3.0.1 to 3.3.2: * Changes of 3.3.2: * Bugs fixed: * PatternIncludesArtifactFilters raising NPE for patterns w/ wildcards and artifactoid w/ null on any coordinate * Changes of 3.3.1: * Bugs fixed: * Pattern w/ 4 elements may be GATV or GATC * Changes of 3.3.0: * Bugs fixed: * null passed to DependencyFilter in EclipseAetherFilterTransformerTest * PatternIncludesArtifactFilter#include(Artifact) * Common Artifact Filters pattern parsing with classifier is broken * Task: * Sanitized dependencies * Upgraded to Maven Parent 36, to Maven 3.2.5, to Java 8 and clean up dependencies * Changes of 3.2.0: * Improvements: * Big speed improvements for patterns that do not contain any wildcard * Changes of 3.1.1: * Bugs fixed: * Updated JIRA URL for maven-common-artifact-filters * Improvements: * Made build Reproducible * Changes of 3.1.0: * Bugs fixed: * Several filters do not preserve order of artifacts filtered maven-compiler-plugin was updated from version 3.10.1 to 3.11.0: Changes of 3.11.0: * New features and improvements: * Added a useModulePath switch to the testCompile mojo * Allow dependency exclusions for 'annotationProcessorPaths' * Use maven-resolver to resolve 'annotationProcessorPaths' dependencies * Upgrade plexus-compiler to improve compiling message * compileSourceRoots parameter should be writable * Change showWarnings to true by default * Warn about warn-config conflicting values * Update default source/target from 1.7 to 1.8 * Display recompilation causes * Added some parameter to pattern from stale source calculation * Added dedicated option for implicit javac flag * Bugs fixed: * Fixed incorrect detection of dependency change * Test with Maven 3.9.0 and fix the failing IT * Resolved all annotation processor dependencies together * Defining maven.compiler.release as empty string ends with NumberFormatException in testCompileMojo * Fixed missing dirs in createMissingPackageInfoClasses * Set Xcludes in config passed to actual compiler maven-dependency-analyzer was updated from version 1.10 to 1.13.2: * Changes of 1.13.2: * Changes and bugs fixed: * Made mvn dependency:analyze work with OpenJDK 11 * Fixed jdk8 incompatibility at runtime (NoSuchMethodError) * Upgraded asm to 8.0.1 * Use try with resources to avoid leaks * dependency:analyze recommends test scope for test-only artifacts that have non-test scope * remove reference to deprecated public mutable field * Updated JIRA URL * dependency:analyze should recommend narrower scope where possible * Remove dependency on jmock * Inline deprecated field * Added more JavaDoc * Handle different classes from same artifact used by model and test code * Included class names in used undeclared dependencies * Check maximum allowed Maven version * Get rid of maven-plugin-testing-tools for IT test * Require Maven 3.2.5+ * Analyze project classes only once * Fixed array parsing * CONSTANT_METHOD_TYPE should not add to classes * Inner classes are in same compilation unit as container class * Upgraded Parent to 36 * Cleanup IT tests * Replace Codehaus Plexus utils with java.nio.file.Files and Apache Commons * Fixed bug with "non-test scoped test only dependencies found" * Bump asm from 9.4 to 9.5 * Refresh download page * Upgrade Parent to 39 * Build on JDK 19, 20 * Prefer JDK classes to Plexus utils * Replaced System.out by logger * Fixed java.lang.RuntimeException: Unknown constant pool type * Switched to JUnit 5 * Dependency improvements maven-dependency-plugin was updated from version 3.1.2 to 3.6.0: * Changes in 3.6.0: * Bugs fixed: * Obsolete example of -Dverbose on web page * Unsupported verbose option still appears in docs * dependency:go-offline does not use repositories from parent pom in reactor build * Fixed possible NPE * `dependency:analyze-only` goal fails on OpenJDK 14 * FileWriter and FileReader should be replaced * Dependency Plugin go-offline doesn't respect artifact classifier * analyze-only failed: Unsupported class file major version 60 (Java 16) * analyze-only failed: Unsupported class file major version 61 (Java 17) * copy-dependencies fails when using excludeScope=test * mvn dependency:analyze detected wrong transitive dependency * dependency plugin does not work with JDK 16 * skip dependency analyze in ear packaging * Non-test dependency reported as Non-test scoped test only dependency * 'Dependency not found' with 3.2.0 and Java-17 while analyzing * Tree plugin does not terminate with 3.2.0 * Minor improvement - continue * analyze-only failed: PermittedSubclasses requires ASM9 * Broken Link to "Introduction to Dependency Mechanism Page" * Sealed classes not supported * Dependency tree in verbose mode for war is empty * Javadoc was not updated to reflect that :tree's verbose option is now ok * error dependency:list (caused by postgresql dependency) * :list-classes does not skip if skip is set * :list-classes does not use GAV parameters * New Features: * Reintroduce the verbose option for dependency:tree * List classes in a given artifact * dependency:analyze should recommend narrower scope where possible * Added analyze parameter "ignoreUnusedRuntime" * Allow ignoring non-test-scoped dependencies * Added a option to unpack goals * Allow auto-ignore of all non-test scoped dependencies used only in test scope * Improvements: * Unused method o.a.m.p.d.t.TreeMojo.containsVersion * Minor improvements * GitHub Action build improvement * dependency:analyze should list the classes that cause a used undeclared dependency * Improve documentation of analyze - Non-test scoped * Turn warnings into errors instead of failOnWarning * maven-dependency-plugin should leverage plexus-build-api to support IDEs * TestListClassesMojo logs too much * Use outputDirectory from AbstractMavenReport * Removed not used dependencies / Replace parts * list-repositories - improvements * warns about depending on plexus-container-default * Replace AnalyzeReportView with a new AnalyzeReportRenderer * Task: * Removed no longer required exclusions * Java 1.8 as minimum * Explicitly start and end tables with Doxia Sinks in report renderers * Replace Maven shared StringUtils with Commons Lang3 * Removed unused and ignored parameter - useJvmChmod * Removed custom plexus configuration * Code refactor - UnpackUtil * Refresh download page maven-dependency-tree was updated from version 3.0.1 to 3.2.1: * Changes in 3.2.1: * Bugs fixed: * DependencyCollectorBuilder does not collect dependencies when artifact has 'war' packaging * Transitive provided dependencies are not removed from collected dependency graph * New Features: * DependencyCollectorBuilder more configurable * Improvements: * DependencyGraphBuilder does not provide verbose tree * DependencyGraphBuilders shouldn't need reactorProjects for resolving dependencies * Maven31DependencyGraphBuilder should not download dependencies other than the pom * Fixed `plexus-component-annotation` in line with `plexus-component-metadata` * Upgraded parent to 31 * Added functionality to collect raw dependencies in Maven 3+ * Annotate DependencyNodes with dependency management metadata * Require Java 8 * Upgrade `org.eclipse.aether:aether-util` dependency in org.apache.maven.shared:maven-dependency-tree * Added Exclusions to DependencyNode * Made build Reproducible * Migrate plexus component to JSR-330 * Drop maven 3.0 compatibility * Dependency upgrade: * Upgrade shared-component to version 33 * Upgrade Parent to 36 * Bump maven-shared-components from 36 to 37 * Removed unnecessary dependency on xmvn tools and parent pom maven-enforcer was updated to version 3.4.1: * Update to version 3.4.1: * Bugs fixed: * In a multi module project "bannedDependencies" rule tries to resolve project artifacts from external repository * Require Release Dependencies ignorant about aggregator build * banDuplicatePomDependencyVersions does not check managementDependencies * Beanshell rule is not thread-safe * RequireSnapshotVersion not compatible with CI Friendly Versions (${revision}) * NPE when using new syntax with maven-enforcer-plugin * Broken links on Maven Enforcer Plugin site * RequirePluginVersions not recognizing versions-from-properties * [REGRESSION] RequirePluginVersions fails when versions are inherited * requireFilesExist rule should be case sensitive * Broken Links on Project Home Page * TestRequireOS uses hamcrest via transitive dependency * plexus-container-default in enforcer-api is very outdated * classifier not included in output of failes RequireUpperBoundDeps test * Exclusions are not considered when looking at parent for requireReleaseDeps * requireUpperBoundDeps does not fail when packaging is 'war' * DependencyConvergence in 3.0.0 fails on provided scoped dependencies * NPE on requireReleaseDeps with non-matching includes * RequireUpperBoundDeps now follow scope provided transitive dependencies * Use currently build artifacts in IT tests * requireReleaseDeps does not support optional dependencies or runtime scope * Enforcer 3.0.0 breaks with Maven 3.8.4 * Version 3.1.0 is not enforcing bannedDependencies rules * DependencyConvergence treats provided dependencies are runtime dependencies * Plugin shouldn't use NullPointerException for non-exceptional code flow * NPE in RequirePluginVersions * ReactorModuleConvergence not cached in reactor * RequireUpperBoundDeps fails on provided dependencies since 3.2.1 * Problematic dependency resolution by new 'banDynamicVersions' rule * banTransitiveDependencies: failing if a transitive dependencies has another version than the resolved one * Filtering dependency tree by scope * Upgrading to 3.0.0 causes 'Could not build dependency tree' with repositories some unknown protocol * DependencyConvergence in 3.1.0 fails when using version ranges * Semantics of 'ignores' parameter of 'banDynamicVersions' is inverted * Omission of 'excludedScopes' parameter of 'banDynamicVersions' causes NPE * ENFORCER: plugin-info and mojo pages not found * New Features: * requireUpperBounds deps should have includes * Introduce RequireTextFileChecksum with line separator normalization * allow no rules * show rules processed * DependencyConvergence should support including/excluding certain dependencies * Support declaring external banned dependencies in an external file/URL * Maven enforcer rule which checks that all dependencies have an explicit scope set * Maven enforcer rule which checks that all dependencies in dependencyManagement don't have an explicit scope set * Rule for no version ranges, version placeholders or SNAPSHOT versions * Allow one of many files in RequireFiles rules to pass * Skip specific rules * New Enforcer API * New Enforcer API - RuleConfigProvider * Move Built-In Rules to new API * Improvements: * wildcard ignore in requireReleaseDeps * Improve documentation about writing own Enforcer Rule * RequireActiveProfile should respect inherited activated profiles * Upgrade maven-dependency-tree to 3.x * Improve dependency resolving in multiple modules project * requireUpperBoundDeps: add [] and colors to the output * Example for writing a custom rule should be upgraded * Along with JavaVersion, allow enforcement of the JavaVendor * Included Java vendor in display-info output * requireMavenVersion x.y.z is processed as (,x.y.z] instead of [x.y.z,) * Consistently format artifacts same as dependency:tree * Made build Reproducible * Added support for excludes/includes in requireJavaVendor rule * Introduce Maven Enforcer Extension * Extends RequirePluginVersions with banMavenDefaults * Shared GitHub Actions * Log at ERROR level when is set * Reuse getDependenciesToCheck results across rules * Violation messages can be really hard to find in a multi module project * Clarify class loading for custom Enforcer rules * Using junit jupiter bom instead of single artifacts. * Get rid of maven-dependency-tree dependency * Allow 8 as JDK version for requireJavaVersion * Improve error message for rule "requireJavaVersion" * Include Java Home in Message for Java Rule Failures * Manage all Maven Core dependencies as provided * Mange rules configuration by plugin * Deprecate 'rules' property and introduce 'enforcer.rules' as a replacement * Change success message from executed to passed * EnforcerLogger: Provide isDebugEnabled(), isErrorEnabled(), isWarnEnabled() and isInfoEnabled() * Properly declare dependencies * Test: * Regression test for dependency convergence problem fixed in 3.0.0 * Task: * Removed reference to travis or switch to travis.com * Fixed maven assembly links * Require Java 8 * Verify working with Maven 4 * Code cleanup * Refresh download page * Deprecate display-info mojo * Refresh site descriptors * Superfluous blanks in BanDuplicatePomDependencyVersions * Rename ResolveUtil to ResolverUtil maven-plugin-tools was updated from version 3.6.0 to version 3.9.0: * Changes of version 3.9.0: * Bugs fixed: * Fixed *-mojo.xml (in PluginXdocGenerator) is overwritten when multiple locales are defined * Generated table by PluginXdocGenerator does not contain default attributes * Improvements: * Omit empty line in generated help goal output if plugin description is empty * Use Plexus I18N rather than fiddling with * Task: * Removed reporting from maven-plugin-plugin: create maven-plugin-report-plugin * Dependency upgrade: * Upgrade plugins and components (in ITs) * Changes of version 3.8.2: * Improvements: * Used Resolver API, get rid of localRepository * Dependency upgrade: * Bump httpcore from 4.4.15 to 4.4.16 * Bump httpclient from 4.5.13 to 4.5.14 * Bump antVersion from 1.10.12 to 1.10.13 * Bump slf4jVersion from 1.7.5 to 1.7.36 * Bump plexus-java from 1.1.1 to 1.1.2 * Bump plexus-archiver from 4.6.1 to 4.6.3 * Bump jsoup from 1.15.3 to 1.15.4 * Bump asmVersion from 9.4 to 9.5 * Bump assertj-core from 3.23.1 to 3.24.2 * Changes of version 3.8.1: * Bugs fixed: * Javadoc reference containing a link label with spaces are not detected * JavadocLinkGenerator.createLink: Support nested binary class names * ERROR during build of m-plugin-report-p and m-plugin-p: Dependencies in wrong scope * "Executes as an aggregator plugin" documentation: s/plugin/goal/ * Maven scope warning should be logged at WARN level * Fixed Temporary File Information Disclosure Vulnerability * New features: * Support mojos using the new maven v4 api * Improvements: * Plugin descriptor should contain the requiredJavaVersion/requiredMavenVersion * Execute annotation only supports standard lifecycle phases due to use of enum * Clarify deprecation of all extractors but the maven-plugin-tools-annotations * Dependency upgrade: * Update to Maven Parent POM 39 * Bump junit-bom from 5.9.1 to 5.9.2 * Bump plexus-archiver from 4.5.0 to 4.6.1 * Changes of version 3.7.1: * Bugs fixed: * Maven scope warning should be logged at WARN level * Changes of version 3.7.0: * Bugs fixed: * The plugin descriptor generated by plugin:descriptor does not consider @ see javadoc taglets * Report-Mojo doesn't respect input encoding * Generating site reports for plugin results in NoSuchMethodError * JDK Requirements in plugin-info.html: Consider property "maven.compiler.release" * Parameters documentation inheriting @ since from Mojo can be confusing * Don't emit warning for missing javadoc URL of primitives * Don't emit warning for missing javadoc URI if no javadoc sources are configured * Parameter description should be taken from annotated item * New Features: * Added link to javadoc in configuration description page for user defined types of Mojos. * Allow only @ Deprecated annotation without @ deprecated javadoc tag * add system requirements history section * report: allow to generate usage section in plugin-info.html with true * Allow @ Parameter on setters methods * Extract plugin report into its own plugin * report: Expose generics information of Collection and Map types * Improvement: * plugin-info.html should contain a better Usage section * Do not overwrite generate files with no content change * Upgrade to JUnit 5 and @ Inject annotations * Support for java 20 - ASM 9.4 * Don't print empty Memory, Disk Space in System Requirements * simplification in helpmojo build * Get rid of plexus-compiler-manager from tests * Use Maven core artifacts in provided scope * report and descriptor goal need to evaluate Javadoc comments differently * Allow to reference aggregator javadoc from plugin report * Task: * Detect legacy/javadoc Mojo definitions, warn to use Java 5 annotations * Update level to Java 8 * Deprecate scripting support for mojos * Deprecate requirements parameter in report Mojo * Removed duplicate code from PluginReport * Prepare for Doxia (Sitetools) 2.0.0 * Fixed documentation for maven-plugin-report-plugin * Removed deprecated items from new maven-plugin-report-plugin * Improve site build * Improve dependency management * Plugin generator generation fails when the parent class comes from a different project * Dependency upgrade: * Upgrade Maven Reporting API/Impl to 3.1.0 * Upgrade Parent to 36 * Upgrade project dependencies after JDK 1.8 * Bump maven-parent from 36 to 37 * Upgrade Maven Reporting API to 3.1.1/Maven Reporting Impl to 3.2.0 * Upgrade plexus-utils to 3.5.0 * Changes of version 3.6.4: * Restored compatibility with Maven 3 ecosystem * Upgraded dependencies * Changes of version 3.6.3: * Added prerequisites to plugin pom * Exclude dependency in provided scope from plugin descriptor * Get rid of String.format use * Fixed this logging as well * Simplify documentation * Exclude maven-archiver and maven-jxr from warning * Changes of version 3.6.2: * Deprecated unused requiresReports flag * Check that Maven dependencies are provided scope * Update ITs * Use shared gh action * Deprecate unsupported Mojo descriptor items * Weed out ITs * Upgrade to maven 3.x and avoid using deprecated API * Drop legacy dependencies * Use shared gh action - v1 * Fixed wording in javadoc * Changes of version 3.6.1: * What's Changed: * Added missing @OverRide and make methods static * Upgraded to JUnit 4.12 * Upgraded parent POM and other dependencies * Updated plugins * Upgraded Doxia Sitetools to 1.9.2 to remove dependency on Struts * removed Maven 2 info * Removed unneeded dependency * Tighten the dependency tree * Ignore .checkstyle * Strict dependencies for maven-plugin-tools-annotations * Improved @execute(goal...) docs * Improve @execute(lifecycle...) docs plexus-compiler was updated from version 2.11.1 to 2.14.2: * Changes of 2.14.2: * Removed: * Drop J2ObjC compiler * New features and improvements: * Update AspectJ Compiler to 1.9.21 to support Java 21 * Require JDK 17 for build * Improve locking on JavacCompiler * Include 'parameter' and 'preview' describe log * Switch to SISU annotations and plugin, fixes #217 * Support jdk 21 * Require Maven 3.5.4+ * Require Java 11 for plexus-compiler-eclipse an javac-errorprone and aspectj compilers * Added support to run its with Java 20 * Bugs fixed: * Fixed javac memory leak * Validate zip file names before extracting (Zip Slip) * Restore AbstractCompiler#getLogger() method * Return empty list for not existing source root location * Improve javac error output parsing * Changes of 2.13.0: * New features and improvements: * Fully ignore any possible jdk bug * MCOMPILER-402: Added implicitOption to CompilerConfiguration * Added a custom compile argument replaceProcessorPathWithProcessorModulePath to force the plugin replace processorPath with processormodulepath * describe compiler configuration on run * simplify "Compiling" info message: display relative path * Bugs fixed: * Respect CompilerConfiguration.sourceFiles in EclipseJavaCompiler * Avoid NPE in AspectJCompilerTest on AspectJ 1.9.8+ * Dependency updates: * Bump maven-surefire-plugin from 3.0.0-M5 to 3.0.0-M6 * Bump error_prone_core from 2.11.0 to 2.13.1 * Bump github/codeql-action from 1 to 2 * Bump ecj from 3.28.0 to 3.29.0 * Bump release-drafter/release-drafter from 5.18.1 to 5.19.0 * Bump ecj from 3.29.0 to 3.30.0 * Bump maven-invoker-plugin from 3.2.2 to 3.3.0 * Bump maven-enforcer-plugin from 3.0.0 to 3.1.0 * Bump error_prone_core from 2.13.1 to 2.14.0 * Bump maven-surefire-plugin from 3.0.0-M6 to 3.0.0-M7 * Bump ecj from 3.31.0 to 3.32.0 * Bump junit-bom from 5.9.0 to 5.9.1 * Bump ecj from 3.30.0 to 3.31.0 * Bump groovy from 3.0.12 to 3.0.13 * Bump groovy-json from 3.0.12 to 3.0.13 * Bump groovy-xml from 3.0.12 to 3.0.13 * Bump animal-sniffer-maven-plugin from 1.21 to 1.22 * Bump error_prone_core from 2.14.0 to 2.15.0 * Bump junit-bom from 5.8.2 to 5.9.0 * Bump groovy-xml from 3.0.11 to 3.0.12 * Bump groovy-json from 3.0.11 to 3.0.12 * Bump groovy from 3.0.11 to 3.0.12 * Maintenance: * Require Maven 3.2.5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-560=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-560=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-560=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-560=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-560=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-560=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-560=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-560=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-560=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-560=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-560=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-560=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-560=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-560=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-560=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-560=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-560=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-560=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-560=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Manager Proxy 4.3 (noarch) * objectweb-asm-9.6-150200.3.11.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * objectweb-asm-9.6-150200.3.11.3 * SUSE Manager Server 4.3 (noarch) * objectweb-asm-9.6-150200.3.11.3 * SUSE Enterprise Storage 7.1 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * openSUSE Leap 15.5 (noarch) * maven-dependency-analyzer-1.13.2-150200.3.7.2 * maven-enforcer-javadoc-3.4.1-150200.3.7.2 * maven-common-artifact-filters-javadoc-3.3.2-150200.3.7.3 * maven-dependency-analyzer-javadoc-1.13.2-150200.3.7.2 * maven-plugin-tools-annotations-3.9.0-150200.3.7.3 * maven-dependency-plugin-3.6.0-150200.3.7.2 * maven-enforcer-api-3.4.1-150200.3.7.2 * maven-plugin-tools-beanshell-3.9.0-150200.3.7.3 * maven-enforcer-rules-3.4.1-150200.3.7.2 * plexus-compiler-javadoc-2.14.2-150200.3.9.2 * maven-archiver-javadoc-3.6.1-150200.3.7.3 * objectweb-asm-javadoc-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-assembly-plugin-3.6.0-150200.3.7.2 * maven-plugin-tools-ant-3.9.0-150200.3.7.3 * maven-plugin-plugin-javadoc-3.9.0-150200.3.7.5 * maven-enforcer-plugin-3.4.1-150200.3.7.2 * maven-assembly-plugin-javadoc-3.6.0-150200.3.7.2 * maven-plugin-tools-api-3.9.0-150200.3.7.3 * maven-plugin-tools-javadoc-3.9.0-150200.3.7.3 * maven-compiler-plugin-3.11.0-150200.3.7.1 * maven-dependency-plugin-javadoc-3.6.0-150200.3.7.2 * maven-plugin-plugin-3.9.0-150200.3.7.5 * maven-plugin-plugin-bootstrap-3.9.0-150200.3.7.1 * maven-plugin-tools-model-3.9.0-150200.3.7.3 * plexus-archiver-4.8.0-150200.3.7.2 * maven-script-ant-3.9.0-150200.3.7.3 * plexus-archiver-javadoc-4.8.0-150200.3.7.2 * maven-dependency-tree-javadoc-3.2.1-150200.3.7.2 * maven-plugin-tools-generators-3.9.0-150200.3.7.3 * maven-dependency-tree-3.2.1-150200.3.7.2 * maven-plugin-tools-java-3.9.0-150200.3.7.3 * plexus-compiler-extras-2.14.2-150200.3.9.2 * maven-compiler-plugin-javadoc-3.11.0-150200.3.7.1 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * maven-compiler-plugin-bootstrap-3.11.0-150200.3.7.1 * maven-enforcer-3.4.1-150200.3.7.2 * objectweb-asm-9.6-150200.3.11.3 * maven-plugin-annotations-3.9.0-150200.3.7.3 * maven-script-beanshell-3.9.0-150200.3.7.3 * Basesystem Module 15-SP5 (noarch) * objectweb-asm-9.6-150200.3.11.3 * Development Tools Module 15-SP5 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Manager Server 4.3 Module 4.3 (noarch) * objectweb-asm-9.6-150200.3.11.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * maven-compiler-plugin-3.11.0-150200.3.7.1 * plexus-archiver-4.8.0-150200.3.7.2 * maven-common-artifact-filters-3.3.2-150200.3.7.3 * objectweb-asm-9.6-150200.3.11.3 * maven-archiver-3.6.1-150200.3.7.3 * plexus-compiler-2.14.2-150200.3.9.2 * maven-plugin-annotations-3.9.0-150200.3.7.3 ## References: * https://www.suse.com/security/cve/CVE-2023-37460.html * https://bugzilla.suse.com/show_bug.cgi?id=1215973 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:28 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:28 -0000 Subject: SUSE-RU-2024:0559-1: moderate: Recommended update for wxWidgets-3_2 Message-ID: <170850458843.16176.16502499795811186728@smelt2.prg2.suse.org> # Recommended update for wxWidgets-3_2 Announcement ID: SUSE-RU-2024:0559-1 Rating: moderate References: * bsc#1187712 * bsc#1217026 * bsc#1218626 * bsc#1219764 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has four fixes can now be installed. ## Description: This update for wxWidgets-3_2 fixes the following issues: * Ship all wxWidgets-3_2 libraries to PackageHub (bsc#1219764, bsc#1218626) * Fixed wxWidgets-3_2 building check fault on S390 platform: /sys/power/state doesn't exist in SLE S390 platform and certain types of containers, so check the file exist before run the test case. (bsc#1217026) * Fixed building check fault: Create our own socket file for socket file test, /dev/log doesn't exist in certain types of containers. (bsc#1217026) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-559=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-559=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-559=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwx_gtk2u_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_gl-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_base-suse-devel-3.1.5-150400.3.7.1 * libwx_qtu_gl-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-devel-3.1.5-150400.3.7.1 * libwx_gtk2u_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_base-suse-nostl-devel-3.1.5-150400.3.7.1 * libwx_gtk2u_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_html-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_stc-suse5_0_0-3.1.5-150400.3.7.1 * wxQt-3_2-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_webview-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_media-suse5_0_0-3.1.5-150400.3.7.1 * wxGTK3-3_2-devel-3.1.5-150400.3.7.1 * wxWidgets-3_2-plugin-sound_sdlu-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxQt-3_2-debugsource-3.1.5-150400.3.7.1 * wxWidgets-3_2-plugin-sound_sdlu-3_2-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_qa-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_webview-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-debuginfo-3.1.5-150400.3.7.1 * wxQt-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-debugsource-3.1.5-150400.3.7.1 * libwx_qtu_qa-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse-nostl5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_net-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_media-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_html-suse5_0_0-3.1.5-150400.3.7.1 * wxQt-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_stc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libwx_gtk2u_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_gl-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_base-suse-devel-3.1.5-150400.3.7.1 * libwx_qtu_gl-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-devel-3.1.5-150400.3.7.1 * libwx_gtk2u_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_base-suse-nostl-devel-3.1.5-150400.3.7.1 * libwx_gtk2u_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_html-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_stc-suse5_0_0-3.1.5-150400.3.7.1 * wxQt-3_2-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_webview-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_media-suse5_0_0-3.1.5-150400.3.7.1 * wxGTK3-3_2-devel-3.1.5-150400.3.7.1 * wxWidgets-3_2-plugin-sound_sdlu-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxQt-3_2-debugsource-3.1.5-150400.3.7.1 * wxWidgets-3_2-plugin-sound_sdlu-3_2-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_qa-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_webview-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-debuginfo-3.1.5-150400.3.7.1 * wxQt-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-debugsource-3.1.5-150400.3.7.1 * libwx_qtu_qa-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse-nostl5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_net-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_media-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_html-suse5_0_0-3.1.5-150400.3.7.1 * wxQt-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_stc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libwx_gtk2u_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_gl-suse5_0_0-3.1.5-150400.3.7.1 * wxGTK3-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_base-suse-devel-3.1.5-150400.3.7.1 * libwx_qtu_gl-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-devel-3.1.5-150400.3.7.1 * libwx_gtk2u_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_base-suse-nostl-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_html-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_stc-suse5_0_0-3.1.5-150400.3.7.1 * wxQt-3_2-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_webview-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_media-suse5_0_0-3.1.5-150400.3.7.1 * wxGTK3-3_2-devel-3.1.5-150400.3.7.1 * wxWidgets-3_2-plugin-sound_sdlu-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxQt-3_2-debugsource-3.1.5-150400.3.7.1 * wxWidgets-3_2-plugin-sound_sdlu-3_2-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_qa-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_webview-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_html-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-debugsource-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxGTK3-3_2-debuginfo-3.1.5-150400.3.7.1 * wxQt-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_qa-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_media-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-devel-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_aui-suse5_0_0-3.1.5-150400.3.7.1 * wxWidgets-3_2-devel-3.1.5-150400.3.7.1 * libwx_gtk3u_propgrid-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_baseu_net-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_richtext-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_media-suse5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_ribbon-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_net-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_html-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_stc-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_xrc-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * wxWidgets-3_2-nostl-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_media-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_gl-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_html-suse5_0_0-3.1.5-150400.3.7.1 * wxQt-3_2-debuginfo-3.1.5-150400.3.7.1 * libwx_baseu_xml-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_core-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk2u_adv-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_gl-suse5_0_0-3.1.5-150400.3.7.1 * libwx_baseu-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_richtext-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_qtu_adv-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk2u_stc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_ribbon-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse-nostl5_0_0-3.1.5-150400.3.7.1 * libwx_qtu_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_xrc-suse5_0_0-3.1.5-150400.3.7.1 * libwx_gtk3u_qa-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_richtext-suse-nostl5_0_0-debuginfo-3.1.5-150400.3.7.1 * libwx_gtk3u_aui-suse5_0_0-debuginfo-3.1.5-150400.3.7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1187712 * https://bugzilla.suse.com/show_bug.cgi?id=1217026 * https://bugzilla.suse.com/show_bug.cgi?id=1218626 * https://bugzilla.suse.com/show_bug.cgi?id=1219764 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:36:29 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:36:29 -0000 Subject: SUSE-SU-2024:0538-1: moderate: Security update for hdf5 Message-ID: <170850458979.16176.3768946237765475029@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:0538-1 Rating: moderate References: * bsc#1011205 * bsc#1093641 * bsc#1125882 * bsc#1167400 * bsc#1207973 * jsc#PED-7816 Cross-References: * CVE-2016-4332 * CVE-2018-11202 * CVE-2019-8396 * CVE-2020-10812 * CVE-2021-37501 CVSS scores: * CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: * Improved support for collective I/O (for both writes and reads). * Reduction of copying of application data buffers passed to H5Dwrite. * Addition of support for incremental file space allocation for filtered datasets created in parallel. * Addition of support for HDF5's "don't filter partial edge chunks" flag * Addition of proper support for HDF5 fill values with the feature. * Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. * Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the H5check_version function. * Unified handling of collective metadata reads to correctly fix old bugs. * Fixed several potential MPI deadlocks in library failure conditions. * Fixed an issue with collective metadata reads being permanently disabled after a dataset chunk lookup operation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-538=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-538=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-538=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-538=1 ## Package List: * openSUSE Leap 15.4 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (aarch64 x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2016-4332.html * https://www.suse.com/security/cve/CVE-2018-11202.html * https://www.suse.com/security/cve/CVE-2019-8396.html * https://www.suse.com/security/cve/CVE-2020-10812.html * https://www.suse.com/security/cve/CVE-2021-37501.html * https://bugzilla.suse.com/show_bug.cgi?id=1011205 * https://bugzilla.suse.com/show_bug.cgi?id=1093641 * https://bugzilla.suse.com/show_bug.cgi?id=1125882 * https://bugzilla.suse.com/show_bug.cgi?id=1167400 * https://bugzilla.suse.com/show_bug.cgi?id=1207973 * https://jira.suse.com/browse/PED-7816 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 08:39:34 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 08:39:34 -0000 Subject: SUSE-SU-2024:0538-1: moderate: Security update for hdf5 Message-ID: <170850477406.16765.194879440657561472@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:0538-1 Rating: moderate References: * bsc#1011205 * bsc#1093641 * bsc#1125882 * bsc#1167400 * bsc#1207973 * jsc#PED-7816 Cross-References: * CVE-2016-4332 * CVE-2018-11202 * CVE-2019-8396 * CVE-2020-10812 * CVE-2021-37501 CVSS scores: * CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: * Improved support for collective I/O (for both writes and reads). * Reduction of copying of application data buffers passed to H5Dwrite. * Addition of support for incremental file space allocation for filtered datasets created in parallel. * Addition of support for HDF5's "don't filter partial edge chunks" flag * Addition of proper support for HDF5 fill values with the feature. * Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. * Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the H5check_version function. * Unified handling of collective metadata reads to correctly fix old bugs. * Fixed several potential MPI deadlocks in library failure conditions. * Fixed an issue with collective metadata reads being permanently disabled after a dataset chunk lookup operation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-538=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-538=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-538=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-538=1 ## Package List: * openSUSE Leap 15.4 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (aarch64 x86_64) * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (noarch) * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2016-4332.html * https://www.suse.com/security/cve/CVE-2018-11202.html * https://www.suse.com/security/cve/CVE-2019-8396.html * https://www.suse.com/security/cve/CVE-2020-10812.html * https://www.suse.com/security/cve/CVE-2021-37501.html * https://bugzilla.suse.com/show_bug.cgi?id=1011205 * https://bugzilla.suse.com/show_bug.cgi?id=1093641 * https://bugzilla.suse.com/show_bug.cgi?id=1125882 * https://bugzilla.suse.com/show_bug.cgi?id=1167400 * https://bugzilla.suse.com/show_bug.cgi?id=1207973 * https://jira.suse.com/browse/PED-7816 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0580-1: important: Security update for MozillaFirefox Message-ID: <170851860436.13950.14846420054706024972@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:0580-1 Rating: important References: * bsc#1184272 * bsc#1220048 Cross-References: * CVE-2024-1546 * CVE-2024-1547 * CVE-2024-1548 * CVE-2024-1549 * CVE-2024-1550 * CVE-2024-1551 * CVE-2024-1552 * CVE-2024-1553 CVSS scores: Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 115.8.0 ESR (MFSA 2024-06) (bsc#1220048): * CVE-2024-1546: Out-of-bounds memory read in networking channels * CVE-2024-1547: Alert dialog could have been spoofed on another site * CVE-2024-1548: Fullscreen Notification could have been hidden by select element * CVE-2024-1549: Custom cursor could obscure the permission dialog * CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants * CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts * CVE-2024-1552: Incorrect code generation on 32-bit ARM devices * CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 * Recommend libfido2-udev on codestreams that exist, in order to try to get security keys (e.g. Yubikeys) work out of the box. (bsc#1184272) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-580=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-580=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-580=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-580=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * MozillaFirefox-115.8.0-112.200.1 * MozillaFirefox-debugsource-115.8.0-112.200.1 * MozillaFirefox-debuginfo-115.8.0-112.200.1 * MozillaFirefox-translations-common-115.8.0-112.200.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * MozillaFirefox-devel-115.8.0-112.200.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-115.8.0-112.200.1 * MozillaFirefox-debugsource-115.8.0-112.200.1 * MozillaFirefox-debuginfo-115.8.0-112.200.1 * MozillaFirefox-translations-common-115.8.0-112.200.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * MozillaFirefox-devel-115.8.0-112.200.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * MozillaFirefox-115.8.0-112.200.1 * MozillaFirefox-debugsource-115.8.0-112.200.1 * MozillaFirefox-debuginfo-115.8.0-112.200.1 * MozillaFirefox-translations-common-115.8.0-112.200.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * MozillaFirefox-devel-115.8.0-112.200.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debugsource-115.8.0-112.200.1 * MozillaFirefox-debuginfo-115.8.0-112.200.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * MozillaFirefox-devel-115.8.0-112.200.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1546.html * https://www.suse.com/security/cve/CVE-2024-1547.html * https://www.suse.com/security/cve/CVE-2024-1548.html * https://www.suse.com/security/cve/CVE-2024-1549.html * https://www.suse.com/security/cve/CVE-2024-1550.html * https://www.suse.com/security/cve/CVE-2024-1551.html * https://www.suse.com/security/cve/CVE-2024-1552.html * https://www.suse.com/security/cve/CVE-2024-1553.html * https://bugzilla.suse.com/show_bug.cgi?id=1184272 * https://bugzilla.suse.com/show_bug.cgi?id=1220048 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:07 -0000 Subject: SUSE-SU-2024:0579-1: important: Security update for mozilla-nss Message-ID: <170851860712.13950.5959242428008955196@smelt2.prg2.suse.org> # Security update for mozilla-nss Announcement ID: SUSE-SU-2024:0579-1 Rating: important References: * bsc#1216198 Cross-References: * CVE-2023-5388 CVSS scores: * CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Update to NSS 3.90.2: * CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-579=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-579=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-579=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-579=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-579=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-579=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-579=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-579=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-579=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-579=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-devel-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Enterprise Storage 7.1 (x86_64) * libfreebl3-32bit-3.90.2-150000.3.108.1 * libsoftokn3-32bit-debuginfo-3.90.2-150000.3.108.1 * libsoftokn3-32bit-3.90.2-150000.3.108.1 * mozilla-nss-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-3.90.2-150000.3.108.1 * libfreebl3-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-32bit-3.90.2-150000.3.108.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-certs-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-tools-debuginfo-3.90.2-150000.3.108.1 * libfreebl3-3.90.2-150000.3.108.1 * libsoftokn3-3.90.2-150000.3.108.1 * mozilla-nss-debugsource-3.90.2-150000.3.108.1 * mozilla-nss-tools-3.90.2-150000.3.108.1 * libsoftokn3-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-debuginfo-3.90.2-150000.3.108.1 * mozilla-nss-3.90.2-150000.3.108.1 * mozilla-nss-certs-3.90.2-150000.3.108.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5388.html * https://bugzilla.suse.com/show_bug.cgi?id=1216198 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:10 -0000 Subject: SUSE-SU-2024:0578-1: important: Security update for mozilla-nss Message-ID: <170851861067.13950.10472740431470127669@smelt2.prg2.suse.org> # Security update for mozilla-nss Announcement ID: SUSE-SU-2024:0578-1 Rating: important References: * bsc#1216198 Cross-References: * CVE-2023-5388 CVSS scores: * CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Update to NSS 3.90.2: * CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-578=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-578=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-578=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-578=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-devel-3.90.2-58.111.1 * mozilla-nss-debugsource-3.90.2-58.111.1 * mozilla-nss-debuginfo-3.90.2-58.111.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * mozilla-nss-certs-3.90.2-58.111.1 * mozilla-nss-debugsource-3.90.2-58.111.1 * mozilla-nss-certs-debuginfo-3.90.2-58.111.1 * mozilla-nss-devel-3.90.2-58.111.1 * mozilla-nss-sysinit-3.90.2-58.111.1 * mozilla-nss-tools-3.90.2-58.111.1 * mozilla-nss-tools-debuginfo-3.90.2-58.111.1 * libfreebl3-debuginfo-3.90.2-58.111.1 * mozilla-nss-3.90.2-58.111.1 * mozilla-nss-debuginfo-3.90.2-58.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-58.111.1 * libfreebl3-3.90.2-58.111.1 * libsoftokn3-3.90.2-58.111.1 * libsoftokn3-debuginfo-3.90.2-58.111.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * mozilla-nss-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-sysinit-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-certs-debuginfo-32bit-3.90.2-58.111.1 * libsoftokn3-debuginfo-32bit-3.90.2-58.111.1 * libfreebl3-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-certs-32bit-3.90.2-58.111.1 * libsoftokn3-32bit-3.90.2-58.111.1 * mozilla-nss-sysinit-32bit-3.90.2-58.111.1 * libfreebl3-32bit-3.90.2-58.111.1 * mozilla-nss-32bit-3.90.2-58.111.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-certs-3.90.2-58.111.1 * mozilla-nss-debugsource-3.90.2-58.111.1 * mozilla-nss-certs-debuginfo-3.90.2-58.111.1 * mozilla-nss-devel-3.90.2-58.111.1 * mozilla-nss-sysinit-3.90.2-58.111.1 * mozilla-nss-tools-3.90.2-58.111.1 * mozilla-nss-tools-debuginfo-3.90.2-58.111.1 * libfreebl3-debuginfo-3.90.2-58.111.1 * mozilla-nss-3.90.2-58.111.1 * mozilla-nss-debuginfo-3.90.2-58.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-58.111.1 * libfreebl3-3.90.2-58.111.1 * libsoftokn3-3.90.2-58.111.1 * libsoftokn3-debuginfo-3.90.2-58.111.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * mozilla-nss-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-sysinit-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-certs-debuginfo-32bit-3.90.2-58.111.1 * libsoftokn3-debuginfo-32bit-3.90.2-58.111.1 * libfreebl3-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-certs-32bit-3.90.2-58.111.1 * libsoftokn3-32bit-3.90.2-58.111.1 * mozilla-nss-sysinit-32bit-3.90.2-58.111.1 * libfreebl3-32bit-3.90.2-58.111.1 * mozilla-nss-32bit-3.90.2-58.111.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * mozilla-nss-certs-3.90.2-58.111.1 * mozilla-nss-debugsource-3.90.2-58.111.1 * mozilla-nss-certs-debuginfo-3.90.2-58.111.1 * mozilla-nss-devel-3.90.2-58.111.1 * mozilla-nss-sysinit-3.90.2-58.111.1 * mozilla-nss-tools-3.90.2-58.111.1 * mozilla-nss-tools-debuginfo-3.90.2-58.111.1 * libfreebl3-debuginfo-3.90.2-58.111.1 * mozilla-nss-3.90.2-58.111.1 * mozilla-nss-debuginfo-3.90.2-58.111.1 * mozilla-nss-sysinit-debuginfo-3.90.2-58.111.1 * libfreebl3-3.90.2-58.111.1 * libsoftokn3-3.90.2-58.111.1 * libsoftokn3-debuginfo-3.90.2-58.111.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * mozilla-nss-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-sysinit-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-certs-debuginfo-32bit-3.90.2-58.111.1 * libsoftokn3-debuginfo-32bit-3.90.2-58.111.1 * libfreebl3-debuginfo-32bit-3.90.2-58.111.1 * mozilla-nss-certs-32bit-3.90.2-58.111.1 * libsoftokn3-32bit-3.90.2-58.111.1 * mozilla-nss-sysinit-32bit-3.90.2-58.111.1 * libfreebl3-32bit-3.90.2-58.111.1 * mozilla-nss-32bit-3.90.2-58.111.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5388.html * https://bugzilla.suse.com/show_bug.cgi?id=1216198 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:12 -0000 Subject: SUSE-SU-2024:0577-1: important: Security update for python-aiohttp, python-time-machine Message-ID: <170851861281.13950.14709124265115585538@smelt2.prg2.suse.org> # Security update for python-aiohttp, python-time-machine Announcement ID: SUSE-SU-2024:0577-1 Rating: important References: * bsc#1217174 * bsc#1217181 * bsc#1217782 * bsc#1219341 * bsc#1219342 Cross-References: * CVE-2023-47627 * CVE-2023-47641 * CVE-2024-23334 * CVE-2024-23829 CVSS scores: * CVE-2023-47627 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-47627 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-47641 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2023-47641 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2024-23334 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-23334 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-23829 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-23829 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for python-aiohttp, python-time-machine fixes the following issues: python-aiohttp was updated to version 3.9.3: * Fixed backwards compatibility breakage (in 3.9.2) of `ssl` parameter when set outside of `ClientSession` (e.g. directly in `TCPConnector`) * Improved test suite handling of paths and temp files to consistently use pathlib and pytest fixtures. >From version 3.9.2 (bsc#1219341, CVE-2024-23334, bsc#1219342, CVE-2024-23829): * Fixed server-side websocket connection leak. * Fixed `web.FileResponse` doing blocking I/O in the event loop. * Fixed double compress when compression enabled and compressed file exists in server file responses. * Added runtime type check for `ClientSession` `timeout` parameter. * Fixed an unhandled exception in the Python HTTP parser on header lines starting with a colon. * Improved validation of paths for static resources requests to the server. * Added support for passing :py:data:`True` to `ssl` parameter in `ClientSession` while deprecating :py:data:`None`. * Fixed an unhandled exception in the Python HTTP parser on header lines starting with a colon. * Fixed examples of `fallback_charset_resolver` function in the :doc:`client_advanced` document. * The Sphinx setup was updated to avoid showing the empty changelog draft section in the tagged release documentation builds on Read The Docs. * The changelog categorization was made clearer. The contributors can now mark their fragment files more accurately. * Updated :ref:`contributing/Tests coverage <aiohttp-contributing>` section to show how we use `codecov`. * Replaced all `tmpdir` fixtures with `tmp_path` in test suite. * Disable broken tests with openssl 3.2 and python < 3.11 bsc#1217782 update to 3.9.1: * Fixed importing aiohttp under PyPy on Windows. * Fixed async concurrency safety in websocket compressor. * Fixed `ClientResponse.close()` releasing the connection instead of closing. * Fixed a regression where connection may get closed during upgrade. -- by :user:`Dreamsorcerer` * Fixed messages being reported as upgraded without an Upgrade header in Python parser. -- by :user:`Dreamsorcerer` update to 3.9.0: (bsc#1217684, CVE-2023-49081, bsc#1217682, CVE-2023-49082) * Introduced `AppKey` for static typing support of `Application` storage. * Added a graceful shutdown period which allows pending tasks to complete before the application's cleanup is called. * Added `handler_cancellation`_ parameter to cancel web handler on client disconnection. * This (optionally) reintroduces a feature removed in a previous release. * Recommended for those looking for an extra level of protection against denial-of-service attacks. * Added support for setting response header parameters `max_line_size` and `max_field_size`. * Added `auto_decompress` parameter to `ClientSession.request` to override `ClientSession._auto_decompress`. * Changed `raise_for_status` to allow a coroutine. * Added client brotli compression support (optional with runtime check). * Added `client_max_size` to `BaseRequest.clone()` to allow overriding the request body size. -- :user:`anesabml`. * Added a middleware type alias `aiohttp.typedefs.Middleware`. * Exported `HTTPMove` which can be used to catch any redirection request that has a location -- :user:`dreamsorcerer`. * Changed the `path` parameter in `web.run_app()` to accept a `pathlib.Path` object. * Performance: Skipped filtering `CookieJar` when the jar is empty or all cookies have expired. * Performance: Only check origin if insecure scheme and there are origins to treat as secure, in `CookieJar.filter_cookies()`. * Performance: Used timestamp instead of `datetime` to achieve faster cookie expiration in `CookieJar`. * Added support for passing a custom server name parameter to HTTPS connection. * Added support for using Basic Auth credentials from :file:`.netrc` file when making HTTP requests with the * :py:class:`~aiohttp.ClientSession` `trust_env` argument is set to `True`. -- by :user:`yuvipanda`. * Turned access log into no-op when the logger is disabled. * Added typing information to `RawResponseMessage`. -- by :user:`Gobot1234` * Removed `async-timeout` for Python 3.11+ (replaced with `asyncio.timeout()` on newer releases). * Added support for `brotlicffi` as an alternative to `brotli` (fixing Brotli support on PyPy). * Added `WebSocketResponse.get_extra_info()` to access a protocol transport's extra info. * Allow `link` argument to be set to None/empty in HTTP 451 exception. * Fixed client timeout not working when incoming data is always available without waiting. -- by :user:`Dreamsorcerer`. * Fixed `readuntil` to work with a delimiter of more than one character. * Added `__repr__` to `EmptyStreamReader` to avoid `AttributeError`. * Fixed bug when using `TCPConnector` with `ttl_dns_cache=0`. * Fixed response returned from expect handler being thrown away. -- by :user:`Dreamsorcerer` * Avoided raising `UnicodeDecodeError` in multipart and in HTTP headers parsing. * Changed `sock_read` timeout to start after writing has finished, avoiding read timeouts caused by an unfinished write. -- by :user:`dtrifiro` * Fixed missing query in tracing method URLs when using `yarl` 1.9+. * Changed max 32-bit timestamp to an aware datetime object, for consistency with the non-32-bit one, and to avoid a `DeprecationWarning` on Python 3.12. * Fixed `EmptyStreamReader.iter_chunks()` never ending. * Fixed a rare `RuntimeError: await wasn't used with future` exception. * Fixed issue with insufficient HTTP method and version validation. * Added check to validate that absolute URIs have schemes. * Fixed unhandled exception when Python HTTP parser encounters unpaired Unicode surrogates. * Updated parser to disallow invalid characters in header field names and stop accepting LF as a request line separator. * Fixed Python HTTP parser not treating 204/304/1xx as an empty body. * Ensure empty body response for 1xx/204/304 per RFC 9112 sec 6.3. * Fixed an issue when a client request is closed before completing a chunked payload. -- by :user:`Dreamsorcerer` * Edge Case Handling for ResponseParser for missing reason value. * Fixed `ClientWebSocketResponse.close_code` being erroneously set to `None` when there are concurrent async tasks receiving data and closing the connection. * Added HTTP method validation. * Fixed arbitrary sequence types being allowed to inject values via version parameter. -- by :user:`Dreamsorcerer` * Performance: Fixed increase in latency with small messages from websocket compression changes. * Improved Documentation * Fixed the `ClientResponse.release`'s type in the doc. Changed from `comethod` to `method`. * Added information on behavior of base_url parameter in `ClientSession`. * Completed `trust_env` parameter description to honor `wss_proxy`, `ws_proxy` or `no_proxy` env. * Dropped Python 3.6 support. * Dropped Python 3.7 support. -- by :user:`Dreamsorcerer` * Removed support for abandoned `tokio` event loop. * Made `print` argument in `run_app()` optional. * Improved performance of `ceil_timeout` in some cases. * Changed importing Gunicorn to happen on-demand, decreasing import time by ~53%. -- :user:`Dreamsorcerer` * Improved import time by replacing `http.server` with `http.HTTPStatus`. * Fixed annotation of `ssl` parameter to disallow `True`. update to 3.8.6 (bsc#1217181, CVE-2023-47627): * Security bugfixes * https://github.com/aio-libs/aiohttp/security/advisories/GHSA- pjjw- qhg8-p2p9. * https://github.com/aio-libs/aiohttp/security/advisories/GHSA- gfw2-4jvh- wgfg. * Added `fallback_charset_resolver` parameter in `ClientSession` to allow a user-supplied character set detection function. Character set detection will no longer be included in 3.9 as a default. If this feature is needed, please use `fallback_charset_resolver the client * Fixed `PermissionError` when `.netrc` is unreadable due to permissions. * Fixed output of parsing errors * Fixed sorting in `filter_cookies` to use cookie with longest path. Release 3.8.0 (2021-10-31) (bsc#1217174, CVE-2023-47641) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-577=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-577=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-577=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-577=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-577=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-577=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-577=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-577=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * python-time-machine-debugsource-2.13.0-150400.9.3.1 * python311-time-machine-debuginfo-2.13.0-150400.9.3.1 * python311-time-machine-2.13.0-150400.9.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python-aiohttp-debugsource-3.9.3-150400.10.14.1 * python311-aiohttp-debuginfo-3.9.3-150400.10.14.1 * python311-aiohttp-3.9.3-150400.10.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-47627.html * https://www.suse.com/security/cve/CVE-2023-47641.html * https://www.suse.com/security/cve/CVE-2024-23334.html * https://www.suse.com/security/cve/CVE-2024-23829.html * https://bugzilla.suse.com/show_bug.cgi?id=1217174 * https://bugzilla.suse.com/show_bug.cgi?id=1217181 * https://bugzilla.suse.com/show_bug.cgi?id=1217782 * https://bugzilla.suse.com/show_bug.cgi?id=1219341 * https://bugzilla.suse.com/show_bug.cgi?id=1219342 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:16 -0000 Subject: SUSE-SU-2024:0576-1: important: Security update for dpdk Message-ID: <170851861606.13950.4773380169218270984@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2024:0576-1 Rating: important References: * bsc#1202903 * bsc#1219187 Cross-References: * CVE-2022-2132 CVSS scores: * CVE-2022-2132 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2022-2132 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for dpdk fixes the following issues: * Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-576=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-576=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-576=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-576=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-576=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-576=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-576=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-576=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * SUSE Manager Proxy 4.3 (x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * dpdk-examples-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-examples-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * openSUSE Leap 15.4 (noarch) * dpdk-thunderx-doc-19.11.10-150400.4.12.1 * dpdk-doc-19.11.10-150400.4.12.1 * openSUSE Leap 15.4 (aarch64) * dpdk-thunderx-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.12.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-examples-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-examples-19.11.10-150400.4.12.1 * dpdk-thunderx-tools-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-19.11.10-150400.4.12.1 * dpdk-thunderx-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.12.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-19.11.10-150400.4.12.1 * dpdk-thunderx-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.12.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-19.11.10-150400.4.12.1 * dpdk-thunderx-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * dpdk-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-tools-debuginfo-19.11.10-150400.4.12.1 * dpdk-debuginfo-19.11.10-150400.4.12.1 * libdpdk-20_0-19.11.10-150400.4.12.1 * libdpdk-20_0-debuginfo-19.11.10-150400.4.12.1 * dpdk-debugsource-19.11.10-150400.4.12.1 * dpdk-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-devel-19.11.10-150400.4.12.1 * dpdk-tools-19.11.10-150400.4.12.1 * dpdk-19.11.10-150400.4.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 * dpdk-thunderx-debugsource-19.11.10-150400.4.12.1 * dpdk-thunderx-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-19.11.10-150400.4.12.1 * dpdk-thunderx-19.11.10-150400.4.12.1 * dpdk-thunderx-devel-debuginfo-19.11.10-150400.4.12.1 * dpdk-thunderx-kmp-default-debuginfo-19.11.10_k5.14.21_150400.24.103-150400.4.12.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2132.html * https://bugzilla.suse.com/show_bug.cgi?id=1202903 * https://bugzilla.suse.com/show_bug.cgi?id=1219187 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:18 -0000 Subject: SUSE-RU-2024:0575-1: moderate: Recommended update for php7 Message-ID: <170851861891.13950.1810693822948214057@smelt2.prg2.suse.org> # Recommended update for php7 Announcement ID: SUSE-RU-2024:0575-1 Rating: moderate References: * bsc#1217722 Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for php7 fixes the following issues: * Ensure that package is built using openssl-1_1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-575=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-575=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-575=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-575=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-575=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-575=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-575=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-575=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-embed-debuginfo-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-embed-debugsource-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-embed-7.4.33-150400.4.31.1 * php7-test-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-embed-debuginfo-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-embed-debugsource-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-embed-7.4.33-150400.4.31.1 * php7-test-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * php7-embed-7.4.33-150400.4.31.1 * php7-embed-debuginfo-7.4.33-150400.4.31.1 * php7-embed-debugsource-7.4.33-150400.4.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * php7-intl-debuginfo-7.4.33-150400.4.31.1 * php7-fpm-7.4.33-150400.4.31.1 * php7-opcache-debuginfo-7.4.33-150400.4.31.1 * php7-dba-7.4.33-150400.4.31.1 * php7-opcache-7.4.33-150400.4.31.1 * php7-exif-7.4.33-150400.4.31.1 * php7-sockets-debuginfo-7.4.33-150400.4.31.1 * php7-readline-debuginfo-7.4.33-150400.4.31.1 * php7-readline-7.4.33-150400.4.31.1 * php7-mbstring-debuginfo-7.4.33-150400.4.31.1 * apache2-mod_php7-7.4.33-150400.4.31.1 * php7-gmp-7.4.33-150400.4.31.1 * php7-mbstring-7.4.33-150400.4.31.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.31.1 * php7-ctype-7.4.33-150400.4.31.1 * php7-devel-7.4.33-150400.4.31.1 * php7-shmop-7.4.33-150400.4.31.1 * php7-ctype-debuginfo-7.4.33-150400.4.31.1 * php7-fileinfo-7.4.33-150400.4.31.1 * php7-fpm-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-7.4.33-150400.4.31.1 * php7-gd-debuginfo-7.4.33-150400.4.31.1 * php7-debugsource-7.4.33-150400.4.31.1 * php7-zip-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.31.1 * php7-sysvmsg-7.4.33-150400.4.31.1 * php7-curl-7.4.33-150400.4.31.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-7.4.33-150400.4.31.1 * php7-phar-7.4.33-150400.4.31.1 * php7-fpm-debugsource-7.4.33-150400.4.31.1 * php7-sqlite-debuginfo-7.4.33-150400.4.31.1 * php7-snmp-7.4.33-150400.4.31.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.31.1 * php7-dom-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-7.4.33-150400.4.31.1 * php7-posix-debuginfo-7.4.33-150400.4.31.1 * php7-cli-debuginfo-7.4.33-150400.4.31.1 * php7-exif-debuginfo-7.4.33-150400.4.31.1 * php7-xmlrpc-7.4.33-150400.4.31.1 * php7-enchant-debuginfo-7.4.33-150400.4.31.1 * php7-curl-debuginfo-7.4.33-150400.4.31.1 * php7-ldap-debuginfo-7.4.33-150400.4.31.1 * php7-json-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-debuginfo-7.4.33-150400.4.31.1 * php7-7.4.33-150400.4.31.1 * php7-xsl-7.4.33-150400.4.31.1 * php7-fastcgi-7.4.33-150400.4.31.1 * php7-bcmath-7.4.33-150400.4.31.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.31.1 * php7-json-7.4.33-150400.4.31.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.31.1 * php7-xmlwriter-7.4.33-150400.4.31.1 * php7-ftp-debuginfo-7.4.33-150400.4.31.1 * php7-tidy-7.4.33-150400.4.31.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.31.1 * php7-pgsql-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-7.4.33-150400.4.31.1 * php7-cli-7.4.33-150400.4.31.1 * php7-calendar-debuginfo-7.4.33-150400.4.31.1 * php7-gd-7.4.33-150400.4.31.1 * php7-openssl-debuginfo-7.4.33-150400.4.31.1 * php7-iconv-debuginfo-7.4.33-150400.4.31.1 * php7-pcntl-debuginfo-7.4.33-150400.4.31.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.31.1 * php7-sockets-7.4.33-150400.4.31.1 * php7-bcmath-debuginfo-7.4.33-150400.4.31.1 * php7-odbc-7.4.33-150400.4.31.1 * php7-shmop-debuginfo-7.4.33-150400.4.31.1 * php7-soap-7.4.33-150400.4.31.1 * php7-bz2-debuginfo-7.4.33-150400.4.31.1 * php7-openssl-7.4.33-150400.4.31.1 * php7-pgsql-7.4.33-150400.4.31.1 * php7-snmp-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-debuginfo-7.4.33-150400.4.31.1 * php7-dom-7.4.33-150400.4.31.1 * php7-dba-debuginfo-7.4.33-150400.4.31.1 * php7-xsl-debuginfo-7.4.33-150400.4.31.1 * php7-debuginfo-7.4.33-150400.4.31.1 * php7-xmlreader-7.4.33-150400.4.31.1 * php7-sqlite-7.4.33-150400.4.31.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.31.1 * php7-gmp-debuginfo-7.4.33-150400.4.31.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-7.4.33-150400.4.31.1 * php7-posix-7.4.33-150400.4.31.1 * php7-pdo-debuginfo-7.4.33-150400.4.31.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.31.1 * php7-gettext-debuginfo-7.4.33-150400.4.31.1 * php7-bz2-7.4.33-150400.4.31.1 * php7-fastcgi-debugsource-7.4.33-150400.4.31.1 * php7-ftp-7.4.33-150400.4.31.1 * php7-pdo-7.4.33-150400.4.31.1 * php7-sysvshm-7.4.33-150400.4.31.1 * php7-phar-debuginfo-7.4.33-150400.4.31.1 * php7-sodium-debuginfo-7.4.33-150400.4.31.1 * php7-zlib-7.4.33-150400.4.31.1 * php7-calendar-7.4.33-150400.4.31.1 * php7-zip-7.4.33-150400.4.31.1 * php7-soap-debuginfo-7.4.33-150400.4.31.1 * php7-mysql-debuginfo-7.4.33-150400.4.31.1 * php7-intl-7.4.33-150400.4.31.1 * php7-pcntl-7.4.33-150400.4.31.1 * php7-sodium-7.4.33-150400.4.31.1 * php7-tokenizer-7.4.33-150400.4.31.1 * php7-enchant-7.4.33-150400.4.31.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217722 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:21 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:21 -0000 Subject: SUSE-SU-2024:0574-1: important: Security update for bind Message-ID: <170851862170.13950.14493298927397510830@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:0574-1 Rating: important References: * bsc#1219823 * bsc#1219826 * bsc#1219851 * bsc#1219852 * bsc#1219853 * bsc#1219854 Cross-References: * CVE-2023-4408 * CVE-2023-50387 * CVE-2023-50868 * CVE-2023-5517 * CVE-2023-5679 * CVE-2023-6516 CVSS scores: * CVE-2023-4408 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5517 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5679 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6516 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: Update to release 9.16.48: * CVE-2023-50387: Fixed a denial-of-service caused by DNS messages containing a lot of DNSSEC signatures (bsc#1219823). * CVE-2023-50868: Fixed a denial-of-service caused by NSEC3 closest encloser proof (bsc#1219826). * CVE-2023-4408: Fixed a denial-of-service caused by DNS messages with many different names (bsc#1219851). * CVE-2023-5517: Fixed a possible crash when nxdomain-redirect was enabled (bsc#1219852). * CVE-2023-5679: Fixed a possible crash when bad interaction between DNS64 and serve-stale, when both of these features are enabled (bsc#1219853). * CVE-2023-6516: Fixed excessive memory consumption when continuously trigger the cache database maintenance (bsc#1219854). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-574=1 openSUSE-SLE-15.5-2024-574=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-574=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-574=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * bind-9.16.48-150500.8.16.1 * bind-debugsource-9.16.48-150500.8.16.1 * bind-utils-9.16.48-150500.8.16.1 * bind-debuginfo-9.16.48-150500.8.16.1 * bind-utils-debuginfo-9.16.48-150500.8.16.1 * openSUSE Leap 15.5 (noarch) * python3-bind-9.16.48-150500.8.16.1 * bind-doc-9.16.48-150500.8.16.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * bind-debugsource-9.16.48-150500.8.16.1 * bind-utils-9.16.48-150500.8.16.1 * bind-debuginfo-9.16.48-150500.8.16.1 * bind-utils-debuginfo-9.16.48-150500.8.16.1 * Basesystem Module 15-SP5 (noarch) * python3-bind-9.16.48-150500.8.16.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * bind-9.16.48-150500.8.16.1 * bind-debugsource-9.16.48-150500.8.16.1 * bind-debuginfo-9.16.48-150500.8.16.1 * Server Applications Module 15-SP5 (noarch) * bind-doc-9.16.48-150500.8.16.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4408.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://www.suse.com/security/cve/CVE-2023-5517.html * https://www.suse.com/security/cve/CVE-2023-5679.html * https://www.suse.com/security/cve/CVE-2023-6516.html * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1219851 * https://bugzilla.suse.com/show_bug.cgi?id=1219852 * https://bugzilla.suse.com/show_bug.cgi?id=1219853 * https://bugzilla.suse.com/show_bug.cgi?id=1219854 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:26 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:26 -0000 Subject: SUSE-SU-2024:0573-1: moderate: Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 Message-ID: <170851862651.13950.17390953567362890957@smelt2.prg2.suse.org> # Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python- abseil, python-grpcio, re2 Announcement ID: SUSE-SU-2024:0573-1 Rating: moderate References: * bsc#1133277 * bsc#1182659 * bsc#1203378 * bsc#1208794 * bsc#1212180 * bsc#1212182 * bsc#1214148 * bsc#1215334 * jsc#PED-5014 Cross-References: * CVE-2023-32731 * CVE-2023-32732 * CVE-2023-33953 * CVE-2023-44487 * CVE-2023-4785 CVSS scores: * CVE-2023-32731 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-32731 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2023-32732 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-32732 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-33953 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-33953 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4785 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4785 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities, contains one feature and has three security fixes can now be installed. ## Description: This update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 fixes the following issues: abseil-cpp was updated to: Update to 20230802.1: * Add StdcppWaiter to the end of the list of waiter implementations Update to 20230802.0 What's New: * Added the nullability library for designating the expected nullability of pointers. Currently these serve as annotations only, but it is expected that compilers will one day be able to use these annotations for diagnostic purposes. * Added the prefetch library as a portable layer for moving data into caches before it is read. * Abseil's hash tables now detect many more programming errors in debug and sanitizer builds. * Abseil's synchronization objects now differentiate absolute waits (when passed an absl::Time) from relative waits (when passed an absl::Duration) when the underlying platform supports differentiating these cases. This only makes a difference when system clocks are adjusted. * Abseil's flag parsing library includes additional methods that make it easier to use when another library also expects to be able to parse flags. * absl::string_view is now available as a smaller target, @com_google_absl//absl/strings:string_view, so that users may use this library without depending on the much larger @com_google_absl//absl/strings target. Update to 20230125.3 Details can be found on: https://github.com/abseil/abseil-cpp/releases/tag/20230125.3 Update to 20230125.2 What's New: The Abseil logging library has been released. This library provides facilities for writing short text messages about the status of a program to stderr, disk files, or other sinks (via an extension API). See the logging library documentation for more information. An extension point, AbslStringify(), allows user-defined types to seamlessly work with Abseil's string formatting functions like absl::StrCat() and absl::StrFormat(). A library for computing CRC32C checksums has been added. Floating-point parsing now uses the Eisel-Lemire algorithm, which provides a significant speed improvement. The flags library now provides suggestions for the closest flag(s) in the case of misspelled flags. Using CMake to install Abseil now makes the installed artifacts (in particular absl/base/options.h) reflect the compiled ABI. Breaking Changes: Abseil now requires at least C++14 and follows Google's Foundational C++ Support Policy. See this table for a list of currently supported versions compilers, platforms, and build tools. The legacy spellings of the thread annotation macros/functions (e.g. GUARDED_BY()) have been removed by default in favor of the ABSL_ prefixed versions (e.g. ABSL_GUARDED_BY()) due to clashes with other libraries. The compatibility macro ABSL_LEGACY_THREAD_ANNOTATIONS can be defined on the compile command-line to temporarily restore these spellings, but this compatibility macro will be removed in the future. Known Issues The Abseil logging library in this release is not a feature-complete replacement for glog yet. VLOG and DFATAL are examples of features that have not yet been released. Update to version 20220623.0 What's New: * Added absl::AnyInvocable, a move-only function type. * Added absl::CordBuffer, a type for buffering data for eventual inclusion an absl::Cord, which is useful for writing zero-copy code. * Added support for command-line flags of type absl::optional. Breaking Changes: * CMake builds now use the flag ABSL_BUILD_TESTING (default: OFF) to control whether or not unit tests are built. * The ABSL_DEPRECATED macro now works with the GCC compiler. GCC users that are experiencing new warnings can use -Wno-deprecated-declatations silence the warnings or use -Wno-error=deprecated-declarations to see warnings but not fail the build. * ABSL_CONST_INIT uses the C++20 keyword constinit when available. Some compilers are more strict about where this keyword must appear compared to the pre-C++20 implementation. * Bazel builds now depend on the bazelbuild/bazel-skylib repository. See Abseil's WORKSPACE file for an example of how to add this dependency. Other: * This will be the last release to support C++11. Future releases will require at least C++14. grpc was updated to 1.60: Update to release 1.60 * Implemented dualstack IPv4 and IPv6 backend support, as per draft gRFC A61. xDS support currently guarded by GRPC_EXPERIMENTAL_XDS_DUALSTACK_ENDPOINTS env var. * Support for setting proxy for addresses. * Add v1 reflection. update to 1.59.3: * Security - Revocation: Crl backport to 1.59. (#34926) Update to release 1.59.2 * Fixes for CVE-2023-44487 Update to version 1.59.1: * C++: Fix MakeCordFromSlice memory bug (gh#grpc/grpc#34552). Update to version 1.59.0: * xds ssa: Remove environment variable protection for stateful affinity (gh#grpc/grpc#34435). * c-ares: fix spin loop bug when c-ares gives up on a socket that still has data left in its read buffer (gh#grpc/grpc#34185). * Deps: Adding upb as a submodule (gh#grpc/grpc#34199). * EventEngine: Update Cancel contract on closure deletion timeline (gh#grpc/grpc#34167). * csharp codegen: Handle empty base_namespace option value to fix gh#grpc/grpc#34113 (gh#grpc/grpc#34137). * Ruby: * replace strdup with gpr_strdup (gh#grpc/grpc#34177). * drop ruby 2.6 support (gh#grpc/grpc#34198). Update to release 1.58.1 * Reintroduced c-ares 1.14 or later support Update to release 1.58 * ruby extension: remove unnecessary background thread startup wait logic that interferes with forking Update to release 1.57 (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148) * EventEngine: Change GetDNSResolver to return absl::StatusOr>. * Improve server handling of file descriptor exhaustion. * Add a channel argument to set DSCP on streams. Update to release 1.56.2 * Improve server handling of file descriptor exhaustion Update to release 1.56.0 (CVE-2023-32731, bsc#1212180) * core: Add support for vsock transport. * EventEngine: Change TXT lookup result type to std::vector. * C++/Authz: support customizable audit functionality for authorization policy. Update to release 1.54.1 * Bring declarations and definitions to be in sync Update to release 1.54 (CVE-2023-32732, bsc#1212182) * XDS: enable XDS federation by default * TlsCreds: Support revocation of intermediate in chain Update to release 1.51.1 * Only a macOS/aarch64-related change Update to release 1.51 * c-ares DNS resolver: fix logical race between resolution timeout/cancellation and fd readability. * Remove support for pthread TLS Update to release 1.50.0 * Core * Derive EventEngine from std::enable_shared_from_this. (#31060) * Revert "Revert "[chttp2] fix stream leak with queued flow control update and absence of writes (#30907)" (#30991)". (#30992) * [chttp2] fix stream leak with queued flow control update and absence of writes. (#30907) * Remove gpr_codegen. (#30899) * client_channel: allow LB policy to communicate update errors to resolver. (#30809) * FaultInjection: Fix random number generation. (#30623) * C++ * OpenCensus Plugin: Add measure and views for started RPCs. (#31034) * C# * Grpc.Tools: Parse warnings from libprotobuf (fix #27502). (#30371) * Grpc.Tools add support for env variable GRPC_PROTOC_PLUGIN (fix #27099). (#30411) * Grpc.Tools document AdditionalImportDirs. (#30405) * Fix OutputOptions and GrpcOutputOptions (issue #25950). (#30410) Update to release 1.49.1 * All * Update protobuf to v21.6 on 1.49.x. (#31028) * Ruby * Backport "Fix ruby windows ucrt build #31051" to 1.49.x. (#31053) Update to release 1.49.0 * Core * Backport: "stabilize the C2P resolver URI scheme" to v1.49.x. (#30654) * Bump core version. (#30588) * Update OpenCensus to HEAD. (#30567) * Update protobuf submodule to 3.21.5. (#30548) * Update third_party/protobuf to 3.21.4. (#30377) * [core] Remove GRPC_INITIAL_METADATA_CORKED flag. (#30443) * HTTP2: Fix keepalive time throttling. (#30164) * Use AnyInvocable in EventEngine APIs. (#30220) * Python * Add type stub generation support to grpcio-tools. (#30498) Update to release 1.48.1 * Backport EventEngine Forkables Update to release 1.48.0 * C++14 is now required * xDS: Workaround to get gRPC clients working with istio Update to release 1.46.3 * backport: xds: use federation env var to guard new-style resource name parsing (#29725) #29727 Update to release 1.46 * Added HTTP/1.1 support in httpcli * HTTP2: Add graceful goaway Update to release 1.45.2 * Various fixes related to XDS * HTTP2: Should not run cancelling logic on servers when receiving GOAWAY Update to release 1.45.1 * Switched to epoll1 as a default polling engine for Linux Update to version 1.45.0: * Core: * Backport "Include ADS stream error in XDS error updates (#29014)" to 1.45.x [gh#grpc/grpc#29121]. * Bump core version to 23.0.0 for upcoming release [gh#grpc/grpc#29026]. * Fix memory leak in HTTP request security handshake cancellation [gh#grpc/grpc#28971]. * CompositeChannelCredentials: Comparator implementation [gh#grpc/grpc#28902]. * Delete custom iomgr [gh#grpc/grpc#28816]. * Implement transparent retries [gh#grpc/grpc#28548]. * Uniquify channel args keys [gh#grpc/grpc#28799]. * Set trailing_metadata_available for recv_initial_metadata ops when generating a fake status [gh#grpc/grpc#28827]. * Eliminate gRPC insecure build [gh#grpc/grpc#25586]. * Fix for a racy WorkSerializer shutdown [gh#grpc/grpc#28769]. * InsecureCredentials: singleton object [gh#grpc/grpc#28777]. * Add http cancel api [gh#grpc/grpc#28354]. * Memory leak fix on windows in grpc_tcp_create() [gh#grpc/grpc#27457]. * xDS: Rbac filter updates [gh#grpc/grpc#28568]. * C++ * Bump the minimum gcc to 5 [gh#grpc/grpc#28786]. * Add experimental API for CRL checking support to gRPC C++ TlsCredentials [gh#grpc/grpc#28407]. Update to release 1.44.0 * Add a trace to list which filters are contained in a channel stack. * Remove grpc_httpcli_context. * xDS: Add support for RBAC HTTP filter. * API to cancel grpc_resolve_address. Update to version 1.43.2: * Fix google-c2p-experimental issue (gh#grpc/grpc#28692). Changes from version 1.43.0: * Core: * Remove redundant work serializer usage in c-ares windows code (gh#grpc/grpc#28016). * Support RDS updates on the server (gh#grpc/grpc#27851). * Use WorkSerializer in XdsClient to propagate updates in a synchronized manner (gh#grpc/grpc#27975). * Support Custom Post-handshake Verification in TlsCredentials (gh#grpc/grpc#25631). * Reintroduce the EventEngine default factory (gh#grpc/grpc#27920). * Assert Android API >= v21 (gh#grpc/grpc#27943). * Add support for abstract unix domain sockets (gh#grpc/grpc#27906). * C++: * OpenCensus: Move metadata storage to arena (gh#grpc/grpc#27948). * [C#] Add nullable type attributes to Grpc.Core.Api (gh#grpc/grpc#27887). * Update package name libgrpc++1 to libgrpc++1_43 in keeping with updated so number. Update to release 1.41.0 * xDS: Remove environmental variable guard for security. * xDS Security: Use new way to fetch certificate provider plugin instance config. * xDS server serving status: Use a struct to allow more fields to be added in the future. Update to release 1.39.1 * Fix C# protoc plugin argument parsing on 1.39.x Update to version 1.39.0: * Core * Initialize tcp_posix for CFStream when needed (gh#grpc/grpc#26530). * Update boringssl submodule (gh#grpc/grpc#26520). * Fix backup poller races (gh#grpc/grpc#26446). * Use default port 443 in HTTP CONNECT request (gh#grpc/grpc#26331). * C++ * New iomgr implementation backed by the EventEngine API (gh#grpc/grpc#26026). * async_unary_call: add a Destroy method, called by std::default_delete (gh#grpc/grpc#26389). * De-experimentalize C++ callback API (gh#grpc/grpc#25728). * PHP: stop reading composer.json file just to read the version string (gh#grpc/grpc#26156). * Ruby: Set XDS user agent in ruby via macros (gh#grpc/grpc#26268). Update to release 1.38.0 * Invalidate ExecCtx now before computing timeouts in all repeating timer events using a WorkSerializer or combiner. * Fix use-after-unref bug in fault_injection_filter * New gRPC EventEngine Interface * Allow the AWS_DEFAULT_REGION environment variable * s/OnServingStatusChange/OnServingStatusUpdate/ Update to release 1.37.1 * Use URI form of address for channelz listen node * Implementation CSDS (xDS Config Dump) * xDS status notifier * Remove CAS loops in global subchannel pool and simplify subchannel refcounting Update to release 1.36.4 * A fix for DNS SRV lookups on Windows Update to 1.36.1: * Core: * Remove unnecessary internal pollset set in c-ares DNS resolver * Support Default Root Certs in Tls Credentials * back-port: add env var protection for google-c2p resolver * C++: * Move third party identity C++ api out of experimental namespace * refactor!: change error_details functions to templates * Support ServerContext for callback API * PHP: * support for PSM security * fixed segfault on reused call object * fixed phpunit 8 warnings * Python: * Implement Python Client and Server xDS Creds Update to version 1.34.1: * Backport "Lazily import grpc_tools when using runtime stub/message generation" to 1.34.x (gh#grpc/grpc#25011). * Backport "do not use true on non-windows" to 1.34.x (gh#grpc/grpc#24995). Update to version 1.34.0: * Core: * Protect xds security code with the environment variable "GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT" (gh#grpc/grpc#24782). * Add support for "unix-abstract:" URIs to support abstract unix domain sockets (gh#grpc/grpc#24500). * Increment Index when parsing not plumbed SAN fields (gh#grpc/grpc#24601). * Revert "Revert "Deprecate GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS"" (gh#grpc/grpc#24518). * xds: Set status code to INVALID_ARGUMENT when NACKing (gh#grpc/grpc#24516). * Include stddef.h in address_sorting.h (gh#grpc/grpc#24514). * xds: Add support for case_sensitive option in RouteMatch (gh#grpc/grpc#24381). * C++: * Fix --define=grpc_no_xds=true builds (gh#grpc/grpc#24503). * Experimental support and tests for CreateCustomInsecureChannelWithInterceptorsFromFd (gh#grpc/grpc#24362). Update to release 1.33.2 * Deprecate GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS. * Expose Cronet error message to the application layer. * Remove grpc_channel_ping from surface API. * Do not send BDP pings if there is no receive side activity. Update to version 1.33.1 * Core * Deprecate GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS (gh#grpc/grpc#24063). * Expose Cronet error message to the application layer (gh#grpc/grpc#24083). * Remove grpc_channel_ping from surface API (gh#grpc/grpc#23894). * Do not send BDP pings if there is no receive side activity (gh#grpc/grpc#22997). * C++ * Makefile: only support building deps from submodule (gh#grpc/grpc#23957). * Add new subpackages - libupb and upb-devel. Currently, grpc sources include also upb sources. Before this change, libupb and upb-devel used to be included in a separate package - upb. Update to version 1.32.0: * Core * Remove stream from stalled lists on remove_stream (gh#grpc/grpc#23984). * Do not cancel RPC if send metadata size if larger than peer's limit (gh#grpc/grpc#23806). * Don't consider receiving non-OK status as an error for HTTP2 (gh#grpc/grpc#19545). * Keepalive throttling (gh#grpc/grpc#23313). * Include the target_uri in "target uri is not valid" error messages (gh#grpc/grpc#23782). * Fix "cannot send compressed message large than 1024B" in cronet_transport (gh#grpc/grpc#23219). * Receive SETTINGS frame on clients before declaring subchannel READY (gh#grpc/grpc#23636). * Enabled GPR_ABSEIL_SYNC (gh#grpc/grpc#23372). * Experimental xDS v3 support (gh#grpc/grpc#23281). * C++ * Upgrade bazel used for all tests to 2.2.0 (gh#grpc/grpc#23902). * Remove test targets and test helper libraries from Makefile (gh#grpc/grpc#23813). * Fix repeated builds broken by re2's cmake (gh#grpc/grpc#23587). * Log the peer address of grpc_cli CallMethod RPCs to stderr (gh#grpc/grpc#23557). opencensus-proto was updated to 0.3.0+git.20200721: * Update to version 0.3.0+git.20200721: * Bump version to 0.3.0 * Generate Go types using protocolbuffers/protobuf-go (#218) * Load proto_library() rule. (#216) * Update to version 0.2.1+git.20190826: * Remove grpc_java dependency and java_proto rules. (#214) * Add C++ targets, especially for gRPC services. (#212) * Upgrade bazel and dependencies to latest. (#211) * Bring back bazel cache to make CI faster. (#210) * Travis: don't require sudo for bazel installation. (#209) * Update to version 0.2.1: * Add grpc-gateway for metrics service. (#205) * Pin bazel version in travis builds (#207) * Update gen-go files (#199) * Add Web JS as a LibraryInfo.Language option (#198) * Set up Python packaging for PyPI release. (#197) * Add tracestate to links. (#191) * Python proto file generator and generated proto files (#196) * Ruby proto file generator and generated proto files (#192) * Add py_proto_library() rules for envoy/api. (#194) * Gradle: Upgrade dependency versions. (#193) * Update release versions for readme. (#189) * Start 0.3.0 development cycle * Update gen-go files. (#187) * Revert "Start 0.3.0 development cycle (#167)" (#183) * Revert optimization for metric descriptor and bucket options for now. (#184) * Constant sampler: add option to always follow the parent's decision. (#182) * Document that all maximum values must be specified. (#181) * Fix typo in bucket bounds. (#178) * Restrict people who can approve reviews. This is to ensure code quality. (#177) * Use bazel cache to make CI faster. (#176) * Add grpc generated files to the idea plugin. (#175) * Add Resource to Span (#174) * time is required (#170) * Upgrade protobuf dependency to v3.6.1.3. (#173) * assume Ok Status when not set (#171) * Minor comments fixes (#160) * Start 0.3.0 development cycle (#167) * Update gen-go files. (#162) * Update releasing instruction. (#163) * Fix Travis build. (#165) * Add OpenApi doc for trace agent grpc-gateway (#157) * Add command to generate OpenApi/Swagger doc for grpc-gateway (#156) * Update gen-go files (#155) * Add trace export grpc-gateway config (#77) * Fix bazel build after bazel upgrade (#154) * README: Add gitter, javadoc and godoc badge. (#151) * Update release versions for README. (#150) * Start 0.2.0 development cycle * Add resource and metrics_service proto to mkgogen. Re-generate gen-go files. (#147) * Add resource to protocol (#137) * Fix generating the javadoc. (#144) * Metrics/TimeSeries: start time should not be included while end time should. (#142) * README: Add instructions on using opencensus_proto with Bazel. (#140) * agent/README: update package info. (#138) * Agent: Add metrics service. (#136) * Tracing: Add default limits to TraceConfig. (#133) * Remove a stale TODO. (#134) * README: Add a note about go_proto_library rules. (#135) * add golang bazel build support (#132) * Remove exporter protos from mkgogen. (#128) * Update README and RELEASING. (#130) * Change histogram buckets definition to be OpenMetrics compatible. (#121) * Remove exporter/v1 protos. (#124) * Clean up the README for Agent proto. (#126) * Change Quantiles to ValuesAtPercentile. (#122) * Extend the TraceService service to support export/config for multiple Applications. (#119) * Add specifications on Agent implementation details. (#112) * Update gitignore (#118) * Remove maven support. Not used. (#116) * Add gauge distribution. (#117) * Add support for Summary type and value. (#110) * Add Maven status and instructions on adding dependencies. (#115) * Bump version to 0.0.3-SNAPSHOT * Bump version to 0.0.2 * Update gen-go files. (#114) * Gradle: Add missing source and javadoc rules. (#113) * Add support for float attributes. (#98) * Change from mean to sum in distribution. (#109) * Bump version to v0.0.2-SNAPSHOT * Bump version to v0.0.1 * Add releasing instructions in RELEASING.md. (#106) * Add Gradle build rules for generating gRPC service and releasing to Maven. (#102) * Re-organize proto directory structure. (#103) * Update gen-go files. (#101) * Add a note about interceptors of other libraries. (#94) * agent/common/v1: use exporter_version, core_library_version in LibraryInfo (#100) * opencensus/proto: add default Agent port to README (#97) * Update the message names for Config RPC. (#93) * Add details about agent protocol in the README. (#88) * Update gen-go files. (#92) * agent/trace/v1: fix signature for Config and comments too (#91) * Update gen-go files. (#86) * Make tracestate a list instead of a map to preserve ordering. (#84) * Allow MetricDescriptor to be sent only the first time. (#78) * Update mkgogen.sh. (#85) * Add agent trace service proto definitions. (#79) * Update proto and gen-go package names. (#83) * Add agent/common proto and BUILD. (#81) * Add trace_config.proto. (#80) * Build exporters with maven. (#76) * Make clear that cumulative int/float can go only up. (#75) * Add tracestate field to the Span proto. (#74) * gradle wrapper --gradle-version 4.9 (#72) * Change from multiple types of timeseries to have one. (#71) * Move exemplars in the Bucket. (#70) * Update gen-go files. (#69) * Move metrics in the top level directory. (#68) * Remove Range from Distribution. No backend supports this. (#67) * Remove unused MetricSet message. (#66) * Metrics: Add Exemplar to DistributionValue. (#62) * Gauge vs Cumulative. (#65) * Clarifying comment about bucket boundaries. (#64) * Make MetricDescriptor.Type capture the type of the value as well. (#63) * Regenerate the Go artifacts (#61) * Add export service proto (#60) * Initial version 20180523 protobuf was updated to 25.1: update to 25.1: * Raise warnings for deprecated python syntax usages * Add support for extensions in CRuby, JRuby, and FFI Ruby * Add support for options in CRuby, JRuby and FFI (#14594) update to 25.0: * Implement proto2/proto3 with editions * Defines Protobuf compiler version strings as macros and separates out suffix string definition. * Add utf8_validation feature back to the global feature set. * Setting up version updater to prepare for poison pills and embedding version info into C++, Python and Java gencode. * Merge the protobuf and upb Bazel repos * Editions: Introduce functionality to protoc for generating edition feature set defaults. * Editions: Migrate edition strings to enum in C++ code. * Create a reflection helper for ExtensionIdentifier. * Editions: Provide an API for C++ generators to specify their features. * Editions: Refactor feature resolution to use an intermediate message. * Publish extension declarations with declaration verifications. * Editions: Stop propagating partially resolved feature sets to plugins. * Editions: Migrate string_field_validation to a C++ feature * Editions: Include defaults for any features in the generated pool. * Protoc: parser rejects explicit use of map_entry option * Protoc: validate that reserved range start is before end * Protoc: support identifiers as reserved names in addition to string literals (only in editions) * Drop support for Bazel 5. * Allow code generators to specify whether or not they support editions. C++: * Set `PROTOBUF_EXPORT` on `InternalOutOfLineDeleteMessageLite()` * Update stale checked-in files * Apply PROTOBUF_NOINLINE to declarations of some functions that want it. * Implement proto2/proto3 with editions * Make JSON UTF-8 boundary check inclusive of the largest possible UTF-8 character. * Reduce `Map::size_type` to 32-bits. Protobuf containers can't have more than that * Defines Protobuf compiler version strings as macros and separates out suffix string definition. * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated oneof accessors. * Fix bug in reflection based Swap of map fields. * Add utf8_validation feature back to the global feature set. * Setting up version updater to prepare for poison pills and embedding version info into C++, Python and Java gencode. * Add prefetching to arena allocations. * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated repeated and map field accessors. * Editions: Migrate edition strings to enum in C++ code. * Create a reflection helper for ExtensionIdentifier. * Editions: Provide an API for C++ generators to specify their features. * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated string field accessors. * Editions: Refactor feature resolution to use an intermediate message. * Fixes for 32-bit MSVC. * Publish extension declarations with declaration verifications. * Export the constants in protobuf's any.h to support DLL builds. * Implement AbslStringify for the Descriptor family of types. * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated message field accessors. * Editions: Stop propagating partially resolved feature sets to plugins. * Editions: Migrate string_field_validation to a C++ feature * Editions: Include defaults for any features in the generated pool. * Introduce C++ feature for UTF8 validation. * Protoc: validate that reserved range start is before end * Remove option to disable the table-driven parser in protoc. * Lock down ctype=CORD in proto file. * Support split repeated fields. * In OSS mode omit some extern template specializations. * Allow code generators to specify whether or not they support editions. Java: * Implement proto2/proto3 with editions * Remove synthetic oneofs from Java gencode field accessor tables. * Timestamps.parse: Add error handling for invalid hours/minutes in the timezone offset. * Defines Protobuf compiler version strings as macros and separates out suffix string definition. * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated oneof accessors. * Add missing debugging version info to Protobuf Java gencode when multiple files are generated. * Fix a bad cast in putBuilderIfAbsent when already present due to using the result of put() directly (which is null if it currently has no value) * Setting up version updater to prepare for poison pills and embedding version info into C++, Python and Java gencode. * Fix a NPE in putBuilderIfAbsent due to using the result of put() directly (which is null if it currently has no value) * Update Kotlin compiler to escape package names * Add MapFieldBuilder and change codegen to generate it and the put{field}BuilderIfAbsent method. * Introduce recursion limit in Java text format parsing * Consider the protobuf.Any invalid if typeUrl.split("/") returns an empty array. * Mark `FieldDescriptor.hasOptionalKeyword()` as deprecated. * Fixed Python memory leak in map lookup. * Loosen upb for json name conflict check in proto2 between json name and field * Defines Protobuf compiler version strings as macros and separates out suffix string definition. * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated oneof accessors. * Ensure Timestamp.ToDatetime(tz) has correct offset * Do not check required field for upb python MergeFrom * Setting up version updater to prepare for poison pills and embedding version info into C++, Python and Java gencode. * Merge the protobuf and upb Bazel repos * Comparing a proto message with an object of unknown returns NotImplemented * Emit **slots** in pyi output as a tuple rather than a list for --pyi_out. * Fix a bug that strips options from descriptor.proto in Python. * Raise warings for message.UnknownFields() usages and navigate to the new add * Add protobuf python keyword support in path for stub generator. * Add tuple support to set Struct * ### Python C-Extension (Default) * Comparing a proto message with an object of unknown returns NotImplemented * Check that ffi-compiler loads before using it to define tasks. UPB (Python/PHP/Ruby C-Extension): * Include .inc files directly instead of through a filegroup * Loosen upb for json name conflict check in proto2 between json name and field * Add utf8_validation feature back to the global feature set. * Do not check required field for upb python MergeFrom * Merge the protobuf and upb Bazel repos * Added malloc_trim() calls to Python allocator so RSS will decrease when memory is freed * Upb: fix a Python memory leak in ByteSize() * Support ASAN detection on clang * Upb: bugfix for importing a proto3 enum from within a proto2 file * Expose methods needed by Ruby FFI using UPB_API * Fix `PyUpb_Message_MergeInternal` segfault * Build with source and target levels 8 * fixes build with JDK21 * Install the pom file with the new %%mvn_install_pom macro * Do not install the pom-only artifacts, since the %%mvn_install_pom macro resolves the variables at the install time update to 23.4: * Add dllexport_decl for generated default instance. * Deps: Update Guava to 32.0.1 update to 23.3: C++: * Regenerate stale files * Use the same ABI for static and shared libraries on non- Windows platforms * Add a workaround for GCC constexpr bug Objective-C: * Regenerate stale files UPB (Python/PHP/Ruby C-Extension) * Fixed a bug in `upb_Map_Delete()` that caused crashes in map.delete(k) for Ruby when string-keyed maps were in use. Compiler: * Add missing header to Objective-c generator * Add a workaround for GCC constexpr bug Java: * Rollback of: Simplify protobuf Java message builder by removing methods that calls the super class only. Csharp: * [C#] Replace regex that validates descriptor names update to 22.5: C++: * Add missing cstdint header * Fix: missing -DPROTOBUF_USE_DLLS in pkg- config (#12700) * Avoid using string(JOIN..., which requires cmake 3.12 * Explicitly include GTest package in examples * Bump Abseil submodule to 20230125.3 (#12660) update to 22.4: C++: * Fix libprotoc: export useful symbols from .so Python: * Fix bug in _internal_copy_files where the rule would fail in downstream repositories. Other: * Bump utf8_range to version with working pkg-config (#12584) * Fix declared dependencies for pkg-config * Update abseil dependency and reorder dependencies to ensure we use the version specified in protobuf_deps. * Turn off clang::musttail on i386 update to v22.3 UPB (Python/PHP/Ruby C-Extension): * Remove src prefix from proto import * Fix .gitmodules to use the correct absl branch * Remove erroneous dependency on googletest update to 22.2: Java: * Add version to intra proto dependencies and add kotlin stdlib dependency * Add $ back for osgi header * Remove $ in pom files update to 22.1: * Add visibility of plugin.proto to python directory * Strip "src" from file name of plugin.proto * Add OSGi headers to pom files. * Remove errorprone dependency from kotlin protos. * Version protoc according to the compiler version number. * update to 22.0: * This version includes breaking changes to: Cpp. Please refer to the migration guide for information: https://protobuf.dev/support/migration/#compiler-22 * [Cpp] Migrate to Abseil's logging library. * [Cpp] `proto2::Map::value_type` changes to `std::pair`. * [Cpp] Mark final ZeroCopyInputStream, ZeroCopyOutputStream, and DefaultFieldComparator classes. * [Cpp] Add a dependency on Abseil (#10416) * [Cpp] Remove all autotools usage (#10132) * [Cpp] Add C++20 reserved keywords * [Cpp] Dropped C++11 Support * [Cpp] Delete Arena::Init * [Cpp] Replace JSON parser with new implementation * [Cpp] Make RepeatedField::GetArena non-const in order to support split RepeatedFields. * long list of bindings specific fixes see https://github.com/protocolbuffers/protobuf/releases/tag/v22.0 update to v21.12: * Python: * Fix broken enum ranges (#11171) * Stop requiring extension fields to have a sythetic oneof (#11091) * Python runtime 4.21.10 not works generated code can not load valid proto. update to 21.11: * Python: * Add license file to pypi wheels (#10936) * Fix round-trip bug (#10158) update to 21.10:: * Java: * Use bit-field int values in buildPartial to skip work on unset groups of fields. (#10960) * Mark nested builder as clean after clear is called (#10984) update to 21.9: * Ruby: * Replace libc strdup usage with internal impl to restore musl compat (#10818) * Auto capitalize enums name in Ruby (#10454) (#10763) * Other: * Fix for grpc.tools #17995 & protobuf #7474 (handle UTF-8 paths in argumentfile) (#10721) * C++: * 21.x No longer define no_threadlocal on OpenBSD (#10743) * Java: * Mark default instance as immutable first to avoid race during static initialization of default instances (#10771) * Refactoring java full runtime to reuse sub-message builders and prepare to migrate parsing logic from parse constructor to builder. * Move proto wireformat parsing functionality from the private "parsing constructor" to the Builder class. * Change the Lite runtime to prefer merging from the wireformat into mutable messages rather than building up a new immutable object before merging. This way results in fewer allocations and copy operations. * Make message-type extensions merge from wire-format instead of building up instances and merging afterwards. This has much better performance. * Fix TextFormat parser to build up recurring (but supposedly not repeated) sub-messages directly from text rather than building a new sub-message and merging the fully formed message into the existing field. update to 21.6: C++: * Reduce memory consumption of MessageSet parsing update to 21.5: PHP: * Added getContainingOneof and getRealContainingOneof to descriptor. * fix PHP readonly legacy files for nested messages Python: * Fixed comparison of maps in Python. * update to 21.4: * Reduce the required alignment of ArenaString from 8 to 4 * update to 21.3: * C++: * Add header search paths to Protobuf-C++.podspec (#10024) * Fixed Visual Studio constinit errors (#10232) * Fix #9947: make the ABI compatible between debug and non-debug builds (#10271) * UPB: * Allow empty package names (fixes behavior regression in 4.21.0) * Fix a SEGV bug when comparing a non-materialized sub-message (#10208) * Fix several bugs in descriptor mapping containers (eg. descriptor.services_by_name) * for x in mapping now yields keys rather than values, to match Python conventions and the behavior of the old library. * Lookup operations now correctly reject unhashable types as map keys. * We implement repr() to use the same format as dict. * Fix maps to use the ScalarMapContainer class when appropriate * Fix bug when parsing an unknown value in a proto2 enum extension (protocolbuffers/upb#717) * PHP: * Add "readonly" as a keyword for PHP and add previous classnames to descriptor pool (#10041) * Python: * Make //:protobuf_python and //:well_known_types_py_pb2 public (#10118) * Bazel: * Add back a filegroup for :well_known_protos (#10061) Update to 21.2: \- C++: \- cmake: Call get_filename_component() with DIRECTORY mode instead of PATH mode (#9614) \- Escape GetObject macro inside protoc- generated code (#9739) \- Update CMake configuration to add a dependency on Abseil (#9793) \- Fix cmake install targets (#9822) \- Use __constinit only in GCC 12.2 and up (#9936) \- Java: \- Update protobuf_version.bzl to separate protoc and per-language java ? (#9900) \- Python: \- Increment python major version to 4 in version.json for python upb (#9926) \- The C extension module for Python has been rewritten to use the upb library. \- This is expected to deliver significant performance benefits, especially when parsing large payloads. There are some minor breaking changes, but these should not impact most users. For more information see: https://developers.google.com/protocol- buffers/docs/news/2022-05-06#python-updates \- PHP: \- [PHP] fix PHP build system (#9571) \- Fix building packaged PHP extension (#9727) \- fix: reserve "ReadOnly" keyword for PHP 8.1 and add compatibility (#9633) \- fix: phpdoc syntax for repeatedfield parameters (#9784) \- fix: phpdoc for repeatedfield (#9783) \- Change enum string name for reserved words (#9780) \- chore: [PHP] fix phpdoc for MapField keys (#9536) \- Fixed PHP SEGV by not writing to shared memory for zend_class_entry. (#9996) \- Ruby: \- Allow pre-compiled binaries for ruby 3.1.0 (#9566) \- Implement respond_to? in RubyMessage (#9677) \- [Ruby] Fix RepeatedField#last, #first inconsistencies (#9722) \- Do not use range based UTF-8 validation in truffleruby (#9769) \- Improve range handling logic of RepeatedField (#9799) \- Other: \- Fix invalid dependency manifest when using descriptor_set_out (#9647) \- Remove duplicate java generated code (#9909) * Update to 3.20.1: * PHP: * Fix building packaged PHP extension (#9727) * Fixed composer.json to only advertise compatibility with PHP 7.0+. (#9819) * Ruby: * Disable the aarch64 build on macOS until it can be fixed. (#9816) * Other: * Fix versioning issues in 3.20.0 * Update to 3.20.1: * Ruby: * Dropped Ruby 2.3 and 2.4 support for CI and releases. (#9311) * Added Ruby 3.1 support for CI and releases (#9566). * Message.decode/encode: Add recursion_limit option (#9218/#9486) * Allocate with xrealloc()/xfree() so message allocation is visible to the * Ruby GC. In certain tests this leads to much lower memory usage due to more * frequent GC runs (#9586). * Fix conversion of singleton classes in Ruby (#9342) * Suppress warning for intentional circular require (#9556) * JSON will now output shorter strings for double and float fields when possible * without losing precision. * Encoding and decoding of binary format will now work properly on big-endian * systems. * UTF-8 verification was fixed to properly reject surrogate code points. * Unknown enums for proto2 protos now properly implement proto2's behavior of * putting such values in unknown fields. * Java: * Revert "Standardize on Array copyOf" (#9400) * Resolve more java field accessor name conflicts (#8198) * Fix parseFrom to only throw InvalidProtocolBufferException * InvalidProtocolBufferException now allows arbitrary wrapped Exception types. * Fix bug in FieldSet.Builder.mergeFrom * Flush CodedOutputStream also flushes underlying OutputStream * When oneof case is the same and the field type is Message, merge the * subfield. (previously it was replaced.)? * Add @CheckReturnValue to some protobuf types * Report original exceptions when parsing JSON * Add more info to @deprecated javadoc for set/get/has methods * Fix initialization bug in doc comment line numbers * Fix comments for message set wire format. * Kotlin: * Add test scope to kotlin-test for protobuf-kotlin-lite (#9518) * Add orNull extensions for optional message fields. * Add orNull extensions to all proto3 message fields. * Python: * Dropped support for Python < 3.7 (#9480) * Protoc is now able to generate python stubs (.pyi) with \--pyi_out * Pin multibuild scripts to get manylinux1 wheels back (#9216) * Fix type annotations of some Duration and Timestamp methods. * Repeated field containers are now generic in field types and could be used in type annotations. * Protobuf python generated codes are simplified. Descriptors and message classes' definitions are now dynamic created in internal/builder.py. * Insertion Points for messages classes are discarded. * has_presence is added for FieldDescriptor in python * Loosen indexing type requirements to allow valid index() implementations rather than only PyLongObjects. * Fix the deepcopy bug caused by not copying message_listener. * Added python JSON parse recursion limit (default 100) * Path info is added for python JSON parse errors * Pure python repeated scalar fields will not able to pickle. Convert to list first. * Timestamp.ToDatetime() now accepts an optional tzinfo parameter. If specified, the function returns a timezone-aware datetime in the given time zone. If omitted or None, the function returns a timezone-naive UTC datetime (as previously). * Adds client_streaming and server_streaming fields to MethodDescriptor. * Add "ensure_ascii" parameter to json_format.MessageToJson. This allows smaller JSON serializations with UTF-8 or other non-ASCII encodings. * Added experimental support for directly assigning numpy scalars and array. * Improve the calculation of public_dependencies in DescriptorPool. * [Breaking Change] Disallow setting fields to numpy singleton arrays or repeated fields to numpy multi-dimensional arrays. Numpy arrays should be indexed or flattened explicitly before assignment. * Compiler: * Migrate IsDefault(const std::string _) and UnsafeSetDefault(const std::string_ ) * Implement strong qualified tags for TaggedPtr * Rework allocations to power-of-two byte sizes. * Migrate IsDefault(const std::string _) and UnsafeSetDefault(const std::string_ ) * Implement strong qualified tags for TaggedPtr * Make TaggedPtr Set...() calls explicitly spell out the content type. * Check for parsing error before verifying UTF8. * Enforce a maximum message nesting limit of 32 in the descriptor builder to * guard against stack overflows * Fixed bugs in operators for RepeatedPtrIterator * Assert a maximum map alignment for allocated values * Fix proto1 group extension protodb parsing error * Do not log/report the same descriptor symbol multiple times if it contains * more than one invalid character. * Add UnknownFieldSet::SerializeToString and SerializeToCodedStream. * Remove explicit default pointers and deprecated API from protocol compiler * Arenas: * Change Repeated*Field to reuse memory when using arenas. * Implements pbarenaz for profiling proto arenas * Introduce CreateString() and CreateArenaString() for cleaner semantics * Fix unreferenced parameter for MSVC builds * Add UnsafeSetAllocated to be used for one-of string fields. * Make Arena::AllocateAligned() a public function. * Determine if ArenaDtor related code generation is necessary in one place. * Implement on demand register ArenaDtor for InlinedStringField * C++: * Enable testing via CTest (#8737) * Add option to use external GTest in CMake (#8736) * CMake: Set correct sonames for libprotobuf-lite.so and libprotoc.so (#8635) (#9529) * Add cmake option protobuf_INSTALL to not install files (#7123) * CMake: Allow custom plugin options e.g. to generate mocks (#9105) * CMake: Use linker version scripts (#9545) * Manually *struct Cord fields to work better with arenas. * Manually destruct map fields. * Generate narrower code * Fix #9378 by removing * shadowed cached_size field * Remove GetPointer() and explicit nullptr defaults. * Add proto_h flag for speeding up large builds * Add missing overload for reference wrapped fields. * Add MergedDescriptorDatabase::FindAllFileNames() * RepeatedField now defines an iterator type instead of using a pointer. * Remove obsolete macros GOOGLE_PROTOBUF_HAS_ONEOF and GOOGLE_PROTOBUF_HAS_ARENAS. * PHP: * Fix: add missing reserved classnames (#9458) * PHP 8.1 compatibility (#9370) * C#: * Fix trim warnings (#9182) * Fixes NullReferenceException when accessing FieldDescriptor.IsPacked (#9430) * Add ToProto() method to all descriptor classes (#9426) * Add an option to preserve proto names in JsonFormatter (#6307) * Objective-C: * Add prefix_to_proto_package_mappings_path option. (#9498) * Rename proto_package_to_prefix_mappings_path to package_to_prefix_mappings_path. (#9552) * Add a generation option to control use of forward declarations in headers. (#9568) * update to 3.19.4: Python: * Make libprotobuf symbols local on OSX to fix issue #9395 (#9435) Ruby: * Fixed a data loss bug that could occur when the number of optional fields in a message is an exact multiple of 32 PHP: * Fixed a data loss bug that could occur when the number of optional fields in a message is an exact multiple of 32. * Update to 3.19.3: C++: * Make proto2::Message::DiscardUnknownFields() non-virtual * Separate RepeatedPtrField into its own header file * For default floating point values of 0, consider all bits significant * Fix shadowing warnings * Fix for issue #8484, constant initialization doesn't compile in msvc clang-cl environment Java: * Improve performance characteristics of UnknownFieldSet parsing * For default floating point values of 0, consider all bits significant * Annotate //java/com/google/protobuf/util/... with nullness annotations * Use ArrayList copy constructor Bazel: * Ensure that release archives contain everything needed for Bazel * Align dependency handling with Bazel best practices Javascript: * Fix ReferenceError: window is not defined when getting the global object Ruby: * Fix memory leak in MessageClass.encode * Override Map.clone to use Map's dup method * Ruby: build extensions for arm64-darwin * Add class method Timestamp.from_time to ruby well known types * Adopt pure ruby DSL implementation for JRuby * Add size to Map class * Fix for descriptor_pb.rb: google/protobuf should be required first Python: * Proto2 DecodeError now includes message name in error message * Make MessageToDict convert map keys to strings * Add python-requires in setup.py * Add python 3.10 * Update to 3.17.3: C++ * Introduce FieldAccessListener. * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class * Provide stable versions of SortAndUnique(). * Make sure to cache proto3 optional message fields when they are cleared. * Expose UnsafeArena methods to Reflection. * Use std::string::empty() rather than std::string::size() > 0. * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296) * Fix PROTOBUF_CONSTINIT macro redefinition (#8323) * Delete StringPiecePod (#8353) * Create a CMake option to control whether or not RTTI is enabled (#8347) * Make util::Status more similar to absl::Status (#8405) * The ::pb namespace is no longer exposed due to conflicts. * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous calls instead of crashing. * Reduce the size of generated proto headers for protos with string or bytes fields. * Move arena() operation on uncommon path to out-of-line routine * For iterator-pair function parameter types, take both iterators by value. * Code-space savings and perhaps some modest performance improvements in * RepeatedPtrField. * Eliminate nullptr check from every tag parse. * Remove unused _$name$cached_byte_size fields. * Serialize extension ranges together when not broken by a proto field in the middle. * Do out-of-line allocation and deallocation of string object in ArenaString. * Streamline ParseContext::ParseMessage to avoid code bloat and improve performance. * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}. on an error path. * util::DefaultFieldComparator will be final in a future version of protobuf. * Subclasses should inherit from SimpleFieldComparator instead. Kotlin * Introduce support for Kotlin protos (#8272) * Restrict extension setter and getter operators to non-nullable T. Java * Fixed parser to check that we are at a proper limit when a sub-message has finished parsing. * updating GSON and Guava to more recent versions (#8524) * Reduce the time spent evaluating isExtensionNumber by storing the extension ranges in a TreeMap for faster queries. This is particularly relevant for protos which define a large number of extension ranges, for example when each tag is defined as an extension. * Fix java bytecode estimation logic for optional fields. * Optimize Descriptor.isExtensionNumber. * deps: update JUnit and Truth (#8319) * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented. * Exceptions thrown while reading from an InputStream in parseFrom are now included as causes. * Support potentially more efficient proto parsing from RopeByteStrings. * Clarify runtime of ByteString.Output.toStringBuffer(). * Added UnsafeByteOperations to protobuf-lite (#8426) Python: * Add MethodDescriptor.CopyToProto() (#8327) * Remove unused python_protobuf.{cc,h} (#8513) * Start publishing python aarch64 manylinux wheels normally (#8530) * Fix constness issue detected by MSVC standard conforming mode (#8568) * Make JSON parsing match C++ and Java when multiple fields from the same oneof are present and all but one is null. * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344) * Switch on "new" buffer API (#8339) * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280) * Fixed a bug in text format where a trailing colon was printed for repeated field. * When TextFormat encounters a duplicate message map key, replace the current one instead of merging. Ruby: * Add support for proto3 json_name in compiler and field definitions (#8356) * Fixed memory leak of Ruby arena objects. (#8461) * Fix source gem compilation (#8471) * Fix various exceptions in Ruby on 64-bit Windows (#8563) * Fix crash when calculating Message hash values on 64-bit Windows (#8565) General: * Support M1 (#8557) Update to 3.15.8: \- Fixed memory leak of Ruby arena objects (#8461) Update to 3.15.7: C++: * Remove the ::pb namespace (alias) (#8423) Ruby: * Fix unbounded memory growth for Ruby <2.7 (#8429) * Fixed message equality in cases where the message type is different (#8434) update to 3.15.6: Ruby: * Fixed bug in string comparison logic (#8386) * Fixed quadratic memory use in array append (#8379) * Fixed SEGV when users pass nil messages (#8363) * Fixed quadratic memory usage when appending to arrays (#8364) * Ruby <2.7 now uses WeakMap too, which prevents memory leaks. (#8341) * Fix for FieldDescriptor.get(msg) (#8330) * Bugfix for Message.[] for repeated or map fields (#8313) PHP: * read_property() handler is not supposed to return NULL (#8362) Protocol Compiler * Optional fields for proto3 are enabled by default, and no longer require the --experimental_allow_proto3_optional flag. C++: * Do not disable RTTI by default in the CMake build (#8377) * Create a CMake option to control whether or not RTTI is enabled (#8361) * Fix PROTOBUF_CONSTINIT macro redefinition (#8323) * MessageDifferencer: fixed bug when using custom ignore with multiple unknown fields * Use init_seg in MSVC to push initialization to an earlier phase. * Runtime no longer triggers -Wsign-compare warnings. * Fixed -Wtautological-constant-out-of-range-compare warning. * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled * Arena is refactored and optimized. * Clarified/specified that the exact value of Arena::SpaceAllocated() is an implementation detail users must not rely on. It should not be used in unit tests. * Change the signature of Any::PackFrom() to return false on error. * Add fast reflection getter API for strings. * Constant initialize the global message instances * Avoid potential for missed wakeup in UnknownFieldSet * Now Proto3 Oneof fields have "has" methods for checking their presence in C++. * Bugfix for NVCC * Return early in _InternalSerialize for empty maps. * Adding functionality for outputting map key values in proto path logging output (does not affect comparison logic) and stop printing 'value' in the path. The modified print functionality is in the MessageDifferencer::StreamReporter. * Fixed https://github.com/protocolbuffers/protobuf/issues/8129 * Ensure that null char symbol, package and file names do not result in a crash. * Constant initialize the global message instances * Pretty print 'max' instead of numeric values in reserved ranges. * Removed remaining instances of std::is_pod, which is deprecated in C++20. * Changes to reduce code size for unknown field handling by making uncommon cases out of line. * Fix std::is_pod deprecated in C++20 (#7180) * Fix some -Wunused-parameter warnings (#8053) * Fix detecting file as directory on zOS issue #8051 (#8052) * Don't include sys/param.h for _BYTE_ORDER (#8106) * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154) * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159) * Fix for compiler warning issue#8145 (#8160) * fix: support deprecated enums for GCC < 6 (#8164) * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125) Python: * Provided an override for the reverse() method that will reverse the internal collection directly instead of using the other methods of the BaseContainer. * MessageFactory.CreateProtoype can be overridden to customize class creation. * Fix PyUnknownFields memory leak (#7928) * Add macOS big sur compatibility (#8126) JavaScript * Generate `getDescriptor` methods with `*` as their `this` type. * Enforce `let/const` for generated messages. * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with negative bitsLow and low but non-zero bitsHigh parameter. (#8170) PHP: * Added support for PHP 8. (#8105) * unregister INI entries and fix invalid read on shutdown (#8042) * Fix PhpDoc comments for message accessors to include "|null". (#8136) * fix: convert native PHP floats to single precision (#8187) * Fixed PHP to support field numbers >=2* _28\. (#8235) * feat: add support for deprecated fields to PHP compiler (#8223) * Protect against stack overflow if the user derives from Message. (#8248) * Fixed clone for Message, RepeatedField, and MapField. (#8245) * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258) Ruby: * Added support for Ruby 3. (#8184) * Rewrote the data storage layer to be based on upb_msg objects from the upb library. This should lead to much better parsing performance, particularly for large messages. (#8184). * Fill out JRuby support (#7923) * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite recursion/run out of memory (#8195) * Fix jruby support to handle messages nested more than 1 level deep (#8194) Java: * Avoid possible UnsupportedOperationException when using CodedInputSteam with a direct ByteBuffer. * Make Durations.comparator() and Timestamps.comparator() Serializable. * Add more detailed error information for dynamic message field type validation failure * Removed declarations of functions declared in java_names.h from java_helpers.h. * Now Proto3 Oneof fields have "has" methods for checking their presence in Java. * Annotates Java proto generated __FIELD_NUMBER constants. * Add -assumevalues to remove JvmMemoryAccessor on Android. C#: * Fix parsing negative Int32Value that crosses segment boundary (#8035) * Change ByteString to use memory and support unsafe create without copy (#7645) * Optimize MapField serialization by removing MessageAdapter (#8143) * Allow FileDescriptors to be parsed with extension registries (#8220) * Optimize writing small strings (#8149) * Updated URL to https://github.com/protocolbuffers/protobuf Update to v3.14.0 Protocol Compiler: * The proto compiler no longer requires a .proto filename when it is not generating code. * Added flag `--deterministic_output` to `protoc --encode=...`. * Fixed deadlock when using google.protobuf.Any embedded in aggregate options. C++: * Arenas are now unconditionally enabled. cc_enable_arenas no longer has any effect. * Removed inlined string support, which is incompatible with arenas. * Fix a memory corruption bug in reflection when mixing optional and non-optional fields. * Make SpaceUsed() calculation more thorough for map fields. * Add stack overflow protection for text format with unknown field values. * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds error was encountered. * Performance improvements for Map. * Minor formatting fix when dumping a descriptor to .proto format with DebugString. * UBSAN fix in RepeatedField * When running under ASAN, skip a test that makes huge allocations. * Fixed a crash that could happen when creating more than 256 extensions in a single message. * Fix a crash in BuildFile when passing in invalid descriptor proto. * Parser security fix when operating with CodedInputStream. * Warn against the use of AllowUnknownExtension. * Migrated to C++11 for-range loops instead of index-based loops where possible. This fixes a lot of warnings when compiling with -Wsign-compare. * Fix segment fault for proto3 optional * Adds a CMake option to build `libprotoc` separately Java * Bugfix in mergeFrom() when a oneof has multiple message fields. * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read 0 bytes when not at EOF. * Redefine remove(Object) on primitive repeated field Lists to avoid autoboxing. * Support "\u" escapes in textformat string literals. * Trailing empty spaces are no longer ignored for FieldMask. * Fix FieldMaskUtil.subtract to recursively remove mask. * Mark enums with `@java.lang.Deprecated` if the proto enum has option `deprecated = true;`. * Adding forgotten duration.proto to the lite library Python: * Print google.protobuf.NullValue as null instead of "NULL_VALUE" when it is used outside WKT Value/Struct. * Fix bug occurring when attempting to deep copy an enum type in python 3. * Add a setuptools extension for generating Python protobufs * Remove uses of pkg_resources in non-namespace packages * [bazel/py] Omit google/ **init**.py from the Protobuf runtime * Removed the unnecessary setuptools package dependency for Python package * Fix PyUnknownFields memory leak PHP: * Added support for "==" to the PHP C extension * Added `==` operators for Map and Array * Native C well-known types * Optimized away hex2bin() call in generated code * New version of upb, and a new hash function wyhash in third_party * add missing hasOneof method to check presence of oneof fields Go: * Update go_package options to reference google.golang.org/protobuf module. C#: * annotate ByteString.CopyFrom(ReadOnlySpan) as SecuritySafeCritical * Fix C# optional field reflection when there are regular fields too * Fix parsing negative Int32Value that crosses segment boundary Javascript: * JS: parse (un)packed fields conditionally Update to version 3.13.0 PHP: * The C extension is completely rewritten. The new C extension has significantly better parsing performance and fixes a handful of conformance issues. It will also make it easier to add support for more features like proto2 and proto3 presence. * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP. C++: * Removed deprecated unsafe arena string accessors * Enabled heterogeneous lookup for std::string keys in maps. * Removed implicit conversion from StringPiece to std::string * Fix use-after- destroy bug when the Map is allocated in the arena. * Improved the randomness of map ordering * Added stack overflow protection for text format with unknown fields * Use std::hash for proto maps to help with portability. * Added more Windows macros to proto whitelist. * Arena constructors for map entry messages are now marked "explicit" (for regular messages they were already explicit). * Fix subtle aliasing bug in RepeatedField::Add * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset fields. Python: * JSON format conformance fixes: * Reject lowercase t for Timestamp json format. * Print full_name directly for extensions (no camelCase). * Reject boolean values for integer fields. * Reject NaN, Infinity, -Infinity that is not quoted. * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding. * Bugfix for fields/files named "async" or "await". * Improved the error message when AttributeError is returned from **getattr** in EnumTypeWrapper. Java: * Fixed a bug where setting optional proto3 enums with setFooValue() would not mark the value as present. * Add Subtract function to FieldMaskUtil. C#: * Dropped support for netstandard1.0 (replaced by support for netstandard1.1). This was required to modernize the parsing stack to use the `Span<byte>` type internally * Add `ParseFrom(ReadOnlySequence<byte>)` method to enable GC friendly parsing with reduced allocations and buffer copies * Add support for serialization directly to a `IBufferWriter<byte>` or to a `Span<byte>` to enable GC friendly serialization. The new API is available as extension methods on the `IMessage` type * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make generated code compatible with old C# compilers (pre-roslyn compilers from .NET framework and old versions of mono) that do not support ref structs. Users that are still on a legacy stack that does not support C# 7.2 compiler might need to use the new define in their projects to be able to build the newly generated code * Due to the major overhaul of parsing and serialization internals, it is recommended to regenerate your generated code to achieve the best performance (the legacy generated code will still work, but might incur a slight performance penalty). Update to version 3.12.3; notable changes since 3.11.4: Protocol Compiler: * [experimental] Singular, non-message typed fields in proto3 now support presence tracking. This is enabled by adding the "optional" field label and passing the --experimental_allow_proto3_optional flag to protoc. * For usage info, see docs/field_presence.md. * During this experimental phase, code generators should update to support proto3 presence, see docs/implementing_proto3_presence.md for instructions. * Allow duplicate symbol names when multiple descriptor sets are passed on the command-line, to match the behavior when multiple .proto files are passed. * Deterministic `protoc --descriptor_set_out` (#7175) Objective-C: * Tweak the union used for Extensions to support old generated code. #7573 * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538) * [experimental] ObjC Proto3 optional support (#7421) * Block subclassing of generated classes (#7124) * Use references to Obj C classes instead of names in descriptors. (#7026) * Revisit how the WKTs are bundled with ObjC. (#7173) C++: * Simplified the template export macros to fix the build for mingw32. (#7539) * [experimental] Added proto3 presence support. * New descriptor APIs to support proto3 presence. * Enable Arenas by default on all .proto files. * Documented that users are not allowed to subclass Message or MessageLite. * Mark generated classes as final; inheriting from protos is strongly discouraged. * Add stack overflow protection for text format with unknown fields. * Add accessors for map key and value FieldDescriptors. * Add FieldMaskUtil::FromFieldNumbers(). * MessageDifferencer: use ParsePartial() on Any fields so the diff does not fail when there are missing required fields. * ReflectionOps::Merge(): lookup messages in the right factory, if it can. * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type() accessor as an easier way of determining if a message is a Well-Known Type. * Optimized RepeatedField::Add() when it is used in a loop. * Made proto move/swap more efficient. * De-virtualize the GetArena() method in MessageLite. * Improves performance of json_stream_parser.cc by factor 1000 (#7230) * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087) * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print an "optional" label for a field in a oneof. * Fix bug in parsing bool extensions that assumed they are always 1 byte. * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present. * Clarified the comments to show an example of the difference between Descriptor::extension and DescriptorPool::FindAllExtensions. * Add a compiler option 'code_size' to force optimize_for=code_size on all protos where this is possible. Ruby: * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however many people still use them and dropping support will require more coordination. * [experimental] Implemented proto3 presence for Ruby. (#7406) * Stop building binary gems for ruby <2.5 (#7453) * Fix for wrappers with a zero value (#7195) * Fix for JSON serialization of 0/empty- valued wrapper types (#7198) * Call "Class#new" over rb_class_new_instance in decoding (#7352) * Build extensions for Ruby 2.7 (#7027) * assigning 'nil' to submessage should clear the field. (#7397) Java: * [experimental] Added proto3 presence support. * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated * reduce size for enums with allow_alias set to true. * Sort map fields alphabetically by the field's key when printing textproto. * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508). * TextFormat.merge() handles Any as top level type. * Throw a descriptive IllegalArgumentException when calling getValueDescriptor() on enum special value UNRECOGNIZED instead of ArrayIndexOutOfBoundsException. * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts() would override the configuration passed into includingDefaultValueFields(). * Implement overrides of indexOf() and contains() on primitive lists returned for repeated fields to avoid autoboxing the list contents. * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor. * [bazel] Move Java runtime/toolchains into //java (#7190) Python: * [experimental] Added proto3 presence support. * [experimental] fast import protobuf module, only works with cpp generated code linked in. * Truncate 'float' fields to 4 bytes of precision in setters for pure-Python implementation (C++ extension was already doing this). * Fixed a memory leak in C++ bindings. * Added a deprecation warning when code tries to create Descriptor objects directly. * Fix unintended comparison between bytes and string in descriptor.py. * Avoid printing excess digits for float fields in TextFormat. * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code. * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396) JavaScript: * Fix js message pivot selection (#6813) PHP: * Persistent Descriptor Pool (#6899) * Implement lazy loading of php class for proto messages (#6911) * Correct @return in Any.unpack docblock (#7089) * Ignore unknown enum value when ignore_unknown specified (#7455) C#: * [experimental] Add support for proto3 presence fields in C# (#7382) * Mark GetOption API as obsolete and expose the "GetOptions()" method on descriptors instead (#7491) * Remove Has/Clear members for C# message fields in proto2 (#7429) * Enforce recursion depth checking for unknown fields (#7132) * Fix conformance test failures for Google.Protobuf (#6910) * Cleanup various bits of Google.Protobuf (#6674) * Fix latest ArgumentException for C# extensions (#6938) * Remove unnecessary branch from ReadTag (#7289) Other: * Add a proto_lang_toolchain for javalite (#6882) * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237) * Add application note for explicit presence tracking. (#7390) * Howto doc for implementing proto3 presence in a code generator. (#7407) Update to version 3.11.4; notable changes since 3.9.2: * C++: Make serialization method naming consistent * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For backward compatibility a declaration is still available in stubs/common.h, but users should prefer message_lite.h * C++: Removed non-namespace macro EXPECT_OK() * C++: Removed mathlimits.h from stubs in favor of using std::numeric_limits from C++11 * C++: Support direct pickling of nested messages * C++: Disable extension code gen for C# * C++: Switch the proto parser to the faster MOMI parser * C++: Unused imports of files defining descriptor extensions will now be reported * C++: Add proto2::util::RemoveSubranges to remove multiple subranges in linear time * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct * C++: Removed the internal-only header coded_stream_inl.h and the internal- only methods defined there * C++: Enforced no SWIG wrapping of descriptor_database.h (other headers already had this restriction) * C++: Implementation of the equivalent of the MOMI parser for serialization. This removes one of the two serialization routines, by making the fast array serialization routine completely general. SerializeToCodedStream can now be implemented in terms of the much much faster array serialization. The array serialization regresses slightly, but when array serialization is not possible this wins big * C++: Add move constructor for Reflection's SetString * Java: Remove the usage of MethodHandle, so that Android users prior to API version 26 can use protobuf-java * Java: Publish ProGuard config for javalite * Java: Include unknown fields when merging proto3 messages in Java lite builders * Java: Have oneof enums implement a separate interface (other than EnumLite) for clarity * Java: Opensource Android Memory Accessors * Java: Change ProtobufArrayList to use Object[] instead of ArrayList for 5-10% faster parsing * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf top level package. This will eventually replace JsonFormat.TypeRegistry * Java: Add Automatic-Module-Name entries to the Manifest * Python: Add float_precision option in json format printer * Python: Optionally print bytes fields as messages in unknown fields, if possible * Python: Experimental code gen (fast import protobuf module) which only work with cpp generated code linked in * Python: Add descriptor methods in descriptor_pool are deprecated * Python: Added delitem for Python extension dict * JavaScript: Remove guard for Symbol iterator for jspb.Map * JavaScript: Remove deprecated boolean option to getResultBase64String() * JavaScript: Change the parameter types of binaryReaderFn in ExtensionFieldBinaryInfo to (number, ?, ?) * JavaScript: Create dates.ts and time_of_days.ts to mirror Java versions. This is a near-identical conversion of c.g.type.util.{Dates,TimeOfDays} respectively * JavaScript: Migrate moneys to TypeScript * PHP: Increase php7.4 compatibility * PHP: Implement lazy loading of php class for proto messages * Ruby: Support hashes for struct initializers * C#: Experimental proto2 support is now officially available * C#: Change _Extensions property to normal body rather than expression * Objective C: Remove OSReadLittle* due to alignment requirements * Other: Override CocoaPods module to lowercase * further bugfixes and optimisations * Install LICENSE * Drop protobuf-libs as it is just workaround for rpmlint issue * python bindings now require recent python-google-apputils * Released memory allocated by InitializeDefaultRepeatedFields() and GetEmptyString(). Some memory sanitizers reported them * Updated DynamicMessage.setField() to handle repeated enum * Fixed a bug that caused NullPointerException to be thrown when converting manually constructed FileDescriptorProto to * Added oneofs(unions) feature. Fields in the same oneof will * Files, services, enums, messages, methods and enum values * Added Support for list values, including lists of mesaages, * Added SwapFields() in reflection API to swap a subset of * Repeated primitive extensions are now packable. The it is possible to switch a repeated extension field to * writeTo() method in ByteString can now write a substring to * java_generate_equals_and_hash can now be used with the * A new C++-backed extension module (aka "cpp api v2") that replaces the old ("cpp api v1") one. Much faster than the pure Python code. This one resolves many bugs and is mosh reqires it python-abseil was udpated: version update to 1.4.0 New: (testing) Added @flagsaver.as_parsed: this allows saving/restoring flags using string values as if parsed from the command line and will also reflect other flag states after command line parsing, e.g. .present is set. Changed: (logging) If no log dir is specified logging.find_log_dir() now falls back to tempfile.gettempdir() instead of /tmp/. Fixed: (flags) Additional kwargs (e.g. short_name=) to DEFINE_multi_enum_class are now correctly passed to the underlying Flag object. version update to 1.2.0 * Fixed a crash in Python 3.11 when `TempFileCleanup.SUCCESS` is used. * `Flag` instances now raise an error if used in a bool context. This prevents the occasional mistake of testing an instance for truthiness rather than testing `flag.value`. * `absl-py` no longer depends on `six`. Update to version 1.0.0 * absl-py no longer supports Python 2.7, 3.4, 3.5. All versions have reached end-of-life for more than a year now. * New releases will be tagged as vX.Y.Z instead of pypi-vX.Y.Z in the git repo going forward. * Release notes for 0.15.0 * (testing) #128: When running bazel with its --test_filter= flag, it now treats the filters as unittest's -k flag in Python 3.7+. * Release notes for 0.14.1 * Top-level LICENSE file is now exported in bazel. * Release notes for 0.14.0 * # 171: Creating argparse_flags.ArgumentParser with argument_default= no longer raises an exception when other absl.flags flags are defined. * # 173: absltest now correctly sets up test filtering and fail fast flags when an explicit argv= parameter is passed to absltest.main. * Release notes for 0.13.0 * (app) Type annotations for public app interfaces. * (testing) Added new decorator @absltest.skipThisClass to indicate a class contains shared functionality to be used as a base class for other TestCases, and therefore should be skipped. * (app) Annotated the flag_parser paramteter of run as keyword-only. This keyword-only constraint will be enforced at runtime in a future release. * (app, flags) Flag validations now include all errors from disjoint flag sets, instead of fail fast upon first error from all validators. Multiple validators on the same flag still fails fast. * Release notes for 0.12.0 * (flags) Made EnumClassSerializer and EnumClassListSerializer public. * (flags) Added a required: Optional[bool] = False parameter to DEFINE_* functions. * (testing) flagsaver overrides can now be specified in terms of FlagHolder. * (testing) parameterized.product: Allows testing a method over cartesian product of parameters values, specified as a sequences of values for each parameter or as kwargs-like dicts of parameter values. * (testing) Added public flag holders for --test_srcdir and \--test_tmpdir. Users should use absltest.TEST_SRCDIR.value and absltest.TEST_TMPDIR.value instead of FLAGS.test_srcdir and FLAGS.test_tmpdir. * (flags) Made CsvListSerializer respect its delimiter argument. * Add Provides python-absl-py python-grpcuio was updated: * Update to version 1.60.0: * No python specfic changes. * Update to version 1.59.2: * No python specific changes. * Update to version 1.59.0: * [Python 3.12] Support Python 3.12 (gh#grpc/grpc#34398). * [Python 3.12] Deprecate distutil (gh#grpc/grpc#34186). * Update to version 1.58.0: * [Bazel] Enable grpcio-reflection to be used via Bazel (gh#grpc/grpc#31013). * [packaging] Publish xds-protos as part of the standard package pipeline (gh#grpc/grpc#33797). * Update to version 1.57.0: (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148) * [posix] Enable systemd sockets for libsystemd>=233 (gh#grpc/grpc#32671). * [python O11Y] Initial Implementation (gh#grpc/grpc#32974). * Build with LTO (don't set _lto_cflags to %nil). * No need to pass '-std=c++17' to build CFLAGS. * Update to version 1.56.2: * [WRR] backport (gh#grpc/grpc#33694) to 1.56 (gh#grpc/grpc#33698) * [backport][iomgr][EventEngine] Improve server handling of file descriptor exhaustion (gh#grpc/grpc#33667) * Switch build to pip/wheel. * Use system abseil with '-std=c++17' to prevent undefined symbol eg. with python-grpcio-tools ( _ZN3re23RE213GlobalReplaceEPNSt7__ cxx1112basic_stringIcSt11char_traitsIcESaIcEEERKS0_N4absl12lts_ 2023012511string_viewE) * Upstream only supports python >= 3.7, so adjust BuildRequires accordingly. * Add %{?sle15_python_module_pythons} * Update to version 1.56.0: (CVE-2023-32731, bsc#1212180) * [aio types] Fix some grpc.aio python types (gh#grpc/grpc#32475). * Update to version 1.55.0: * [EventEngine] Disable EventEngine polling in gRPC Python (gh#grpc/grpc#33279) (gh#grpc/grpc#33320). * [Bazel Python3.11] Update Bazel dependencies for Python 3.11 (gh#grpc/grpc#33318) (gh#grpc/grpc#33319). * Drop Requires: python-six; not required any more. * Switch Suggests to Recommends. * Update to version 1.54.0: (CVE-2023-32732, bsc#1212182) * Fix DeprecationWarning when calling asyncio.get_event_loop() (gh#grpc/grpc#32533). * Remove references to deprecated syntax field (gh#grpc/grpc#32497). * Update to version 1.51.1: * No Linux specific changes. * Changes from version 1.51.0: * Fix lack of cooldown between poll attempts (gh#grpc/grpc#31550). * Remove enum and future (gh#grpc/grpc#31381). * [Remove Six] Remove dependency on six (gh#grpc/grpc#31340). * Update xds-protos package to pull in protobuf 4.X (gh#grpc/grpc#31113). * Update to version 1.50.0: * Support Python 3.11. [gh#grpc/grpc#30818]. * Update to version 1.49.1 * Support Python 3.11. (#30818) * Add type stub generation support to grpcio-tools. (#30498) * Update to version 1.48.0: * [Aio] Ensure Core channel closes when deallocated [gh#grpc/grpc#29797]. * [Aio] Fix the wait_for_termination return value [gh#grpc/grpc#29795]. * update to 1.46.3: * backport: xds: use federation env var to guard new-style resource name parsing * This release contains refinements, improvements, and bug fixes. * Update to version 1.46.0: * Add Python GCF Distribtest [gh#grpc/grpc#29303]. * Add Python Reflection Client [gh#grpc/grpc#29085]. * Revert "Fix prefork handler register's default behavior" [gh#grpc/grpc#29229]. * Fix prefork handler register's default behavior [gh#grpc/grpc#29103]. * Fix fetching CXX variable in setup.py [gh#grpc/grpc#28873]. * Update to version 1.45.0: * Reimplement Gevent Integration [gh#grpc/grpc#28276]. * Support musllinux binary wheels on x64 and x86 [gh#grpc/grpc#28092]. * Increase the Python protobuf requirement to >=3.12.0 [gh#grpc/grpc#28604]. * Build with system re2; add BuildRequires: pkgconfig(re2). * Update to version 1.44.0: * Add python async example for hellostreamingworld using generator (gh#grpc/grpc#27343). * Disable __wrap_memcpy hack for Python builds (gh#grpc/grpc#28410). * Bump Bazel Python Cython dependency to 0.29.26 (gh#grpc/grpc#28398). * Fix libatomic linking on Raspberry Pi OS Bullseye (gh#grpc/grpc#28041). * Allow generated proto sources in remote repositories for py_proto_library (gh#grpc/grpc#28103). * Update to version 1.43.0: * [Aio] Validate the input type for set_trailing_metadata and abort (gh#grpc/grpc#27958). * update to 1.41.1: * This is release 1.41.0 (goat) of gRPC Core. * Update to version 1.41.0: * Add Python 3.10 support and drop 3.5 (gh#grpc/grpc#26074). * [Aio] Remove custom IO manager support (gh#grpc/grpc#27090). * Update to version 1.39.0: * Python AIO: Match continuation typing on Interceptors (gh#grpc/grpc#26500). * Workaround #26279 by publishing manylinux_2_24 wheels instead of manylinux2014 on aarch64 (gh#grpc/grpc#26430). * Fix zlib unistd.h import problem (gh#grpc/grpc#26374). * Handle gevent exception in gevent poller (gh#grpc/grpc#26058). * Update to version 1.38.1: * Backport gh#grpc/grpc#26430 and gh#grpc/grpc#26435 to v1.38.x (gh#grpc/grpc#26436). * Update to version 1.38.0: * Add grpcio-admin Python package (gh#grpc/grpc#26166). * Add CSDS API to Python (gh#grpc/grpc#26114). * Expose code and details from context on the server side (gh#grpc/grpc#25457). * Explicitly import importlib.abc; required on Python 3.10. Fixes #26062 (gh#grpc/grpc#26083). * Fix potential deadlock on the GIL in AuthMetdataPlugin (gh#grpc/grpc#26009). * Introduce new Python package "xds_protos" (gh#grpc/grpc#25975). * Remove async mark for set_trailing_metadata interface (gh#grpc/grpc#25814). * Update to version 1.37.1: * No user visible changes. * Changes from version 1.37.0: * Clarify Guarantees about grpc.Future Interface (gh#grpc/grpc#25383). * [Aio] Add time_remaining method to ServicerContext (gh#grpc/grpc#25719). * Standardize all environment variable boolean configuration in python's setup.py (gh#grpc/grpc#25444). * Fix Signal Safety Issue (gh#grpc/grpc#25394). * Update to version 1.36.1: * Core: back-port: add env var protection for google-c2p resolver (gh#grpc/grpc#25569). * Update to version 1.35.0: * Implement Python Client and Server xDS Creds. (gh#grpc/grpc#25365) * Add %define _lto_cflags %{nil} (bsc#1182659) (rh#1893533) * Link roots.pem to ca-bundle.pem from ca-certificates package * Update to version 1.34.1: * Backport "Lazily import grpc_tools when using runtime stub/message generation" to 1.34.x (gh#grpc/grpc#25011). * Update to version 1.34.0: * Incur setuptools as an dependency for grpcio_tools (gh#grpc/grpc#24752). * Stop the spamming log generated by ctrl-c for AsyncIO server (gh#grpc/grpc#24718). * [gRPC Easy] Make Well-Known Types Available to Runtime Protos (gh#grpc/grpc#24478). * Bump MACOSX_DEPLOYMENT_TARGET to 10.10 for Python (gh#grpc/grpc#24480). * Make Python 2 an optional dependency for Bazel build (gh#grpc/grpc#24407). * [Linux] [macOS] Support pre-compiled Python 3.9 wheels (gh#grpc/grpc#24356). * Update to version 1.33.2: * [Backport] Implement grpc.Future interface in SingleThreadedRendezvous (gh#grpc/grpc#24574). * Update to version 1.33.1: * [Backport] Make Python 2 an optional dependency for Bazel build (gh#grpc/grpc#24452). * Allow asyncio API to be imported as grpc.aio. (gh#grpc/grpc#24289). * [gRPC Easy] Fix import errors on Windows (gh#grpc/grpc#24124). * Make version check for importlib.abc in grpcio-tools more stringent (gh#grpc/grpc#24098). Added re2 package in version 2024-02-01. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-573=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-573=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-573=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-573=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-573=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-573=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-573=1 SUSE-SLE-Product-SUSE- Manager-Server-4.3-2024-573=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-573=1 SUSE-SLE- INSTALLER-15-SP4-2024-573=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-573=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-573=1 SUSE-SLE-Product-SUSE- Manager-Retail-Branch-Server-4.3-2024-573=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-573=1 SUSE-SLE- INSTALLER-15-SP4-2024-573=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-573=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-573=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-573=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-573=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-573=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-573=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-573=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-573=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-573=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-573=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-573=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-573=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-573=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-573=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-573=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-573=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-573=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-573=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-573=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-573=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-grpcio-debuginfo-1.60.0-150400.9.3.2 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * protobuf-java-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * python311-protobuf-4.25.1-150400.9.3.1 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * grpc-devel-1.60.0-150400.8.3.2 * python311-grpcio-1.60.0-150400.9.3.2 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * python-grpcio-debugsource-1.60.0-150400.9.3.2 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * upb-devel-1.60.0-150400.8.3.2 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * re2-devel-20240201-150400.9.3.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * grpc-devel-debuginfo-1.60.0-150400.8.3.2 * openSUSE Leap 15.4 (x86_64) * libre2-11-32bit-debuginfo-20240201-150400.9.3.1 * libre2-11-32bit-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1 * libabsl2308_0_0-32bit-debuginfo-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.3.1 * libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.3.1 * libprotoc25_1_0-32bit-25.1-150400.9.3.1 * libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.3.1 * libabsl2308_0_0-32bit-20230802.1-150400.10.4.1 * libprotobuf25_1_0-32bit-25.1-150400.9.3.1 * openSUSE Leap 15.4 (noarch) * grpc-source-1.60.0-150400.8.3.2 * python311-abseil-1.4.0-150400.9.3.1 * opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libabsl2308_0_0-64bit-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-64bit-25.1-150400.9.3.1 * libprotoc25_1_0-64bit-debuginfo-25.1-150400.9.3.1 * libprotobuf25_1_0-64bit-25.1-150400.9.3.1 * libprotobuf25_1_0-64bit-debuginfo-25.1-150400.9.3.1 * libprotoc25_1_0-64bit-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150400.9.3.1 * libabsl2308_0_0-64bit-debuginfo-20230802.1-150400.10.4.1 * libre2-11-64bit-debuginfo-20240201-150400.9.3.1 * libre2-11-64bit-20240201-150400.9.3.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python311-grpcio-debuginfo-1.60.0-150400.9.3.2 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * protobuf-java-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * python311-protobuf-4.25.1-150400.9.3.1 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * grpc-devel-1.60.0-150400.8.3.2 * python311-grpcio-1.60.0-150400.9.3.2 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * python-grpcio-debugsource-1.60.0-150400.9.3.2 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * upb-devel-1.60.0-150400.8.3.2 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * re2-devel-20240201-150400.9.3.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * grpc-devel-debuginfo-1.60.0-150400.8.3.2 * openSUSE Leap 15.5 (noarch) * grpc-source-1.60.0-150400.8.3.2 * python311-abseil-1.4.0-150400.9.3.1 * opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1 * openSUSE Leap 15.5 (x86_64) * libre2-11-32bit-debuginfo-20240201-150400.9.3.1 * libre2-11-32bit-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1 * libabsl2308_0_0-32bit-debuginfo-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.3.1 * libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.3.1 * libprotoc25_1_0-32bit-25.1-150400.9.3.1 * libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.3.1 * libabsl2308_0_0-32bit-20230802.1-150400.10.4.1 * libprotobuf25_1_0-32bit-25.1-150400.9.3.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libre2-11-debuginfo-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-25.1-150400.9.3.1 * libre2-11-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libupb37-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * libgrpc37-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libre2-11-debuginfo-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-25.1-150400.9.3.1 * libre2-11-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libupb37-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * libgrpc37-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Manager Proxy 4.3 (x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libre2-11-debuginfo-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-25.1-150400.9.3.1 * libre2-11-20240201-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libupb37-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * libgrpc37-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libabsl2308_0_0-20230802.1-150400.10.4.1 * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libprotoc25_1_0-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * abseil-cpp-devel-20230802.1-150400.10.4.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-debugsource-25.1-150400.9.3.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150400.9.3.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * grpc-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * protobuf-debugsource-25.1-150400.9.3.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libgrpc1_60-1.60.0-150400.8.3.2 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-25.1-150400.9.3.1 * libre2-11-20240201-150400.9.3.1 * libupb37-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * libgrpc37-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * re2-debugsource-20240201-150400.9.3.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-debugsource-25.1-150400.9.3.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-protobuf-4.25.1-150400.9.3.1 * python311-grpcio-debuginfo-1.60.0-150400.9.3.2 * python311-grpcio-1.60.0-150400.9.3.2 * python-grpcio-debugsource-1.60.0-150400.9.3.2 * Python 3 Module 15-SP5 (noarch) * python311-abseil-1.4.0-150400.9.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.3.1 * libprotobuf25_1_0-25.1-150400.9.3.1 * libgrpc37-debuginfo-1.60.0-150400.8.3.2 * libupb37-debuginfo-1.60.0-150400.8.3.2 * grpc-debugsource-1.60.0-150400.8.3.2 * libabsl2308_0_0-debuginfo-20230802.1-150400.10.4.1 * protobuf-debugsource-25.1-150400.9.3.1 * libabsl2308_0_0-20230802.1-150400.10.4.1 * libgrpc1_60-1.60.0-150400.8.3.2 * libupb37-1.60.0-150400.8.3.2 * libre2-11-20240201-150400.9.3.1 * protobuf-devel-debuginfo-25.1-150400.9.3.1 * re2-debugsource-20240201-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.3.1 * abseil-cpp-debugsource-20230802.1-150400.10.4.1 * libre2-11-debuginfo-20240201-150400.9.3.1 * libgrpc++1_60-debuginfo-1.60.0-150400.8.3.2 * libgrpc++1_60-1.60.0-150400.8.3.2 * grpc-debuginfo-1.60.0-150400.8.3.2 * libgrpc1_60-debuginfo-1.60.0-150400.8.3.2 * libprotoc25_1_0-debuginfo-25.1-150400.9.3.1 * protobuf-devel-25.1-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.3.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.3.1 * libgrpc37-1.60.0-150400.8.3.2 * abseil-cpp-devel-20230802.1-150400.10.4.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * abseil-cpp-debugsource-20230802.1-150400.10.4.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32731.html * https://www.suse.com/security/cve/CVE-2023-32732.html * https://www.suse.com/security/cve/CVE-2023-33953.html * https://www.suse.com/security/cve/CVE-2023-44487.html * https://www.suse.com/security/cve/CVE-2023-4785.html * https://bugzilla.suse.com/show_bug.cgi?id=1133277 * https://bugzilla.suse.com/show_bug.cgi?id=1182659 * https://bugzilla.suse.com/show_bug.cgi?id=1203378 * https://bugzilla.suse.com/show_bug.cgi?id=1208794 * https://bugzilla.suse.com/show_bug.cgi?id=1212180 * https://bugzilla.suse.com/show_bug.cgi?id=1212182 * https://bugzilla.suse.com/show_bug.cgi?id=1214148 * https://bugzilla.suse.com/show_bug.cgi?id=1215334 * https://jira.suse.com/browse/PED-5014 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:30 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:30 -0000 Subject: SUSE-RU-2024:0572-1: moderate: Recommended update for alex, ghc-Only, ghc-StateVar, ghc-ansi-terminal-types, ghc-auto-update, ghc-bitvec, ghc-boring, ghc-bsb-http-chunked, ghc-call-stack, ghc-crypton, ghc-data-array-byte, ghc-digit Message-ID: <170851863070.13950.13103281530850027142@smelt2.prg2.suse.org> # Recommended update for alex, ghc-Only, ghc-StateVar, ghc-ansi-terminal-types, ghc-auto-update, ghc-bitvec, ghc-boring, ghc-bsb-http-chunked, ghc-call-stack, ghc-crypton, ghc-data-array-byte, ghc-digit Announcement ID: SUSE-RU-2024:0572-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that can now be installed. ## Description: This update for alex, ghc-Only, ghc-StateVar, ghc-ansi-terminal-types, ghc-auto- update, ghc-bitvec, ghc-boring, ghc-bsb-http-chunked, ghc-call-stack, ghc- crypton, ghc-data-array-byte, ghc-digits, ghc-easy-file, ghc-foldable1-classes- compat, ghc-generically, ghc-gridtables, ghc-hslua-list, ghc-http-date, ghc- http-media, ghc-indexed-traversable-instances, ghc-isocline, ghc-mmorph, ghc- network-byte-order, ghc-old-time, ghc-ordered-containers fixes the following issues: Changes in alex: * Add alex at version 3.4.0.1. Changes in ghc-Only: * Add Only at version 0.1 revision 2. Changes in ghc-StateVar: * Add StateVar at version 1.2.2. Changes in ghc-ansi-terminal-types: * Add ansi-terminal-types at version 0.11.5 revision 1. Changes in ghc-auto-update: * Add auto-update at version 0.1.6. Changes in ghc-bitvec: * Add bitvec at version 1.1.5.0. Changes in ghc-boring: * Add boring at version 0.2.1 revision 1. Changes in ghc-bsb-http-chunked: * Add bsb-http-chunked at version 0.0.0.4 revision 4. Changes in ghc-call-stack: * Add call-stack at version 0.4.0. Changes in ghc-crypton: * Add crypton at version 0.34. Changes in ghc-data-array-byte: * Add data-array-byte at version 0.1.0.1 revision 2. Changes in ghc-digits: * Add digits at version 0.3.1. Changes in ghc-easy-file: * Add easy-file at version 0.2.5. Changes in ghc-foldable1-classes-compat: * Add foldable1-classes-compat at version 0.1 revision 4. Changes in ghc-generically: * Add generically at version 0.1.1 revision 2. Changes in ghc-gridtables: * Update gridtables to version 0.1.0.0 revision 1. Upstream has revised the Cabal build instructions on Hackage. * Add gridtables at version 0.1.0.0. Changes in ghc-hslua-list: * Add hslua-list at version 1.1.1. Changes in ghc-http-date: * Add http-date at version 0.0.11. Changes in ghc-http-media: * Add http-media at version 0.8.1.1 revision 1. Changes in ghc-indexed-traversable-instances: * Add indexed-traversable-instances at version 0.1.1.2 revision 2. Changes in ghc-isocline: * Add isocline at version 1.0.9. Changes in ghc-mmorph: * Add mmorph at version 1.2.0 revision 3. Changes in ghc-network-byte-order: * Add network-byte-order at version 0.1.7. Changes in ghc-old-time: * Update old-time to version 1.1.0.4. * Add `build-tools: hsc2hs` to `old-time.cabal` for compilation with GHC 8. Fixes issue #12 * Add old-time at version 1.1.0.3 revision 2. Changes in ghc-ordered-containers: * Add ordered-containers at version 0.2.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-572=1 openSUSE-SLE-15.5-2024-572=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-572=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * ghc-conduit-1.3.5-150500.3.3.2 * ghc-skylighting-core-0.14.1-150500.3.3.1 * ghc-th-lift-0.8.4-150500.3.3.1 * ghc-unicode-collation-0.1.3.6-150500.3.3.2 * ghc-libyaml-devel-0.1.2-150500.3.3.2 * ghc-isocline-devel-1.0.9-150500.11.3.1 * ghc-word8-0.1.3-150500.11.3.1 * ghc-case-insensitive-1.2.1.0-150500.3.2.1 * ghc-http2-5.0.1-150500.11.3.1 * ghc-commonmark-pandoc-devel-0.2.2-150500.3.3.1 * ghc-blaze-builder-0.4.2.3-150500.3.3.1 * ghc-these-1.2-150500.3.3.1 * ghc-hslua-classes-devel-2.3.1-150500.3.3.1 * ghc-base16-bytestring-1.0.2.0-150500.3.3.1 * ghc-typst-0.5-150500.11.3.1 * ghc-base64-bytestring-1.2.1.0-150500.3.3.1 * ghc-hslua-list-1.1.1-150500.11.3.2 * ghc-haddock-library-1.11.0-150500.3.3.1 * ghc-servant-devel-0.20.1-150500.11.3.1 * ghc-foldable1-classes-compat-0.1-150500.11.3.2 * ghc-bsb-http-chunked-0.0.0.4-150500.11.3.1 * ghc-typst-devel-0.5-150500.11.3.1 * ghc-servant-server-devel-0.20-150500.11.3.1 * ghc-syb-0.7.2.4-150500.3.3.1 * ghc-text-iso8601-0.1-150500.11.3.1 * ghc-StateVar-1.2.2-150500.11.3.1 * ghc-wai-app-static-devel-3.1.8-150500.11.3.1 * ghc-bitvec-devel-1.1.5.0-150500.11.3.2 * ghc-zlib-0.6.3.0-150500.3.3.1 * ghc-bifunctors-5.6.1-150500.3.3.1 * ghc-data-array-byte-devel-0.1.0.1-150500.11.3.1 * ghc-http-media-devel-0.8.1.1-150500.11.3.2 * ghc-singleton-bool-0.1.7-150500.11.3.1 * ghc-streaming-commons-devel-0.2.2.6-150500.3.3.3 * ghc-vector-algorithms-devel-0.9.0.1-150500.3.3.1 * ghc-safe-0.3.21-150500.3.3.1 * ghc-crypton-connection-devel-0.3.1-150500.11.3.1 * ghc-pandoc-lua-engine-devel-0.2.1.2-150500.11.3.1 * ghc-prettyprinter-devel-1.7.1-150500.11.3.1 * ghc-optparse-applicative-0.18.1.0-150500.11.3.1 * ghc-contravariant-1.5.5-150500.11.3.1 * ghc-http-types-0.12.4-150500.3.3.2 * ghc-asn1-parse-devel-0.9.5-150500.3.2.1 * ghc-citeproc-devel-0.8.1-150500.3.3.1 * ghc-generically-devel-0.1.1-150500.11.3.1 * ghc-digits-0.3.1-150500.11.3.3 * ghc-vector-0.13.1.0-150500.3.3.1 * ghc-network-devel-3.1.4.0-150500.3.3.1 * ghc-pandoc-types-devel-1.23.1-150500.3.3.1 * ghc-split-devel-0.2.5-150500.3.3.1 * ghc-pretty-show-1.10-150500.3.2.1 * ghc-semigroupoids-6.0.0.1-150500.11.3.1 * ghc-QuickCheck-devel-2.14.3-150500.3.3.2 * ghc-base16-bytestring-devel-1.0.2.0-150500.3.3.1 * ghc-http-client-tls-devel-0.3.6.3-150500.3.3.1 * ghc-psqueues-0.2.8.0-150500.11.3.2 * ghc-conduit-extra-devel-1.3.6-150500.3.2.1 * ghc-hslua-repl-devel-0.1.2-150500.11.3.1 * ghc-foldable1-classes-compat-devel-0.1-150500.11.3.2 * ghc-data-fix-devel-0.3.2-150500.3.3.2 * ghc-HUnit-1.6.2.0-150500.11.3.1 * ghc-pandoc-lua-marshal-0.2.4-150500.3.3.1 * ghc-data-array-byte-0.1.0.1-150500.11.3.1 * ghc-pandoc-server-0.1.0.4-150500.11.3.1 * ghc-vector-devel-0.13.1.0-150500.3.3.1 * ghc-resourcet-devel-1.3.0-150500.3.3.3 * ghc-zip-archive-devel-0.4.3-150500.3.3.1 * ghc-unix-time-0.4.11-150500.11.3.1 * ghc-tagged-0.8.8-150500.3.3.1 * ghc-emojis-0.1.3-150500.3.3.1 * ghc-toml-parser-devel-1.3.2.0-150500.11.3.1 * ghc-monad-control-1.0.3.1-150500.11.3.1 * ghc-cookie-0.4.6-150500.3.3.1 * ghc-attoparsec-devel-0.14.4-150500.3.3.2 * ghc-crypton-x509-system-devel-1.6.7-150500.11.3.1 * ghc-haskell-lexer-devel-1.1.1-150500.3.3.1 * ghc-hslua-module-path-1.1.1-150500.3.3.1 * ghc-Only-devel-0.1-150500.11.3.1 * ghc-hslua-module-path-devel-1.1.1-150500.3.3.1 * ghc-crypton-x509-store-devel-1.6.9-150500.11.3.1 * ghc-th-abstraction-devel-0.5.0.0-150500.3.3.1 * ghc-th-abstraction-0.5.0.0-150500.3.3.1 * ghc-asn1-encoding-0.9.6-150500.3.2.1 * ghc-hslua-module-version-1.1.1-150500.3.3.1 * ghc-integer-logarithms-1.0.3.1-150500.3.3.1 * ghc-indexed-traversable-devel-0.1.3-150500.3.3.1 * ghc-wai-logger-2.4.0-150500.11.3.1 * ghc-time-compat-devel-1.9.6.1-150500.3.3.2 * ghc-hashable-1.4.3.0-150500.3.3.1 * ghc-regex-tdfa-devel-1.3.2.2-150500.11.3.1 * ghc-StateVar-devel-1.2.2-150500.11.3.1 * ghc-crypton-devel-0.34-150500.11.3.2 * ghc-base-compat-devel-0.13.1-150500.3.3.1 * ghc-lpeg-devel-1.0.4-150500.3.3.1 * ghc-text-conversions-devel-0.3.1.1-150500.3.2.1 * ghc-boring-0.2.1-150500.11.3.2 * ghc-base-compat-batteries-0.13.1-150500.3.3.1 * ghc-call-stack-devel-0.4.0-150500.11.3.1 * ghc-crypton-x509-validation-1.6.12-150500.11.3.1 * ghc-mime-types-devel-0.1.2.0-150500.3.3.1 * ghc-http-client-tls-0.3.6.3-150500.3.3.1 * ghc-jira-wiki-markup-1.5.1-150500.3.3.1 * ghc-dlist-1.0-150500.3.3.1 * ghc-indexed-traversable-instances-0.1.1.2-150500.11.3.2 * ghc-ordered-containers-devel-0.2.3-150500.11.3.1 * ghc-pem-0.2.4-150500.3.2.1 * ghc-http2-devel-5.0.1-150500.11.3.1 * ghc-word8-devel-0.1.3-150500.11.3.1 * ghc-toml-parser-1.3.2.0-150500.11.3.1 * ghc-splitmix-0.1.0.5-150500.3.3.1 * ghc-typed-process-0.2.11.1-150500.3.3.3 * ghc-blaze-markup-devel-0.8.3.0-150500.3.3.1 * ghc-hslua-objectorientation-devel-2.3.1-150500.3.3.1 * ghc-vault-0.3.1.5-150500.11.3.2 * ghc-unordered-containers-devel-0.2.20-150500.3.3.1 * ghc-time-manager-devel-0.0.1-150500.11.3.1 * ghc-ipynb-devel-0.2-150500.3.2.1 * ghc-http-api-data-devel-0.6-150500.11.3.1 * ghc-ipynb-0.2-150500.3.2.1 * ghc-optparse-applicative-devel-0.18.1.0-150500.11.3.1 * ghc-unix-compat-0.7.1-150500.11.3.1 * ghc-skylighting-format-blaze-html-devel-0.1.1.1-150500.11.3.2 * ghc-text-iso8601-devel-0.1-150500.11.3.1 * pandoc-cli-3.1.11.1-150500.11.3.1 * ghc-skylighting-format-ansi-0.1-150500.11.3.1 * ghc-conduit-devel-1.3.5-150500.3.3.2 * ghc-streaming-commons-0.2.2.6-150500.3.3.3 * ghc-semialign-devel-1.3-150500.11.3.1 * ghc-texmath-0.12.8.6-150500.3.3.1 * ghc-syb-devel-0.7.2.4-150500.3.3.1 * ghc-th-compat-0.1.4-150500.3.3.1 * ghc-assoc-devel-1.1-150500.3.3.2 * ghc-cassava-0.5.3.0-150500.11.3.2 * ghc-strict-devel-0.5-150500.3.3.1 * ghc-integer-logarithms-devel-1.0.3.1-150500.3.3.1 * ghc-wai-extra-3.1.14-150500.11.3.1 * ghc-ansi-terminal-1.0.2-150500.3.3.1 * ghc-wai-cors-devel-0.2.7-150500.11.3.1 * ghc-pandoc-3.1.11.1-150500.11.3.1 * ghc-hslua-marshalling-2.3.1-150500.3.3.2 * ghc-cabal-doctest-1.0.9-150500.3.3.1 * ghc-base64-bytestring-devel-1.2.1.0-150500.3.3.1 * ghc-recv-devel-0.1.0-150500.11.3.2 * ghc-uuid-types-devel-1.0.5.1-150500.3.3.2 * ghc-libyaml-0.1.2-150500.3.3.2 * ghc-unicode-transforms-0.4.0.1-150500.3.3.1 * ghc-tagged-devel-0.8.8-150500.3.3.1 * ghc-pandoc-server-devel-0.1.0.4-150500.11.3.1 * ghc-some-devel-1.0.6-150500.11.3.1 * ghc-yaml-0.11.11.2-150500.3.3.1 * ghc-prettyprinter-ansi-terminal-devel-1.1.3-150500.11.3.2 * ghc-constraints-devel-0.14-150500.11.3.2 * ghc-crypton-x509-1.7.6-150500.11.3.1 * ghc-auto-update-devel-0.1.6-150500.11.3.1 * ghc-hslua-typing-devel-0.1.1-150500.11.3.1 * ghc-JuicyPixels-devel-3.3.8-150500.3.3.1 * ghc-distributive-devel-0.6.2.1-150500.3.2.1 * ghc-comonad-5.0.8-150500.3.3.1 * ghc-base-unicode-symbols-0.2.4.2-150500.11.3.1 * ghc-crypton-x509-store-1.6.9-150500.11.3.1 * ghc-http-client-0.7.16-150500.3.3.2 * ghc-aeson-2.1.2.1-150500.3.3.1 * ghc-socks-0.6.1-150500.3.2.1 * ghc-prettyprinter-ansi-terminal-1.1.3-150500.11.3.2 * ghc-doctemplates-0.11-150500.3.3.1 * ghc-conduit-extra-1.3.6-150500.3.2.1 * ghc-ansi-terminal-types-devel-0.11.5-150500.11.3.1 * ghc-boring-devel-0.2.1-150500.11.3.2 * ghc-distributive-0.6.2.1-150500.3.2.1 * ghc-comonad-devel-5.0.8-150500.3.3.1 * ghc-unicode-data-devel-0.4.0.1-150500.3.3.1 * ghc-skylighting-format-context-0.1.0.2-150500.11.3.2 * ghc-tls-1.9.0-150500.3.3.1 * ghc-Only-0.1-150500.11.3.1 * ghc-texmath-devel-0.12.8.6-150500.3.3.1 * ghc-hashable-devel-1.4.3.0-150500.3.3.1 * ghc-hslua-module-system-1.1.1-150500.3.3.1 * ghc-vector-algorithms-0.9.0.1-150500.3.3.1 * ghc-HUnit-devel-1.6.2.0-150500.11.3.1 * ghc-servant-0.20.1-150500.11.3.1 * ghc-vector-stream-0.1.0.1-150500.11.3.1 * ghc-citeproc-0.8.1-150500.3.3.1 * ghc-data-fix-0.3.2-150500.3.3.2 * ghc-asn1-encoding-devel-0.9.6-150500.3.2.1 * ghc-skylighting-format-latex-0.1-150500.11.3.2 * ghc-OneTuple-devel-0.4.1.1-150500.3.3.2 * ghc-generically-0.1.1-150500.11.3.1 * ghc-haskell-lexer-1.1.1-150500.3.3.1 * ghc-temporary-devel-1.3-150500.3.2.1 * ghc-regex-base-devel-0.94.0.2-150500.11.3.1 * ghc-warp-devel-3.3.31-150500.11.3.1 * ghc-pretty-show-devel-1.10-150500.3.2.1 * ghc-split-0.2.5-150500.3.3.1 * ghc-network-control-0.0.2-150500.11.3.1 * ghc-hslua-cli-devel-1.4.2-150500.11.3.1 * ghc-mime-types-0.1.2.0-150500.3.3.1 * ghc-digits-devel-0.3.1-150500.11.3.3 * ghc-hslua-marshalling-devel-2.3.1-150500.3.3.2 * ghc-hslua-module-system-devel-1.1.1-150500.3.3.1 * ghc-wai-3.2.4-150500.11.3.2 * ghc-type-equality-1-150500.11.3.1 * ghc-doclayout-0.4.0.1-150500.3.3.2 * ghc-network-uri-devel-2.6.4.2-150500.3.3.2 * ghc-async-devel-2.2.5-150500.3.3.2 * ghc-time-manager-0.0.1-150500.11.3.1 * ghc-base64-devel-0.4.2.4-150500.11.3.2 * ghc-cereal-devel-0.5.8.3-150500.3.3.1 * ghc-unliftio-devel-0.2.25.0-150500.11.3.2 * ghc-th-lift-instances-devel-0.1.20-150500.3.3.2 * ghc-hslua-2.3.1-150500.3.3.1 * ghc-asn1-types-devel-0.3.4-150500.3.2.1 * ghc-time-compat-1.9.6.1-150500.3.3.2 * ghc-QuickCheck-2.14.3-150500.3.3.2 * ghc-crypton-connection-0.3.1-150500.11.3.1 * ghc-hslua-core-2.3.2-150500.3.3.1 * ghc-network-uri-2.6.4.2-150500.3.3.2 * ghc-mmorph-1.2.0-150500.11.3.1 * ghc-cassava-devel-0.5.3.0-150500.11.3.2 * ghc-unliftio-core-0.2.1.0-150500.3.3.1 * ghc-servant-server-0.20-150500.11.3.1 * ghc-mono-traversable-devel-1.0.15.3-150500.3.2.1 * ghc-th-lift-devel-0.8.4-150500.3.3.1 * ghc-commonmark-extensions-devel-0.2.5.1-150500.3.3.1 * ghc-vault-devel-0.3.1.5-150500.11.3.2 * ghc-asn1-parse-0.9.5-150500.3.2.1 * ghc-singleton-bool-devel-0.1.7-150500.11.3.1 * ghc-string-conversions-devel-0.4.0.1-150500.11.3.1 * ghc-dlist-devel-1.0-150500.3.3.1 * ghc-uuid-types-1.0.5.1-150500.3.3.2 * ghc-crypton-x509-devel-1.7.6-150500.11.3.1 * ghc-hslua-aeson-2.3.1-150500.3.3.1 * ghc-digest-0.0.2.0-150500.3.3.1 * ghc-uniplate-1.6.13-150500.3.2.1 * ghc-base64-0.4.2.4-150500.11.3.2 * ghc-dec-0.0.5-150500.11.3.1 * ghc-text-short-devel-0.1.5-150500.11.3.2 * ghc-scientific-0.3.7.0-150500.3.3.2 * ghc-easy-file-0.2.5-150500.11.3.1 * ghc-unliftio-core-devel-0.2.1.0-150500.3.3.1 * ghc-hslua-core-devel-2.3.2-150500.3.3.1 * ghc-base-unicode-symbols-devel-0.2.4.2-150500.11.3.1 * ghc-regex-tdfa-1.3.2.2-150500.11.3.1 * ghc-strict-0.5-150500.3.3.1 * ghc-JuicyPixels-3.3.8-150500.3.3.1 * ghc-hslua-module-zip-devel-1.1.1-150500.11.3.1 * ghc-pandoc-lua-engine-0.2.1.2-150500.11.3.1 * ghc-pandoc-devel-3.1.11.1-150500.11.3.1 * ghc-hslua-list-devel-1.1.1-150500.11.3.2 * ghc-hslua-module-doclayout-devel-1.1.1-150500.3.3.1 * ghc-skylighting-format-blaze-html-0.1.1.1-150500.11.3.2 * ghc-unicode-transforms-devel-0.4.0.1-150500.3.3.1 * ghc-bifunctors-devel-5.6.1-150500.3.3.1 * ghc-text-short-0.1.5-150500.11.3.2 * ghc-hslua-devel-2.3.1-150500.3.3.1 * ghc-hslua-module-text-1.1.1-150500.3.3.1 * ghc-doctemplates-devel-0.11-150500.3.3.1 * ghc-call-stack-0.4.0-150500.11.3.1 * ghc-OneTuple-0.4.1.1-150500.3.3.2 * ghc-case-insensitive-devel-1.2.1.0-150500.3.2.1 * ghc-old-time-1.1.0.4-150500.11.3.1 * ghc-temporary-1.3-150500.3.2.1 * ghc-pandoc-types-1.23.1-150500.3.3.1 * ghc-fast-logger-3.2.2-150500.11.3.1 * ghc-jira-wiki-markup-devel-1.5.1-150500.3.3.1 * ghc-transformers-base-0.4.6-150500.11.3.2 * ghc-wai-devel-3.2.4-150500.11.3.2 * ghc-sop-core-0.5.0.2-150500.11.3.1 * ghc-skylighting-format-latex-devel-0.1-150500.11.3.2 * ghc-typst-symbols-0.1.5-150500.11.3.1 * ghc-wai-cors-0.2.7-150500.11.3.1 * ghc-text-conversions-0.3.1.1-150500.3.2.1 * ghc-hslua-typing-0.1.1-150500.11.3.1 * ghc-type-equality-devel-1-150500.11.3.1 * ghc-hslua-aeson-devel-2.3.1-150500.3.3.1 * ghc-easy-file-devel-0.2.5-150500.11.3.1 * ghc-contravariant-devel-1.5.5-150500.11.3.1 * ghc-simple-sendfile-devel-0.2.32-150500.11.3.1 * ghc-wai-extra-devel-3.1.14-150500.11.3.1 * ghc-http-api-data-0.6-150500.11.3.1 * ghc-auto-update-0.1.6-150500.11.3.1 * ghc-these-devel-1.2-150500.3.3.1 * ghc-crypton-0.34-150500.11.3.2 * ghc-dec-devel-0.0.5-150500.11.3.1 * ghc-warp-3.3.31-150500.11.3.1 * ghc-mmorph-devel-1.2.0-150500.11.3.1 * ghc-unliftio-0.2.25.0-150500.11.3.2 * ghc-crypton-x509-system-1.6.7-150500.11.3.1 * ghc-commonmark-0.2.4.1-150500.3.3.2 * ghc-skylighting-core-devel-0.14.1-150500.3.3.1 * ghc-ordered-containers-0.2.3-150500.11.3.1 * ghc-base-orphans-0.9.1-150500.3.3.1 * ghc-prettyprinter-1.7.1-150500.11.3.1 * ghc-emojis-devel-0.1.3-150500.3.3.1 * ghc-skylighting-0.14.1-150500.3.3.1 * ghc-basement-0.0.16-150500.3.3.1 * ghc-http-client-devel-0.7.16-150500.3.3.2 * ghc-mono-traversable-1.0.15.3-150500.3.2.1 * ghc-random-1.2.1.1-150500.3.3.2 * ghc-bsb-http-chunked-devel-0.0.0.4-150500.11.3.1 * ghc-memory-devel-0.18.0-150500.3.3.1 * ghc-haddock-library-devel-1.11.0-150500.3.3.1 * ghc-aeson-pretty-devel-0.8.10-150500.3.3.2 * ghc-cookie-devel-0.4.6-150500.3.3.1 * ghc-http-types-devel-0.12.4-150500.3.3.2 * ghc-safe-exceptions-0.1.7.4-150500.11.3.1 * ghc-uniplate-devel-1.6.13-150500.3.2.1 * ghc-commonmark-devel-0.2.4.1-150500.3.3.2 * ghc-isocline-1.0.9-150500.11.3.1 * texmath-0.12.8.6-150500.3.3.1 * ghc-blaze-builder-devel-0.4.2.3-150500.3.3.1 * ghc-gridtables-0.1.0.0-150500.11.3.3 * ghc-safe-exceptions-devel-0.1.7.4-150500.11.3.1 * ghc-aeson-devel-2.1.2.1-150500.3.3.1 * ghc-network-control-devel-0.0.2-150500.11.3.1 * ghc-attoparsec-0.14.4-150500.3.3.2 * ghc-digest-devel-0.0.2.0-150500.3.3.1 * ghc-primitive-0.8.0.0-150500.3.3.1 * ghc-th-compat-devel-0.1.4-150500.3.3.1 * ghc-hslua-packaging-2.3.1-150500.3.3.1 * ghc-tls-devel-1.9.0-150500.3.3.1 * ghc-integer-conversion-devel-0.1.0.1-150500.11.3.1 * ghc-cereal-0.5.8.3-150500.3.3.1 * ghc-zip-archive-0.4.3-150500.3.3.1 * ghc-blaze-html-devel-0.9.1.2-150500.3.3.1 * ghc-primitive-devel-0.8.0.0-150500.3.3.1 * ghc-resourcet-1.3.0-150500.3.3.3 * ghc-blaze-markup-0.8.3.0-150500.3.3.1 * ghc-iproute-devel-1.7.12-150500.3.2.1 * ghc-safe-devel-0.3.21-150500.3.3.1 * ghc-socks-devel-0.6.1-150500.3.2.1 * ghc-random-devel-1.2.1.1-150500.3.3.2 * ghc-zlib-devel-0.6.3.0-150500.3.3.1 * ghc-sop-core-devel-0.5.0.2-150500.11.3.1 * ghc-skylighting-format-ansi-devel-0.1-150500.11.3.1 * ghc-yaml-devel-0.11.11.2-150500.3.3.1 * ghc-hslua-module-version-devel-1.1.1-150500.3.3.1 * ghc-pandoc-lua-marshal-devel-0.2.4-150500.3.3.1 * ghc-http-date-0.0.11-150500.11.3.2 * ghc-basement-devel-0.0.16-150500.3.3.1 * ghc-hslua-module-text-devel-1.1.1-150500.3.3.1 * ghc-witherable-0.4.2-150500.11.3.1 * ghc-commonmark-extensions-0.2.5.1-150500.3.3.1 * ghc-network-3.1.4.0-150500.3.3.1 * ghc-typst-symbols-devel-0.1.5-150500.11.3.1 * ghc-hslua-classes-2.3.1-150500.3.3.1 * ghc-unicode-data-0.4.0.1-150500.3.3.1 * ghc-pem-devel-0.2.4-150500.3.2.1 * ghc-recv-0.1.0-150500.11.3.2 * ghc-unix-compat-devel-0.7.1-150500.11.3.1 * ghc-hslua-module-doclayout-1.1.1-150500.3.3.1 * ghc-hslua-packaging-devel-2.3.1-150500.3.3.1 * ghc-iproute-1.7.12-150500.3.2.1 * ghc-typed-process-devel-0.2.11.1-150500.3.3.3 * ghc-wai-app-static-3.1.8-150500.11.3.1 * ghc-constraints-0.14-150500.11.3.2 * ghc-monad-control-devel-1.0.3.1-150500.11.3.1 * ghc-indexed-traversable-0.1.3-150500.3.3.1 * ghc-unordered-containers-0.2.20-150500.3.3.1 * ghc-base-compat-batteries-devel-0.13.1-150500.3.3.1 * alex-3.4.0.1-150500.11.3.1 * ghc-assoc-1.1-150500.3.3.2 * ghc-hslua-module-zip-1.1.1-150500.11.3.1 * ghc-bitvec-1.1.5.0-150500.11.3.2 * ghc-commonmark-pandoc-0.2.2-150500.3.3.1 * ghc-lpeg-1.0.4-150500.3.3.1 * ghc-regex-base-0.94.0.2-150500.11.3.1 * ghc-cabal-doctest-devel-1.0.9-150500.3.3.1 * ghc-network-byte-order-0.1.7-150500.11.3.1 * ghc-splitmix-devel-0.1.0.5-150500.3.3.1 * ghc-hslua-cli-1.4.2-150500.11.3.1 * ghc-lua-2.3.2-150500.3.3.1 * ghc-semialign-1.3-150500.11.3.1 * ghc-http-date-devel-0.0.11-150500.11.3.2 * ghc-doclayout-devel-0.4.0.1-150500.3.3.2 * ghc-xml-conduit-devel-1.9.1.3-150500.3.5.1 * ghc-lua-devel-2.3.2-150500.3.3.1 * ghc-network-byte-order-devel-0.1.7-150500.11.3.1 * ghc-base-orphans-devel-0.9.1-150500.3.3.1 * ghc-vector-stream-devel-0.1.0.1-150500.11.3.1 * ghc-aeson-pretty-0.8.10-150500.3.3.2 * ghc-fast-logger-devel-3.2.2-150500.11.3.1 * ghc-unix-time-devel-0.4.11-150500.11.3.1 * ghc-indexed-traversable-instances-devel-0.1.1.2-150500.11.3.2 * ghc-th-lift-instances-0.1.20-150500.3.3.2 * ghc-skylighting-format-context-devel-0.1.0.2-150500.11.3.2 * ghc-transformers-base-devel-0.4.6-150500.11.3.2 * ghc-hslua-repl-0.1.2-150500.11.3.1 * ghc-blaze-html-0.9.1.2-150500.3.3.1 * ghc-hslua-objectorientation-2.3.1-150500.3.3.1 * ghc-base-compat-0.13.1-150500.3.3.1 * ghc-scientific-devel-0.3.7.0-150500.3.3.2 * ghc-string-conversions-0.4.0.1-150500.11.3.1 * ghc-old-time-devel-1.1.0.4-150500.11.3.1 * ghc-asn1-types-0.3.4-150500.3.2.1 * ghc-semigroupoids-devel-6.0.0.1-150500.11.3.1 * ghc-xml-conduit-1.9.1.3-150500.3.5.1 * ghc-async-2.2.5-150500.3.3.2 * ghc-memory-0.18.0-150500.3.3.1 * ghc-wai-logger-devel-2.4.0-150500.11.3.1 * ghc-integer-conversion-0.1.0.1-150500.11.3.1 * ghc-psqueues-devel-0.2.8.0-150500.11.3.2 * ghc-unicode-collation-devel-0.1.3.6-150500.3.3.2 * ghc-simple-sendfile-0.2.32-150500.11.3.1 * ghc-witherable-devel-0.4.2-150500.11.3.1 * ghc-ansi-terminal-devel-1.0.2-150500.3.3.1 * ghc-ansi-terminal-types-0.11.5-150500.11.3.1 * ghc-crypton-x509-validation-devel-1.6.12-150500.11.3.1 * ghc-skylighting-devel-0.14.1-150500.3.3.1 * ghc-gridtables-devel-0.1.0.0-150500.11.3.3 * ghc-some-1.0.6-150500.11.3.1 * ghc-http-media-0.8.1.1-150500.11.3.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * ghc-conduit-1.3.5-150500.3.3.2 * ghc-skylighting-core-0.14.1-150500.3.3.1 * ghc-th-lift-instances-devel-0.1.20-150500.3.3.2 * ghc-th-lift-0.8.4-150500.3.3.1 * ghc-primitive-0.8.0.0-150500.3.3.1 * ghc-hslua-2.3.1-150500.3.3.1 * ghc-unicode-collation-0.1.3.6-150500.3.3.2 * ghc-asn1-types-devel-0.3.4-150500.3.2.1 * ghc-time-compat-1.9.6.1-150500.3.3.2 * ghc-QuickCheck-2.14.3-150500.3.3.2 * ghc-crypton-connection-0.3.1-150500.11.3.1 * ghc-hslua-core-2.3.2-150500.3.3.1 * ghc-hslua-packaging-2.3.1-150500.3.3.1 * ghc-libyaml-devel-0.1.2-150500.3.3.2 * ghc-network-uri-2.6.4.2-150500.3.3.2 * ghc-th-compat-devel-0.1.4-150500.3.3.1 * ghc-tls-devel-1.9.0-150500.3.3.1 * ghc-http-client-tls-0.3.6.3-150500.3.3.1 * ghc-jira-wiki-markup-1.5.1-150500.3.3.1 * ghc-dlist-1.0-150500.3.3.1 * ghc-cassava-devel-0.5.3.0-150500.11.3.2 * ghc-cereal-0.5.8.3-150500.3.3.1 * ghc-indexed-traversable-instances-0.1.1.2-150500.11.3.2 * ghc-ordered-containers-devel-0.2.3-150500.11.3.1 * ghc-zip-archive-0.4.3-150500.3.3.1 * ghc-unliftio-core-0.2.1.0-150500.3.3.1 * ghc-case-insensitive-1.2.1.0-150500.3.2.1 * ghc-commonmark-pandoc-devel-0.2.2-150500.3.3.1 * ghc-pem-0.2.4-150500.3.2.1 * ghc-blaze-html-devel-0.9.1.2-150500.3.3.1 * ghc-mono-traversable-devel-1.0.15.3-150500.3.2.1 * ghc-th-lift-devel-0.8.4-150500.3.3.1 * ghc-commonmark-extensions-devel-0.2.5.1-150500.3.3.1 * ghc-primitive-devel-0.8.0.0-150500.3.3.1 * ghc-blaze-markup-0.8.3.0-150500.3.3.1 * ghc-blaze-builder-0.4.2.3-150500.3.3.1 * ghc-resourcet-1.3.0-150500.3.3.3 * ghc-toml-parser-1.3.2.0-150500.11.3.1 * ghc-iproute-devel-1.7.12-150500.3.2.1 * ghc-safe-devel-0.3.21-150500.3.3.1 * ghc-socks-devel-0.6.1-150500.3.2.1 * ghc-random-devel-1.2.1.1-150500.3.3.2 * ghc-splitmix-0.1.0.5-150500.3.3.1 * ghc-these-1.2-150500.3.3.1 * ghc-zlib-devel-0.6.3.0-150500.3.3.1 * ghc-typed-process-0.2.11.1-150500.3.3.3 * ghc-asn1-parse-0.9.5-150500.3.2.1 * ghc-blaze-markup-devel-0.8.3.0-150500.3.3.1 * ghc-hslua-objectorientation-devel-2.3.1-150500.3.3.1 * ghc-unordered-containers-devel-0.2.20-150500.3.3.1 * ghc-skylighting-format-ansi-devel-0.1-150500.11.3.1 * ghc-ipynb-devel-0.2-150500.3.2.1 * ghc-base16-bytestring-1.0.2.0-150500.3.3.1 * ghc-yaml-devel-0.11.11.2-150500.3.3.1 * ghc-typst-0.5-150500.11.3.1 * ghc-ipynb-0.2-150500.3.2.1 * ghc-base64-bytestring-1.2.1.0-150500.3.3.1 * ghc-hslua-list-1.1.1-150500.11.3.2 * ghc-haddock-library-1.11.0-150500.3.3.1 * ghc-basement-devel-0.0.16-150500.3.3.1 * ghc-dlist-devel-1.0-150500.3.3.1 * ghc-uuid-types-1.0.5.1-150500.3.3.2 * ghc-foldable1-classes-compat-0.1-150500.11.3.2 * ghc-skylighting-format-blaze-html-devel-0.1.1.1-150500.11.3.2 * ghc-crypton-x509-devel-1.7.6-150500.11.3.1 * ghc-witherable-0.4.2-150500.11.3.1 * ghc-commonmark-extensions-0.2.5.1-150500.3.3.1 * ghc-typst-devel-0.5-150500.11.3.1 * pandoc-cli-3.1.11.1-150500.11.3.1 * ghc-network-3.1.4.0-150500.3.3.1 * ghc-skylighting-format-ansi-0.1-150500.11.3.1 * ghc-conduit-devel-1.3.5-150500.3.3.2 * ghc-streaming-commons-0.2.2.6-150500.3.3.3 * ghc-hslua-aeson-2.3.1-150500.3.3.1 * ghc-typst-symbols-devel-0.1.5-150500.11.3.1 * ghc-syb-0.7.2.4-150500.3.3.1 * ghc-digest-0.0.2.0-150500.3.3.1 * ghc-semialign-devel-1.3-150500.11.3.1 * ghc-hslua-classes-2.3.1-150500.3.3.1 * ghc-uniplate-1.6.13-150500.3.2.1 * ghc-unicode-data-0.4.0.1-150500.3.3.1 * ghc-StateVar-1.2.2-150500.11.3.1 * ghc-pem-devel-0.2.4-150500.3.2.1 * ghc-scientific-0.3.7.0-150500.3.3.2 * ghc-texmath-0.12.8.6-150500.3.3.1 * ghc-text-short-devel-0.1.5-150500.11.3.2 * ghc-unliftio-core-devel-0.2.1.0-150500.3.3.1 * ghc-hslua-core-devel-2.3.2-150500.3.3.1 * ghc-bitvec-devel-1.1.5.0-150500.11.3.2 * ghc-syb-devel-0.7.2.4-150500.3.3.1 * ghc-th-compat-0.1.4-150500.3.3.1 * ghc-assoc-devel-1.1-150500.3.3.2 * ghc-zlib-0.6.3.0-150500.3.3.1 * ghc-bifunctors-5.6.1-150500.3.3.1 * ghc-regex-tdfa-1.3.2.2-150500.11.3.1 * ghc-strict-0.5-150500.3.3.1 * ghc-cassava-0.5.3.0-150500.11.3.2 * ghc-strict-devel-0.5-150500.3.3.1 * ghc-integer-logarithms-devel-1.0.3.1-150500.3.3.1 * ghc-JuicyPixels-3.3.8-150500.3.3.1 * ghc-data-array-byte-devel-0.1.0.1-150500.11.3.1 * ghc-pandoc-devel-3.1.11.1-150500.11.3.1 * ghc-hslua-list-devel-1.1.1-150500.11.3.2 * ghc-iproute-1.7.12-150500.3.2.1 * ghc-typed-process-devel-0.2.11.1-150500.3.3.3 * ghc-ansi-terminal-1.0.2-150500.3.3.1 * ghc-skylighting-format-blaze-html-0.1.1.1-150500.11.3.2 * ghc-streaming-commons-devel-0.2.2.6-150500.3.3.3 * ghc-unicode-transforms-devel-0.4.0.1-150500.3.3.1 * ghc-indexed-traversable-0.1.3-150500.3.3.1 * ghc-pandoc-3.1.11.1-150500.11.3.1 * ghc-bifunctors-devel-5.6.1-150500.3.3.1 * ghc-base-compat-batteries-devel-0.13.1-150500.3.3.1 * ghc-unordered-containers-0.2.20-150500.3.3.1 * ghc-text-short-0.1.5-150500.11.3.2 * ghc-hslua-marshalling-2.3.1-150500.3.3.2 * ghc-cabal-doctest-1.0.9-150500.3.3.1 * ghc-base64-bytestring-devel-1.2.1.0-150500.3.3.1 * ghc-hslua-module-text-1.1.1-150500.3.3.1 * ghc-uuid-types-devel-1.0.5.1-150500.3.3.2 * ghc-libyaml-0.1.2-150500.3.3.2 * ghc-doctemplates-devel-0.11-150500.3.3.1 * ghc-vector-algorithms-devel-0.9.0.1-150500.3.3.1 * ghc-assoc-1.1-150500.3.3.2 * ghc-OneTuple-0.4.1.1-150500.3.3.2 * ghc-crypton-connection-devel-0.3.1-150500.11.3.1 * ghc-safe-0.3.21-150500.3.3.1 * ghc-unicode-transforms-0.4.0.1-150500.3.3.1 * ghc-tagged-devel-0.8.8-150500.3.3.1 * ghc-prettyprinter-devel-1.7.1-150500.11.3.1 * ghc-case-insensitive-devel-1.2.1.0-150500.3.2.1 * ghc-bitvec-1.1.5.0-150500.11.3.2 * ghc-commonmark-pandoc-0.2.2-150500.3.3.1 * ghc-old-time-1.1.0.4-150500.11.3.1 * ghc-lpeg-1.0.4-150500.3.3.1 * ghc-contravariant-1.5.5-150500.11.3.1 * ghc-yaml-0.11.11.2-150500.3.3.1 * ghc-http-types-0.12.4-150500.3.3.2 * ghc-crypton-x509-1.7.6-150500.11.3.1 * ghc-temporary-1.3-150500.3.2.1 * ghc-asn1-parse-devel-0.9.5-150500.3.2.1 * ghc-pandoc-types-1.23.1-150500.3.3.1 * ghc-citeproc-devel-0.8.1-150500.3.3.1 * ghc-generically-devel-0.1.1-150500.11.3.1 * ghc-regex-base-0.94.0.2-150500.11.3.1 * ghc-hslua-typing-devel-0.1.1-150500.11.3.1 * ghc-digits-0.3.1-150500.11.3.3 * ghc-JuicyPixels-devel-3.3.8-150500.3.3.1 * ghc-jira-wiki-markup-devel-1.5.1-150500.3.3.1 * ghc-splitmix-devel-0.1.0.5-150500.3.3.1 * ghc-vector-0.13.1.0-150500.3.3.1 * ghc-lua-2.3.2-150500.3.3.1 * ghc-distributive-devel-0.6.2.1-150500.3.2.1 * ghc-comonad-5.0.8-150500.3.3.1 * ghc-skylighting-format-latex-devel-0.1-150500.11.3.2 * ghc-semialign-1.3-150500.11.3.1 * ghc-typst-symbols-0.1.5-150500.11.3.1 * ghc-crypton-x509-store-1.6.9-150500.11.3.1 * ghc-network-devel-3.1.4.0-150500.3.3.1 * ghc-doclayout-devel-0.4.0.1-150500.3.3.2 * ghc-http-client-0.7.16-150500.3.3.2 * ghc-pandoc-types-devel-1.23.1-150500.3.3.1 * ghc-aeson-2.1.2.1-150500.3.3.1 * ghc-xml-conduit-devel-1.9.1.3-150500.3.5.1 * ghc-split-devel-0.2.5-150500.3.3.1 * ghc-text-conversions-0.3.1.1-150500.3.2.1 * ghc-hslua-typing-0.1.1-150500.11.3.1 * ghc-pretty-show-1.10-150500.3.2.1 * ghc-QuickCheck-devel-2.14.3-150500.3.3.2 * ghc-base16-bytestring-devel-1.0.2.0-150500.3.3.1 * ghc-http-client-tls-devel-0.3.6.3-150500.3.3.1 * ghc-semigroupoids-6.0.0.1-150500.11.3.1 * ghc-conduit-extra-devel-1.3.6-150500.3.2.1 * ghc-socks-0.6.1-150500.3.2.1 * ghc-doctemplates-0.11-150500.3.3.1 * ghc-conduit-extra-1.3.6-150500.3.2.1 * ghc-lua-devel-2.3.2-150500.3.3.1 * ghc-foldable1-classes-compat-devel-0.1-150500.11.3.2 * ghc-contravariant-devel-1.5.5-150500.11.3.1 * ghc-data-fix-devel-0.3.2-150500.3.3.2 * ghc-pandoc-lua-marshal-0.2.4-150500.3.3.1 * ghc-ansi-terminal-types-devel-0.11.5-150500.11.3.1 * ghc-base-orphans-devel-0.9.1-150500.3.3.1 * ghc-distributive-0.6.2.1-150500.3.2.1 * ghc-comonad-devel-5.0.8-150500.3.3.1 * ghc-aeson-pretty-0.8.10-150500.3.3.2 * ghc-data-array-byte-0.1.0.1-150500.11.3.1 * ghc-skylighting-format-context-0.1.0.2-150500.11.3.2 * ghc-unicode-data-devel-0.4.0.1-150500.3.3.1 * ghc-these-devel-1.2-150500.3.3.1 * ghc-vector-devel-0.13.1.0-150500.3.3.1 * ghc-resourcet-devel-1.3.0-150500.3.3.3 * ghc-th-abstraction-devel-0.5.0.0-150500.3.3.1 * ghc-crypton-0.34-150500.11.3.2 * ghc-unix-time-devel-0.4.11-150500.11.3.1 * ghc-indexed-traversable-instances-devel-0.1.1.2-150500.11.3.2 * ghc-th-lift-instances-0.1.20-150500.3.3.2 * ghc-skylighting-format-context-devel-0.1.0.2-150500.11.3.2 * ghc-tls-1.9.0-150500.3.3.1 * ghc-zip-archive-devel-0.4.3-150500.3.3.1 * ghc-unix-time-0.4.11-150500.11.3.1 * ghc-crypton-x509-system-1.6.7-150500.11.3.1 * ghc-emojis-0.1.3-150500.3.3.1 * ghc-commonmark-0.2.4.1-150500.3.3.2 * ghc-Only-0.1-150500.11.3.1 * ghc-tagged-0.8.8-150500.3.3.1 * ghc-skylighting-core-devel-0.14.1-150500.3.3.1 * ghc-texmath-devel-0.12.8.6-150500.3.3.1 * ghc-toml-parser-devel-1.3.2.0-150500.11.3.1 * ghc-ordered-containers-0.2.3-150500.11.3.1 * ghc-cookie-0.4.6-150500.3.3.1 * ghc-attoparsec-devel-0.14.4-150500.3.3.2 * ghc-crypton-x509-system-devel-1.6.7-150500.11.3.1 * ghc-hashable-devel-1.4.3.0-150500.3.3.1 * ghc-hslua-module-system-1.1.1-150500.3.3.1 * ghc-haskell-lexer-devel-1.1.1-150500.3.3.1 * ghc-vector-algorithms-0.9.0.1-150500.3.3.1 * ghc-hslua-module-path-1.1.1-150500.3.3.1 * ghc-base-orphans-0.9.1-150500.3.3.1 * ghc-prettyprinter-1.7.1-150500.11.3.1 * ghc-blaze-html-0.9.1.2-150500.3.3.1 * ghc-hslua-objectorientation-2.3.1-150500.3.3.1 * ghc-Only-devel-0.1-150500.11.3.1 * ghc-base-compat-0.13.1-150500.3.3.1 * ghc-scientific-devel-0.3.7.0-150500.3.3.2 * ghc-vector-stream-0.1.0.1-150500.11.3.1 * ghc-vector-stream-devel-0.1.0.1-150500.11.3.1 * ghc-crypton-x509-store-devel-1.6.9-150500.11.3.1 * ghc-citeproc-0.8.1-150500.3.3.1 * ghc-emojis-devel-0.1.3-150500.3.3.1 * ghc-skylighting-0.14.1-150500.3.3.1 * ghc-basement-0.0.16-150500.3.3.1 * ghc-data-fix-0.3.2-150500.3.3.2 * ghc-old-time-devel-1.1.0.4-150500.11.3.1 * ghc-th-abstraction-0.5.0.0-150500.3.3.1 * ghc-asn1-encoding-devel-0.9.6-150500.3.2.1 * ghc-asn1-encoding-0.9.6-150500.3.2.1 * ghc-asn1-types-0.3.4-150500.3.2.1 * ghc-http-client-devel-0.7.16-150500.3.3.2 * ghc-mono-traversable-1.0.15.3-150500.3.2.1 * ghc-random-1.2.1.1-150500.3.3.2 * ghc-semigroupoids-devel-6.0.0.1-150500.11.3.1 * ghc-hslua-module-version-1.1.1-150500.3.3.1 * ghc-skylighting-format-latex-0.1-150500.11.3.2 * ghc-OneTuple-devel-0.4.1.1-150500.3.3.2 * ghc-generically-0.1.1-150500.11.3.1 * ghc-memory-devel-0.18.0-150500.3.3.1 * ghc-xml-conduit-1.9.1.3-150500.3.5.1 * ghc-haddock-library-devel-1.11.0-150500.3.3.1 * ghc-aeson-pretty-devel-0.8.10-150500.3.3.2 * ghc-cookie-devel-0.4.6-150500.3.3.1 * ghc-haskell-lexer-1.1.1-150500.3.3.1 * ghc-temporary-devel-1.3-150500.3.2.1 * ghc-http-types-devel-0.12.4-150500.3.3.2 * ghc-integer-logarithms-1.0.3.1-150500.3.3.1 * ghc-regex-base-devel-0.94.0.2-150500.11.3.1 * ghc-async-2.2.5-150500.3.3.2 * ghc-memory-0.18.0-150500.3.3.1 * ghc-indexed-traversable-devel-0.1.3-150500.3.3.1 * ghc-commonmark-devel-0.2.4.1-150500.3.3.2 * ghc-uniplate-devel-1.6.13-150500.3.2.1 * ghc-time-compat-devel-1.9.6.1-150500.3.3.2 * ghc-pretty-show-devel-1.10-150500.3.2.1 * ghc-hashable-1.4.3.0-150500.3.3.1 * ghc-unicode-collation-devel-0.1.3.6-150500.3.3.2 * texmath-0.12.8.6-150500.3.3.1 * ghc-split-0.2.5-150500.3.3.1 * ghc-regex-tdfa-devel-1.3.2.2-150500.11.3.1 * ghc-StateVar-devel-1.2.2-150500.11.3.1 * ghc-blaze-builder-devel-0.4.2.3-150500.3.3.1 * ghc-crypton-devel-0.34-150500.11.3.2 * ghc-mime-types-0.1.2.0-150500.3.3.1 * ghc-base-compat-devel-0.13.1-150500.3.3.1 * ghc-digits-devel-0.3.1-150500.11.3.3 * ghc-gridtables-0.1.0.0-150500.11.3.3 * ghc-text-conversions-devel-0.3.1.1-150500.3.2.1 * ghc-base-compat-batteries-0.13.1-150500.3.3.1 * ghc-ansi-terminal-devel-1.0.2-150500.3.3.1 * ghc-hslua-marshalling-devel-2.3.1-150500.3.3.2 * ghc-crypton-x509-validation-1.6.12-150500.11.3.1 * ghc-ansi-terminal-types-0.11.5-150500.11.3.1 * ghc-witherable-devel-0.4.2-150500.11.3.1 * ghc-aeson-devel-2.1.2.1-150500.3.3.1 * ghc-doclayout-0.4.0.1-150500.3.3.2 * ghc-crypton-x509-validation-devel-1.6.12-150500.11.3.1 * ghc-skylighting-devel-0.14.1-150500.3.3.1 * ghc-network-uri-devel-2.6.4.2-150500.3.3.2 * ghc-async-devel-2.2.5-150500.3.3.2 * ghc-cereal-devel-0.5.8.3-150500.3.3.1 * ghc-gridtables-devel-0.1.0.0-150500.11.3.3 * ghc-attoparsec-0.14.4-150500.3.3.2 * ghc-digest-devel-0.0.2.0-150500.3.3.1 * ghc-mime-types-devel-0.1.2.0-150500.3.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:32 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:32 -0000 Subject: SUSE-SU-2024:0538-1: moderate: Security update for hdf5 Message-ID: <170851863200.13950.13237918374596854260@smelt2.prg2.suse.org> # Security update for hdf5 Announcement ID: SUSE-SU-2024:0538-1 Rating: moderate References: * bsc#1011205 * bsc#1093641 * bsc#1125882 * bsc#1167400 * bsc#1207973 * jsc#PED-7816 Cross-References: * CVE-2016-4332 * CVE-2018-11202 * CVE-2019-8396 * CVE-2020-10812 * CVE-2021-37501 CVSS scores: * CVE-2016-4332 ( NVD ): 8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2018-11202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2018-11202 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-8396 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-8396 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-10812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2020-10812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-37501 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2021-37501 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * HPC Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and contains one feature can now be installed. ## Description: This update for hdf5 fixes the following issues: Updated to version 1.10.11 * Changed the error handling for a not found path in the find plugin process. * Fixed CVE-2018-11202, a malformed file could result in chunk index memory leaks. * Fixed a file space allocation bug in the parallel library for chunked datasets. * Fixed an assertion failure in Parallel HDF5 when a file can't be created due to an invalid library version bounds setting. * Fixed an assertion in a previous fix for CVE-2016-4332. * Fixed segfault on file close in h5debug which fails with a core dump on a file that has an illegal file size in its cache image. Fixes HDFFV-11052, CVE-2020-10812. * Fixed memory leaks that could occur when reading a dataset from a malformed file. * Fixed a bug in H5Ocopy that could generate invalid HDF5 files * Fixed potential heap buffer overflow in decoding of link info message. * Fixed potential buffer overrun issues in some object header decode routines. * Fixed a heap buffer overflow that occurs when reading from a dataset with a compact layout within a malformed HDF5 file. * Fixed CVE-2019-8396, malformed HDF5 files where content does not match expected size. * Fixed memory leak when running h5dump with proof of vulnerability file. * Added option --no-compact-subset to h5diff. Fixes since 1.10.10: * Fixed a memory corruption when reading from dataset using a hyperslab selection in file dataspace and a point selection memory dataspace. * Fix CVE-2021-37501 * Fixed an issue with variable length attributes. * Fixed an issue with hyperslab selections where an incorrect combined selection was produced. * Fixed an issue with attribute type conversion with compound datatypes. * Modified H5Fstart_swmr_write() to preserve DAPL properties. * Converted an assertion on (possibly corrupt) file contents to a normal error check. * Fixed memory leak with variable-length fill value in H5O_fill_convert(). * Fix h5repack to only print output when verbose option is selected. Fixes since 1.10.9: * Several improvements to parallel compression feature, including: * Improved support for collective I/O (for both writes and reads). * Reduction of copying of application data buffers passed to H5Dwrite. * Addition of support for incremental file space allocation for filtered datasets created in parallel. * Addition of support for HDF5's "don't filter partial edge chunks" flag * Addition of proper support for HDF5 fill values with the feature. * Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to H5pubconf.h so HDF5 applications can determine at compile-time whether the feature is available. * Addition of simple examples * h5repack added an optional verbose value for reporting R/W timing. * Fixed a metadata cache bug when resizing a pinned/protected cache entry. * Fixed a problem with the H5_VERS_RELEASE check in the H5check_version function. * Unified handling of collective metadata reads to correctly fix old bugs. * Fixed several potential MPI deadlocks in library failure conditions. * Fixed an issue with collective metadata reads being permanently disabled after a dataset chunk lookup operation. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-538=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-538=1 * HPC Module 15-SP5 zypper in -t patch SUSE-SLE-Module-HPC-15-SP5-2024-538=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-538=1 ## Package List: * openSUSE Leap 15.4 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * HPC Module 15-SP5 (aarch64 x86_64) * hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (noarch) * hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5-hpc-examples-1.10.11-150400.3.12.1 * hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 * hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * SUSE Package Hub 15 15-SP5 (ppc64le s390x) * libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-debugsource-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-debuginfo-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 * libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-debuginfo-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 * libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 * libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-mpich-hpc-debugsource-1.10.11-150400.3.12.1 * hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 * libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 * libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2016-4332.html * https://www.suse.com/security/cve/CVE-2018-11202.html * https://www.suse.com/security/cve/CVE-2019-8396.html * https://www.suse.com/security/cve/CVE-2020-10812.html * https://www.suse.com/security/cve/CVE-2021-37501.html * https://bugzilla.suse.com/show_bug.cgi?id=1011205 * https://bugzilla.suse.com/show_bug.cgi?id=1093641 * https://bugzilla.suse.com/show_bug.cgi?id=1125882 * https://bugzilla.suse.com/show_bug.cgi?id=1167400 * https://bugzilla.suse.com/show_bug.cgi?id=1207973 * https://jira.suse.com/browse/PED-7816 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 12:30:34 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 12:30:34 -0000 Subject: SUSE-RU-2024:0537-1: important: Recommended update for csp-billing-adapter, csp-billing-adapter-local Message-ID: <170851863439.13950.9278350715004109370@smelt2.prg2.suse.org> # Recommended update for csp-billing-adapter, csp-billing-adapter-local Announcement ID: SUSE-RU-2024:0537-1 Rating: important References: Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for csp-billing-adapter, csp-billing-adapter-local contains the following fixes: Changes for csp-billing-adapter-local: \- Update to version 0.5.0: * Attempt to backup archive before saving * Add get_archive_location function * Add metering archive hook implementations Changes for csp-billing-adapter: \- Update to version 0.9.0: * Add metering archive feature ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-537=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-537=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-537=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python3-csp-billing-adapter-local-0.5.0-150400.9.11.1 * python3-csp-billing-adapter-0.9.0-150400.9.11.1 * csp-billing-adapter-service-0.9.0-150400.9.11.1 * Public Cloud Module 15-SP4 (noarch) * python3-csp-billing-adapter-local-0.5.0-150400.9.11.1 * python3-csp-billing-adapter-0.9.0-150400.9.11.1 * csp-billing-adapter-service-0.9.0-150400.9.11.1 * Public Cloud Module 15-SP5 (noarch) * python3-csp-billing-adapter-local-0.5.0-150400.9.11.1 * python3-csp-billing-adapter-0.9.0-150400.9.11.1 * csp-billing-adapter-service-0.9.0-150400.9.11.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 21 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0581-1: moderate: Security update for python3 Message-ID: <170853300218.9057.11119093481942679970@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2024:0581-1 Rating: moderate References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-581=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-581=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-581=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-581=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-581=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-581=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-581=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-581=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-581=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-581=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-581=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-581=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-581=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-devel-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-devel-debuginfo-3.6.15-150300.10.54.1 * python3-tk-debuginfo-3.6.15-150300.10.54.1 * python3-curses-debuginfo-3.6.15-150300.10.54.1 * python3-dbm-3.6.15-150300.10.54.1 * python3-dbm-debuginfo-3.6.15-150300.10.54.1 * python3-curses-3.6.15-150300.10.54.1 * python3-tk-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-idle-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-dbm-3.6.15-150300.10.54.1 * python3-testsuite-debuginfo-3.6.15-150300.10.54.1 * python3-doc-devhelp-3.6.15-150300.10.54.1 * python3-idle-3.6.15-150300.10.54.1 * python3-doc-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-devel-3.6.15-150300.10.54.1 * python3-curses-debuginfo-3.6.15-150300.10.54.1 * python3-dbm-debuginfo-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-devel-debuginfo-3.6.15-150300.10.54.1 * python3-tk-debuginfo-3.6.15-150300.10.54.1 * python3-tools-3.6.15-150300.10.54.1 * python3-tk-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * python3-testsuite-3.6.15-150300.10.54.1 * python3-curses-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * openSUSE Leap 15.3 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.54.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.54.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-64bit-3.6.15-150300.10.54.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-dbm-3.6.15-150300.10.54.1 * python3-testsuite-debuginfo-3.6.15-150300.10.54.1 * python3-doc-devhelp-3.6.15-150300.10.54.1 * python3-idle-3.6.15-150300.10.54.1 * python3-doc-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-devel-3.6.15-150300.10.54.1 * python3-curses-debuginfo-3.6.15-150300.10.54.1 * python3-dbm-debuginfo-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-devel-debuginfo-3.6.15-150300.10.54.1 * python3-tk-debuginfo-3.6.15-150300.10.54.1 * python3-tools-3.6.15-150300.10.54.1 * python3-tk-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * python3-testsuite-3.6.15-150300.10.54.1 * python3-curses-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * openSUSE Leap 15.5 (x86_64) * libpython3_6m1_0-32bit-3.6.15-150300.10.54.1 * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libpython3_6m1_0-debuginfo-3.6.15-150300.10.54.1 * python3-base-debuginfo-3.6.15-150300.10.54.1 * libpython3_6m1_0-3.6.15-150300.10.54.1 * python3-3.6.15-150300.10.54.1 * python3-debuginfo-3.6.15-150300.10.54.1 * python3-base-3.6.15-150300.10.54.1 * python3-debugsource-3.6.15-150300.10.54.1 * python3-core-debugsource-3.6.15-150300.10.54.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 08:30:02 -0000 Subject: SUSE-RU-2024:0584-1: moderate: Recommended update for python3-azuremetadata Message-ID: <170859060236.13276.9024114117792308852@smelt2.prg2.suse.org> # Recommended update for python3-azuremetadata Announcement ID: SUSE-RU-2024:0584-1 Rating: moderate References: * bsc#1194663 * bsc#1214930 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for python3-azuremetadata fixes the following issues: * Fix empty list attributes (bsc#1214930) * Handle lsblk output format change. The json data now contains "mountpoints" instead of "mountpoint" (bsc#1194663) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2024-584=1 ## Package List: * Public Cloud Module 12 (noarch) * python3-azuremetadata-5.1.6-1.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1194663 * https://bugzilla.suse.com/show_bug.cgi?id=1214930 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 08:30:05 -0000 Subject: SUSE-RU-2024:0583-1: moderate: Recommended update for python3-azuremetadata Message-ID: <170859060510.13276.6383675365027540069@smelt2.prg2.suse.org> # Recommended update for python3-azuremetadata Announcement ID: SUSE-RU-2024:0583-1 Rating: moderate References: * bsc#1218760 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python3-azuremetadata fixes the following issues: * Fix empty list attributes (bsc#1218760) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-583=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-583=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-583=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-583=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-583=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-583=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-583=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-583=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-583=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-583=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-583=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-583=1 ## Package List: * openSUSE Leap Micro 5.3 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * openSUSE Leap Micro 5.4 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * openSUSE Leap 15.5 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * Public Cloud Module 15-SP2 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * Public Cloud Module 15-SP3 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * Public Cloud Module 15-SP4 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 * Public Cloud Module 15-SP5 (noarch) * python3-azuremetadata-5.1.6-150000.1.26.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 08:30:08 -0000 Subject: SUSE-RU-2024:0582-1: moderate: Recommended update for rust Message-ID: <170859060850.13276.4123889989028651782@smelt2.prg2.suse.org> # Recommended update for rust Announcement ID: SUSE-RU-2024:0582-1 Rating: moderate References: * jsc#SLE-18626 Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for rust fixes the following issues: * Update to version 1.76.0 - for details see the rust1.76 package # Version 1.76.0 (2024-02-08) ## Language * Document Rust ABI compatibility between various types * Also: guarantee that char and u32 are ABI-compatible * Warn against ambiguous wide pointer comparisons * Add lint `ambiguous_wide_pointer_comparisons` that supersedes `clippy::vtable_address_comparisons` ## Compiler * Lint pinned `#[must_use]` pointers (in particular, `Box<T>` where `T` is `#[must_use]`) in `unused_must_use`. * Soundness fix: fix computing the offset of an unsized field in a packed struct * Soundness fix: fix dynamic size/align computation logic for packed types with dyn Trait tail * Add `$message_type` field to distinguish json diagnostic outputs * Enable Rust to use the EHCont security feature of Windows * Add tier 3 {x86_64,i686}-win7-windows-msvc targets * Add tier 3 aarch64-apple-watchos target * Add tier 3 arm64e-apple-ios & arm64e-apple-darwin targets Refer to Rust's [platform support page for more information on Rust's tiered platform support. ## Libraries * Add a column number to `dbg!()` * Add `std::hash::{DefaultHasher, RandomState}` exports * Fix rounding issue with exponents in fmt * Add T: ?Sized to `RwLockReadGuard` and `RwLockWriteGuard`'s Debug impls. * Windows: Allow `File::create` to work on hidden files ## Stabilized APIs * `Arc::unwrap_or_clone` (https://doc.rust- lang.org/stable/std/sync/struct.Arc.html#method.unwrap_or_clone) * `Rc::unwrap_or_clone` (https://doc.rust- lang.org/stable/std/rc/struct.Rc.html#method.unwrap_or_clone) * `Result::inspect` (https://doc.rust- lang.org/stable/std/result/enum.Result.html#method.inspect) * `Result::inspect_err` (https://doc.rust- lang.org/stable/std/result/enum.Result.html#method.inspect_err) * `Option::inspect` (https://doc.rust- lang.org/stable/std/option/enum.Option.html#method.inspect) * `type_name_of_val` (https://doc.rust- lang.org/stable/std/any/fn.type_name_of_val.html) * `std::hash::{DefaultHasher, RandomState}` (https://doc.rust- lang.org/stable/std/hash/index.html#structs) These were previously available only through `std::collections::hash_map`. * `ptr::{from_ref, from_mut}` (https://doc.rust- lang.org/stable/std/ptr/fn.from_ref.html) * `ptr::addr_eq` (https://doc.rust-lang.org/stable/std/ptr/fn.addr_eq.html) ## Cargo See Cargo release notes at https://github.com/rust- lang/cargo/blob/master/CHANGELOG.md#cargo-176-2024-02-08 . ## Rustdoc * Don't merge cfg and doc(cfg) attributes for re-exports * rustdoc: allow resizing the sidebar / hiding the top bar * rustdoc-search: add support for traits and associated types * rustdoc: Add highlighting for comments in items declaration ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-582=1 openSUSE-SLE-15.5-2024-582=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-582=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * rust1.76-debuginfo-1.76.0-150500.11.3.1 * rust-1.76.0-150500.27.6.1 * cargo1.76-debuginfo-1.76.0-150500.11.3.1 * cargo1.76-1.76.0-150500.11.3.1 * cargo-1.76.0-150500.27.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586 nosrc) * rust1.76-1.76.0-150500.11.3.1 * openSUSE Leap 15.5 (nosrc) * rust1.76-test-1.76.0-150500.11.3.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rust1.76-debuginfo-1.76.0-150500.11.3.1 * rust-1.76.0-150500.27.6.1 * cargo1.76-debuginfo-1.76.0-150500.11.3.1 * cargo1.76-1.76.0-150500.11.3.1 * cargo-1.76.0-150500.27.6.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64 nosrc) * rust1.76-1.76.0-150500.11.3.1 ## References: * https://jira.suse.com/browse/SLE-18626 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0589-1: important: Security update for qemu Message-ID: <170860500493.2548.2451861053914890951@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2024:0589-1 Rating: important References: * bsc#1188609 * bsc#1212850 * bsc#1213210 * bsc#1213925 * bsc#1215311 Cross-References: * CVE-2021-3638 * CVE-2023-3180 * CVE-2023-3354 CVSS scores: * CVE-2021-3638 ( SUSE ): 3.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L * CVE-2021-3638 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-3180 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-3180 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2023-3354 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3354 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves three vulnerabilities and has two security fixes can now be installed. ## Description: This update for qemu fixes the following issues: * CVE-2021-3638: hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (bsc#1188609) * CVE-2023-3180: virtio-crypto: verify src and dst buffer length for sym request (bsc#1213925) * CVE-2023-3354: io: remove io watch if TLS channel is closed during handshake (bsc#1212850) * [openSUSE] roms/ipxe: Backport 0aa2e4ec9635, in preparation of binutils 2.41 (bsc#1215311) * target/s390x: Fix the "ignored match" case in VSTRS (bsc#1213210) * linux-user/elfload: Enable vxe2 on s390x (bsc#1213210) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-589=1 ## Package List: * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * qemu-ivshmem-tools-7.1.0-150500.49.9.2 * qemu-debuginfo-7.1.0-150500.49.9.2 * qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.9.2 * qemu-block-dmg-7.1.0-150500.49.9.2 * qemu-block-nfs-7.1.0-150500.49.9.2 * qemu-vhost-user-gpu-7.1.0-150500.49.9.2 * qemu-audio-oss-debuginfo-7.1.0-150500.49.9.2 * qemu-extra-7.1.0-150500.49.9.2 * qemu-block-dmg-debuginfo-7.1.0-150500.49.9.2 * qemu-extra-debuginfo-7.1.0-150500.49.9.2 * qemu-block-gluster-7.1.0-150500.49.9.2 * qemu-accel-qtest-7.1.0-150500.49.9.2 * qemu-block-nfs-debuginfo-7.1.0-150500.49.9.2 * qemu-audio-oss-7.1.0-150500.49.9.2 * qemu-audio-jack-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-usb-smartcard-7.1.0-150500.49.9.2 * qemu-audio-jack-7.1.0-150500.49.9.2 * qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.9.2 * qemu-block-gluster-debuginfo-7.1.0-150500.49.9.2 * qemu-debugsource-7.1.0-150500.49.9.2 * qemu-accel-qtest-debuginfo-7.1.0-150500.49.9.2 * qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (noarch) * qemu-seabios-1.16.0_0_gd239552-150500.49.9.2 * qemu-skiboot-7.1.0-150500.49.9.2 * qemu-vgabios-1.16.0_0_gd239552-150500.49.9.2 * qemu-sgabios-8-150500.49.9.2 * qemu-microvm-7.1.0-150500.49.9.2 * qemu-SLOF-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * qemu-accel-tcg-x86-7.1.0-150500.49.9.2 * qemu-audio-pa-7.1.0-150500.49.9.2 * qemu-audio-pa-debuginfo-7.1.0-150500.49.9.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.9.2 * qemu-audio-alsa-debuginfo-7.1.0-150500.49.9.2 * qemu-x86-7.1.0-150500.49.9.2 * qemu-audio-alsa-7.1.0-150500.49.9.2 * qemu-x86-debuginfo-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le) * qemu-hw-display-virtio-gpu-7.1.0-150500.49.9.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le x86_64) * qemu-s390x-7.1.0-150500.49.9.2 * qemu-s390x-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (aarch64 s390x x86_64) * qemu-ppc-7.1.0-150500.49.9.2 * qemu-ppc-debuginfo-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (ppc64le s390x x86_64) * qemu-arm-7.1.0-150500.49.9.2 * qemu-arm-debuginfo-7.1.0-150500.49.9.2 * SUSE Package Hub 15 15-SP5 (s390x) * qemu-chardev-spice-7.1.0-150500.49.9.2 * qemu-ui-spice-core-7.1.0-150500.49.9.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.9.2 * qemu-ui-spice-app-7.1.0-150500.49.9.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-display-qxl-7.1.0-150500.49.9.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.9.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.9.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.9.2 * qemu-ui-gtk-7.1.0-150500.49.9.2 * qemu-ui-spice-app-debuginfo-7.1.0-150500.49.9.2 * qemu-hw-usb-redirect-7.1.0-150500.49.9.2 * qemu-audio-spice-7.1.0-150500.49.9.2 * qemu-ui-gtk-debuginfo-7.1.0-150500.49.9.2 * qemu-ui-opengl-7.1.0-150500.49.9.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.9.2 ## References: * https://www.suse.com/security/cve/CVE-2021-3638.html * https://www.suse.com/security/cve/CVE-2023-3180.html * https://www.suse.com/security/cve/CVE-2023-3354.html * https://bugzilla.suse.com/show_bug.cgi?id=1188609 * https://bugzilla.suse.com/show_bug.cgi?id=1212850 * https://bugzilla.suse.com/show_bug.cgi?id=1213210 * https://bugzilla.suse.com/show_bug.cgi?id=1213925 * https://bugzilla.suse.com/show_bug.cgi?id=1215311 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0588-1: moderate: Recommended update for kdump Message-ID: <170860500702.2548.17984780488546162375@smelt2.prg2.suse.org> # Recommended update for kdump Announcement ID: SUSE-RU-2024:0588-1 Rating: moderate References: * bsc#1218494 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for kdump fixes the following issues: * dracut: always create fstab, even if empty (bsc#1218494) * fix NOSPLIT option * Honor the KDUMP_VERBOSE setting in kdump-save ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-588=1 openSUSE-SLE-15.5-2024-588=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-588=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-588=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kdump-debugsource-1.0.2+git45.g7e4faf4-150500.3.3.1 * kdump-1.0.2+git45.g7e4faf4-150500.3.3.1 * kdump-debuginfo-1.0.2+git45.g7e4faf4-150500.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * kdump-debugsource-1.0.2+git45.g7e4faf4-150500.3.3.1 * kdump-1.0.2+git45.g7e4faf4-150500.3.3.1 * kdump-debuginfo-1.0.2+git45.g7e4faf4-150500.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * kdump-debugsource-1.0.2+git45.g7e4faf4-150500.3.3.1 * kdump-1.0.2+git45.g7e4faf4-150500.3.3.1 * kdump-debuginfo-1.0.2+git45.g7e4faf4-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218494 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 12:30:09 -0000 Subject: SUSE-SU-2024:0587-1: important: Security update for docker Message-ID: <170860500966.2548.12341717960615171286@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2024:0587-1 Rating: important References: * bsc#1219267 * bsc#1219268 * bsc#1219438 Cross-References: * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 CVSS scores: * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Containers Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for docker fixes the following issues: Vendor latest buildkit v0.11 including bugfixes for the following: * CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438). * CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268). * CVE-2024-23651: Fixed race condition in mount (bsc#1219267). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 12 zypper in -t patch SUSE-SLE-Module-Containers-12-2024-587=1 ## Package List: * Containers Module 12 (ppc64le s390x x86_64) * docker-24.0.7_ce-98.106.1 * docker-debuginfo-24.0.7_ce-98.106.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 12:30:11 -0000 Subject: SUSE-SU-2024:0586-1: important: Security update for docker Message-ID: <170860501158.2548.7297282831160939877@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2024:0586-1 Rating: important References: * bsc#1219267 * bsc#1219268 * bsc#1219438 Cross-References: * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 CVSS scores: * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Containers Module 15-SP4 * Containers Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for docker fixes the following issues: Vendor latest buildkit v0.11 including bugfixes for the following: * CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438). * CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268). * CVE-2024-23651: Fixed race condition in mount (bsc#1219267). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-586=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-586=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-586=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-586=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-586=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-586=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-586=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-586=1 * Containers Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2024-586=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-586=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-586=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-586=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-586=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-586=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-586=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-586=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-586=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-586=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-586=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-586=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-586=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-586=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-586=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-586=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * openSUSE Leap 15.5 (noarch) * docker-fish-completion-24.0.7_ce-150000.193.1 * docker-zsh-completion-24.0.7_ce-150000.193.1 * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * Containers Module 15-SP4 (aarch64 ppc64le s390x) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * Containers Module 15-SP4 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * Containers Module 15-SP5 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * docker-fish-completion-24.0.7_ce-150000.193.1 * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * docker-fish-completion-24.0.7_ce-150000.193.1 * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * docker-fish-completion-24.0.7_ce-150000.193.1 * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * docker-bash-completion-24.0.7_ce-150000.193.1 * docker-rootless-extras-24.0.7_ce-150000.193.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Enterprise Storage 7.1 (noarch) * docker-fish-completion-24.0.7_ce-150000.193.1 * docker-bash-completion-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * docker-debuginfo-24.0.7_ce-150000.193.1 * docker-24.0.7_ce-150000.193.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 12:30:14 -0000 Subject: SUSE-SU-2024:0585-1: moderate: Security update for python-pycryptodome Message-ID: <170860501459.2548.14316063939468894767@smelt2.prg2.suse.org> # Security update for python-pycryptodome Announcement ID: SUSE-SU-2024:0585-1 Rating: moderate References: * bsc#1218564 Cross-References: * CVE-2023-52323 CVSS scores: * CVE-2023-52323 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52323 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Public Cloud Module 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Manager Proxy 4.1 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Server 4.1 An update that solves one vulnerability can now be installed. ## Description: This update for python-pycryptodome fixes the following issues: * CVE-2023-52323: Fixed side-channel leakage in RSA decryption by using constant-time (faster) padding decoding for OAEP (bsc#1218564). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-585=1 ## Package List: * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python3-pycryptodome-debuginfo-3.9.0-150100.3.6.1 * python3-pycryptodome-3.9.0-150100.3.6.1 * python-pycryptodome-debugsource-3.9.0-150100.3.6.1 * python-pycryptodome-debuginfo-3.9.0-150100.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52323.html * https://bugzilla.suse.com/show_bug.cgi?id=1218564 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 16:30:03 -0000 Subject: SUSE-SU-2024:0594-1: moderate: Security update for tiff Message-ID: <170861940321.31822.8258373119676898959@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2024:0594-1 Rating: moderate References: * bsc#1219213 Cross-References: * CVE-2023-52356 CVSS scores: * CVE-2023-52356 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2023-52356: Fixed segfault in TIFFReadRGBATileExt() (bsc#1219213). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-594=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-594=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-594=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-594=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-594=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-594=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-594=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-594=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-594=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-594=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-594=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-594=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * openSUSE Leap 15.5 (x86_64) * libtiff-devel-32bit-4.0.9-150000.45.38.1 * libtiff5-32bit-debuginfo-4.0.9-150000.45.38.1 * libtiff5-32bit-4.0.9-150000.45.38.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * tiff-4.0.9-150000.45.38.1 * libtiff-devel-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * libtiff-devel-4.0.9-150000.45.38.1 * Basesystem Module 15-SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.38.1 * libtiff5-32bit-4.0.9-150000.45.38.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * tiff-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * tiff-debugsource-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.38.1 * libtiff5-debuginfo-4.0.9-150000.45.38.1 * tiff-debuginfo-4.0.9-150000.45.38.1 * libtiff5-4.0.9-150000.45.38.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52356.html * https://bugzilla.suse.com/show_bug.cgi?id=1219213 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0593-1: moderate: Security update for tiff Message-ID: <170861940540.31822.13548653890241968933@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2024:0593-1 Rating: moderate References: * bsc#1219213 Cross-References: * CVE-2023-52356 CVSS scores: * CVE-2023-52356 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2023-52356: Fixed segfault in TIFFReadRGBATileExt() (bsc#1219213). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-593=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-593=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-593=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-593=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-44.77.1 * tiff-debuginfo-4.0.9-44.77.1 * tiff-debugsource-4.0.9-44.77.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libtiff5-4.0.9-44.77.1 * tiff-4.0.9-44.77.1 * tiff-debuginfo-4.0.9-44.77.1 * libtiff5-debuginfo-4.0.9-44.77.1 * tiff-debugsource-4.0.9-44.77.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libtiff5-debuginfo-32bit-4.0.9-44.77.1 * libtiff5-32bit-4.0.9-44.77.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libtiff5-4.0.9-44.77.1 * tiff-4.0.9-44.77.1 * tiff-debuginfo-4.0.9-44.77.1 * libtiff5-debuginfo-4.0.9-44.77.1 * tiff-debugsource-4.0.9-44.77.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libtiff5-debuginfo-32bit-4.0.9-44.77.1 * libtiff5-32bit-4.0.9-44.77.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libtiff5-4.0.9-44.77.1 * tiff-4.0.9-44.77.1 * tiff-debuginfo-4.0.9-44.77.1 * libtiff5-debuginfo-4.0.9-44.77.1 * tiff-debugsource-4.0.9-44.77.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libtiff5-debuginfo-32bit-4.0.9-44.77.1 * libtiff5-32bit-4.0.9-44.77.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52356.html * https://bugzilla.suse.com/show_bug.cgi?id=1219213 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 16:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 16:30:08 -0000 Subject: SUSE-SU-2024:0592-1: important: Security update for php-composer2 Message-ID: <170861940810.31822.7822000165753760078@smelt2.prg2.suse.org> # Security update for php-composer2 Announcement ID: SUSE-SU-2024:0592-1 Rating: important References: * bsc#1219757 Cross-References: * CVE-2024-24821 CVSS scores: * CVE-2024-24821 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-24821 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for php-composer2 fixes the following issues: * CVE-2024-24821: Fixed potential arbitrary code execution when Composer is invoked within a directory with tampered files (bsc#1219757). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-592=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-592=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-592=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-592=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-592=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-592=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-592=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-592=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * php-composer2-2.2.3-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * php-composer2-2.2.3-150400.3.9.1 * SUSE Manager Server 4.3 (noarch) * php-composer2-2.2.3-150400.3.9.1 * openSUSE Leap 15.4 (noarch) * php-composer2-2.2.3-150400.3.9.1 * openSUSE Leap 15.5 (noarch) * php-composer2-2.2.3-150400.3.9.1 * Web and Scripting Module 15-SP5 (noarch) * php-composer2-2.2.3-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * php-composer2-2.2.3-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * php-composer2-2.2.3-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-24821.html * https://bugzilla.suse.com/show_bug.cgi?id=1219757 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 16:30:10 -0000 Subject: SUSE-SU-2024:0591-1: important: Security update for python-uamqp Message-ID: <170861941014.31822.10815090349604978327@smelt2.prg2.suse.org> # Security update for python-uamqp Announcement ID: SUSE-SU-2024:0591-1 Rating: important References: * bsc#1219867 Cross-References: * CVE-2024-25110 CVSS scores: * CVE-2024-25110 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-uamqp fixes the following issues: * CVE-2024-25110: Fixed a use-after-free in open_get_offered_capabilities() (bsc#1219867). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-591=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-591=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-591=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-591=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-591=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-uamqp-debugsource-1.5.3-150100.4.13.1 * python3-uamqp-debuginfo-1.5.3-150100.4.13.1 * python3-uamqp-1.5.3-150100.4.13.1 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x x86_64) * python-uamqp-debugsource-1.5.3-150100.4.13.1 * python3-uamqp-debuginfo-1.5.3-150100.4.13.1 * python3-uamqp-1.5.3-150100.4.13.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-uamqp-debugsource-1.5.3-150100.4.13.1 * python3-uamqp-debuginfo-1.5.3-150100.4.13.1 * python3-uamqp-1.5.3-150100.4.13.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-uamqp-debugsource-1.5.3-150100.4.13.1 * python3-uamqp-debuginfo-1.5.3-150100.4.13.1 * python3-uamqp-1.5.3-150100.4.13.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-uamqp-debugsource-1.5.3-150100.4.13.1 * python3-uamqp-debuginfo-1.5.3-150100.4.13.1 * python3-uamqp-1.5.3-150100.4.13.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25110.html * https://bugzilla.suse.com/show_bug.cgi?id=1219867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 16:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 16:30:14 -0000 Subject: SUSE-SU-2024:0590-1: important: Security update for bind Message-ID: <170861941484.31822.9972913424207715770@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2024:0590-1 Rating: important References: * bsc#1219823 * bsc#1219826 * bsc#1219851 * bsc#1219852 * bsc#1219853 * bsc#1219854 Cross-References: * CVE-2023-4408 * CVE-2023-50387 * CVE-2023-50868 * CVE-2023-5517 * CVE-2023-5679 * CVE-2023-6516 CVSS scores: * CVE-2023-4408 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5517 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5679 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6516 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: Update to release 9.16.48: Feature Changes: * The IP addresses for B.ROOT-SERVERS.NET have been updated to 170.247.170.2 and 2801:1b8:10::b. Security Fixes: * Validating DNS messages containing a lot of DNSSEC signatures could cause excessive CPU load, leading to a denial-of-service condition. This has been fixed. (CVE-2023-50387) [bsc#1219823] * Preparing an NSEC3 closest encloser proof could cause excessive CPU load, leading to a denial-of-service condition. This has been fixed. (CVE-2023-50868) [bsc#1219826] * Parsing DNS messages with many different names could cause excessive CPU load. This has been fixed. (CVE-2023-4408) [bsc#1219851] * Specific queries could cause named to crash with an assertion failure when nxdomain-redirect was enabled. This has been fixed. (CVE-2023-5517) [bsc#1219852] * A bad interaction between DNS64 and serve-stale could cause named to crash with an assertion failure, when both of these features were enabled. This has been fixed. (CVE-2023-5679) [bsc#1219853] * Query patterns that continuously triggered cache database maintenance could cause an excessive amount of memory to be allocated, exceeding max-cache-size and potentially leading to all available memory on the host running named being exhausted. This has been fixed. (CVE-2023-6516) [bsc#1219854] Removed Features: * Support for using AES as the DNS COOKIE algorithm (cookie- algorithm aes;) has been deprecated and will be removed in a future release. Please use the current default, SipHash-2-4, instead. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-590=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-590=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-590=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-590=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-590=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-590=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-590=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-590=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-590=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * openSUSE Leap 15.4 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-utils-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-bind-9.16.48-150400.5.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Manager Proxy 4.3 (x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Manager Proxy 4.3 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * bind-utils-9.16.48-150400.5.40.1 * bind-debugsource-9.16.48-150400.5.40.1 * bind-utils-debuginfo-9.16.48-150400.5.40.1 * bind-9.16.48-150400.5.40.1 * bind-debuginfo-9.16.48-150400.5.40.1 * SUSE Manager Server 4.3 (noarch) * bind-doc-9.16.48-150400.5.40.1 * python3-bind-9.16.48-150400.5.40.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4408.html * https://www.suse.com/security/cve/CVE-2023-50387.html * https://www.suse.com/security/cve/CVE-2023-50868.html * https://www.suse.com/security/cve/CVE-2023-5517.html * https://www.suse.com/security/cve/CVE-2023-5679.html * https://www.suse.com/security/cve/CVE-2023-6516.html * https://bugzilla.suse.com/show_bug.cgi?id=1219823 * https://bugzilla.suse.com/show_bug.cgi?id=1219826 * https://bugzilla.suse.com/show_bug.cgi?id=1219851 * https://bugzilla.suse.com/show_bug.cgi?id=1219852 * https://bugzilla.suse.com/show_bug.cgi?id=1219853 * https://bugzilla.suse.com/show_bug.cgi?id=1219854 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0597-1: important: Security update for mozilla-nss Message-ID: <170863380380.14773.13961127925905141185@smelt2.prg2.suse.org> # Security update for mozilla-nss Announcement ID: SUSE-SU-2024:0597-1 Rating: important References: * bsc#1216198 Cross-References: * CVE-2023-5388 CVSS scores: * CVE-2023-5388 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Update to NSS 3.90.2: * CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-597=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-597=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-597=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-597=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-597=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-597=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-597=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-597=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-597=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-597=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-597=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-597=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-597=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-597=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-597=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-597=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-597=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-597=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * openSUSE Leap 15.4 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-32bit-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * openSUSE Leap 15.4 (aarch64_ilp32) * mozilla-nss-sysinit-64bit-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-64bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-64bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-64bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-64bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-64bit-3.90.2-150400.3.39.1 * libfreebl3-64bit-3.90.2-150400.3.39.1 * libfreebl3-64bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-64bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-64bit-3.90.2-150400.3.39.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * openSUSE Leap 15.5 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-32bit-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * Basesystem Module 15-SP5 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * SUSE Manager Proxy 4.3 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * mozilla-nss-sysinit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-sysinit-3.90.2-150400.3.39.1 * mozilla-nss-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-3.90.2-150400.3.39.1 * libfreebl3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-debugsource-3.90.2-150400.3.39.1 * mozilla-nss-3.90.2-150400.3.39.1 * libfreebl3-3.90.2-150400.3.39.1 * libsoftokn3-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-devel-3.90.2-150400.3.39.1 * mozilla-nss-certs-3.90.2-150400.3.39.1 * mozilla-nss-certs-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-tools-3.90.2-150400.3.39.1 * mozilla-nss-tools-debuginfo-3.90.2-150400.3.39.1 * SUSE Manager Server 4.3 (x86_64) * mozilla-nss-32bit-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 * libsoftokn3-32bit-debuginfo-3.90.2-150400.3.39.1 * libsoftokn3-32bit-3.90.2-150400.3.39.1 * libfreebl3-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-certs-32bit-debuginfo-3.90.2-150400.3.39.1 * mozilla-nss-32bit-debuginfo-3.90.2-150400.3.39.1 * libfreebl3-32bit-3.90.2-150400.3.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-5388.html * https://bugzilla.suse.com/show_bug.cgi?id=1216198 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 20:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 20:30:08 -0000 Subject: SUSE-SU-2024:0596-1: important: Security update for openssh Message-ID: <170863380816.14773.15730205987927159967@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2024:0596-1 Rating: important References: * bsc#1218215 Cross-References: * CVE-2023-51385 CVSS scores: * CVE-2023-51385 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51385 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2023-51385: Limit the use of shell metacharacters in host- and user names to avoid command injection. (bsc#1218215) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-596=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-596=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-596=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-596=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-596=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-596=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-596=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-596=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-596=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-596=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-596=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-596=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-596=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-596=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-596=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-596=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-596=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-596=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-596=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-596=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-596=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-596=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-596=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-596=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-596=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-596=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-cavs-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-cavs-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-cavs-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-cavs-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Manager Proxy 4.3 (x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-helpers-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.30.1 * openssh-helpers-debuginfo-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-askpass-gnome-8.4p1-150300.3.30.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * openssh-clients-8.4p1-150300.3.30.1 * openssh-debugsource-8.4p1-150300.3.30.1 * openssh-server-debuginfo-8.4p1-150300.3.30.1 * openssh-clients-debuginfo-8.4p1-150300.3.30.1 * openssh-server-8.4p1-150300.3.30.1 * openssh-common-debuginfo-8.4p1-150300.3.30.1 * openssh-8.4p1-150300.3.30.1 * openssh-fips-8.4p1-150300.3.30.1 * openssh-common-8.4p1-150300.3.30.1 * openssh-debuginfo-8.4p1-150300.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51385.html * https://bugzilla.suse.com/show_bug.cgi?id=1218215 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 22 20:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Feb 2024 20:30:12 -0000 Subject: SUSE-SU-2024:0595-1: important: Security update for python310 Message-ID: <170863381292.14773.12674892423355451929@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2024:0595-1 Rating: important References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parser of e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-595=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-595=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-595=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-595=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (x86_64) * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-3.10.13-150400.4.39.1 * python310-base-64bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (x86_64) * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 08:30:02 -0000 Subject: SUSE-RU-2024:0598-1: moderate: Recommended update for wxWidgets-3_0-nostl Message-ID: <170867700216.26668.2388034646637953217@smelt2.prg2.suse.org> # Recommended update for wxWidgets-3_0-nostl Announcement ID: SUSE-RU-2024:0598-1 Rating: moderate References: * bsc#1215704 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for wxWidgets-3_0-nostl fixes the following issues: * Added missing wxWidgets-3_0-nostl subpackages to Package Hub for SLE-15-SP5 (no source changes) (bsc#1215704): * libwx_baseu_net-suse-nostl3_0_5 * libwx_baseu_xml-suse-nostl3_0_5 * libwx_gtk2u_adv-suse-nostl3_0_5 * libwx_gtk2u_core-suse-nostl3_0_5 * libwx_gtk2u_html-suse-nostl3_0_5 * libwx_gtk2u_qa-suse-nostl3_0_5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-598=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-598=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libwx_gtk2u_core-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_aui-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_richtext-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu_xml-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_media-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_html-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_aui-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_richtext-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * wxWidgets-3_0-nostl-debugsource-3.0.5.1-150200.11.5.1 * libwx_gtk2u_adv-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_qa-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu_net-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_ribbon-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_adv-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_media-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_baseu-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu_net-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_xrc-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_propgrid-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * wxWidgets-3_0-nostl-devel-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_gl-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_gl-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_ribbon-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_stc-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_html-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_baseu_xml-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_stc-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_propgrid-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_qa-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * wxWidgets-3_0-nostl-devel-3.0.5.1-150200.11.5.1 * libwx_gtk2u_xrc-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_core-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * wxWidgets-3_0-nostl-debugsource-3.0.5.1-150200.11.5.1 * libwx_gtk2u_core-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_adv-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_qa-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu_xml-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_baseu_net-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_html-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_baseu_xml-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_html-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_gtk2u_adv-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_qa-suse-nostl3_0_5-debuginfo-3.0.5.1-150200.11.5.1 * libwx_baseu-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_baseu_net-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 * libwx_gtk2u_core-suse-nostl3_0_5-3.0.5.1-150200.11.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215704 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 08:30:02 -0000 Subject: SUSE-SU-2024:0595-1: important: Security update for python310 Message-ID: <170867700290.26668.16835550061313702460@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2024:0595-1 Rating: important References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parser of e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-595=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-595=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-595=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-595=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (x86_64) * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-base-64bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-3.10.13-150400.4.39.1 * python310-base-64bit-3.10.13-150400.4.39.1 * python310-64bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (x86_64) * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 08:33:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 08:33:05 -0000 Subject: SUSE-SU-2024:0595-1: important: Security update for python310 Message-ID: <170867718532.26519.2891700522307612408@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2024:0595-1 Rating: important References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parser of e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-595=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-595=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-595=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-595=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (x86_64) * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-3.10.13-150400.4.39.1 * python310-base-64bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (x86_64) * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 08:36:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 08:36:07 -0000 Subject: SUSE-SU-2024:0595-1: important: Security update for python310 Message-ID: <170867736716.26668.11050262805751342708@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2024:0595-1 Rating: important References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parser of e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-595=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-595=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-595=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-595=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (x86_64) * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-base-64bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-3.10.13-150400.4.39.1 * python310-base-64bit-3.10.13-150400.4.39.1 * python310-64bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (x86_64) * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 08:39:09 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 08:39:09 -0000 Subject: SUSE-SU-2024:0595-1: important: Security update for python310 Message-ID: <170867754983.26519.11870209959926451134@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2024:0595-1 Rating: important References: * bsc#1210638 Cross-References: * CVE-2023-27043 CVSS scores: * CVE-2023-27043 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2023-27043 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2023-27043: Fixed incorrectly parser of e-mail addresses which contain a special character (bsc#1210638). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-595=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-595=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-595=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-595=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-595=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (x86_64) * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-debuginfo-3.10.13-150400.4.39.1 * python310-64bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-64bit-3.10.13-150400.4.39.1 * python310-base-64bit-debuginfo-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python310-doc-devhelp-3.10.13-150400.4.39.1 * python310-testsuite-debuginfo-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * python310-devel-3.10.13-150400.4.39.1 * python310-doc-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-testsuite-3.10.13-150400.4.39.1 * openSUSE Leap 15.5 (x86_64) * python310-32bit-3.10.13-150400.4.39.1 * python310-base-32bit-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-base-32bit-debuginfo-3.10.13-150400.4.39.1 * python310-32bit-debuginfo-3.10.13-150400.4.39.1 * libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python310-devel-3.10.13-150400.4.39.1 * python310-debugsource-3.10.13-150400.4.39.1 * python310-base-debuginfo-3.10.13-150400.4.39.1 * python310-dbm-3.10.13-150400.4.39.1 * python310-tk-debuginfo-3.10.13-150400.4.39.1 * python310-tk-3.10.13-150400.4.39.1 * python310-curses-3.10.13-150400.4.39.1 * python310-tools-3.10.13-150400.4.39.1 * libpython3_10-1_0-debuginfo-3.10.13-150400.4.39.1 * python310-core-debugsource-3.10.13-150400.4.39.1 * python310-debuginfo-3.10.13-150400.4.39.1 * python310-curses-debuginfo-3.10.13-150400.4.39.1 * python310-idle-3.10.13-150400.4.39.1 * libpython3_10-1_0-3.10.13-150400.4.39.1 * python310-dbm-debuginfo-3.10.13-150400.4.39.1 * python310-base-3.10.13-150400.4.39.1 * python310-3.10.13-150400.4.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27043.html * https://bugzilla.suse.com/show_bug.cgi?id=1210638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0604-1: important: Security update for openssh Message-ID: <170869140217.14398.441892363019864223@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2024:0604-1 Rating: important References: * bsc#1218215 * bsc#1220110 Cross-References: * CVE-2023-51385 CVSS scores: * CVE-2023-51385 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51385 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2023-51385: Fixed a command injection via user name or host name metacharacters (bsc#1218215). * Remember the state of sshd service during update / removal, to allow cut- over to a different openssh package. bsc#1220110 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-604=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-604=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-604=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-604=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * openssh-testuser-0-81.12.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * openssh-askpass-gnome-7.2p2-81.12.1 * openssh-helpers-debuginfo-7.2p2-81.12.1 * openssh-helpers-7.2p2-81.12.1 * openssh-debugsource-7.2p2-81.12.1 * openssh-fips-7.2p2-81.12.1 * openssh-debuginfo-7.2p2-81.12.1 * openssh-askpass-gnome-debuginfo-7.2p2-81.12.1 * openssh-7.2p2-81.12.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-7.2p2-81.12.1 * openssh-helpers-debuginfo-7.2p2-81.12.1 * openssh-helpers-7.2p2-81.12.1 * openssh-debugsource-7.2p2-81.12.1 * openssh-fips-7.2p2-81.12.1 * openssh-debuginfo-7.2p2-81.12.1 * openssh-askpass-gnome-debuginfo-7.2p2-81.12.1 * openssh-7.2p2-81.12.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * openssh-askpass-gnome-7.2p2-81.12.1 * openssh-helpers-debuginfo-7.2p2-81.12.1 * openssh-helpers-7.2p2-81.12.1 * openssh-debugsource-7.2p2-81.12.1 * openssh-fips-7.2p2-81.12.1 * openssh-debuginfo-7.2p2-81.12.1 * openssh-askpass-gnome-debuginfo-7.2p2-81.12.1 * openssh-7.2p2-81.12.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51385.html * https://bugzilla.suse.com/show_bug.cgi?id=1218215 * https://bugzilla.suse.com/show_bug.cgi?id=1220110 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0603-1: important: Security update for openssh Message-ID: <170869140387.14398.50688176217921023@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2024:0603-1 Rating: important References: * bsc#1218215 Cross-References: * CVE-2023-51385 CVSS scores: * CVE-2023-51385 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2023-51385 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves one vulnerability can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2023-51385: Fixed command injection via user name or host name metacharacters (bsc#1218215). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-603=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-603=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-603=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * openssh-askpass-gnome-debugsource-8.1p1-150200.5.46.1 * openssh-debuginfo-8.1p1-150200.5.46.1 * openssh-helpers-debuginfo-8.1p1-150200.5.46.1 * openssh-fips-8.1p1-150200.5.46.1 * openssh-8.1p1-150200.5.46.1 * openssh-helpers-8.1p1-150200.5.46.1 * openssh-debugsource-8.1p1-150200.5.46.1 * openssh-askpass-gnome-debuginfo-8.1p1-150200.5.46.1 * openssh-askpass-gnome-8.1p1-150200.5.46.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-debugsource-8.1p1-150200.5.46.1 * openssh-debuginfo-8.1p1-150200.5.46.1 * openssh-helpers-debuginfo-8.1p1-150200.5.46.1 * openssh-fips-8.1p1-150200.5.46.1 * openssh-8.1p1-150200.5.46.1 * openssh-helpers-8.1p1-150200.5.46.1 * openssh-debugsource-8.1p1-150200.5.46.1 * openssh-askpass-gnome-debuginfo-8.1p1-150200.5.46.1 * openssh-askpass-gnome-8.1p1-150200.5.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * openssh-askpass-gnome-debugsource-8.1p1-150200.5.46.1 * openssh-debuginfo-8.1p1-150200.5.46.1 * openssh-helpers-debuginfo-8.1p1-150200.5.46.1 * openssh-fips-8.1p1-150200.5.46.1 * openssh-8.1p1-150200.5.46.1 * openssh-helpers-8.1p1-150200.5.46.1 * openssh-debugsource-8.1p1-150200.5.46.1 * openssh-askpass-gnome-debuginfo-8.1p1-150200.5.46.1 * openssh-askpass-gnome-8.1p1-150200.5.46.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51385.html * https://bugzilla.suse.com/show_bug.cgi?id=1218215 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 12:30:05 -0000 Subject: SUSE-SU-2024:0601-1: moderate: Security update for python-pycryptodome Message-ID: <170869140574.14398.15036845618723756553@smelt2.prg2.suse.org> # Security update for python-pycryptodome Announcement ID: SUSE-SU-2024:0601-1 Rating: moderate References: * bsc#1218564 Cross-References: * CVE-2023-52323 CVSS scores: * CVE-2023-52323 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-52323 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-pycryptodome fixes the following issues: * CVE-2023-52323: Fixed side-channel leakage in RSA decryption by using constant-time (faster) padding decoding for OAEP (bsc#1218564). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-601=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-601=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-pycryptodome-debuginfo-3.9.0-150200.9.1 * python3-pycryptodome-3.9.0-150200.9.1 * python3-pycryptodome-debuginfo-3.9.0-150200.9.1 * python-pycryptodome-debugsource-3.9.0-150200.9.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-pycryptodome-debuginfo-3.9.0-150200.9.1 * python3-pycryptodome-3.9.0-150200.9.1 * python3-pycryptodome-debuginfo-3.9.0-150200.9.1 * python-pycryptodome-debugsource-3.9.0-150200.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52323.html * https://bugzilla.suse.com/show_bug.cgi?id=1218564 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 12:30:07 -0000 Subject: SUSE-RU-2024:0600-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <170869140737.14398.15165429826004144161@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:0600-1 Rating: moderate References: * jsc#MSQA-721 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: uyuni-proxy-systemd-services: * Version 4.3.11-1 * Update the image version ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-600=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-600=1 ## Package List: * SUSE Manager Client Tools for SLE 15 (noarch) * uyuni-proxy-systemd-services-4.3.11-150000.1.18.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * uyuni-proxy-systemd-services-4.3.11-150000.1.18.1 ## References: * https://jira.suse.com/browse/MSQA-721 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 16:30:02 -0000 Subject: SUSE-RU-2024:0606-1: critical: Recommended update for pacemaker Message-ID: <170870580285.2219.10799385335759775288@smelt2.prg2.suse.org> # Recommended update for pacemaker Announcement ID: SUSE-RU-2024:0606-1 Rating: critical References: * bsc#1219220 * bsc#1219323 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for pacemaker fixes the following issues: * libcrmcommon: Avoid file descriptor leak in IPC client with async connection (bsc#1219323) * libcrmcommon: Always output request= in XML output * libcrmcommon: crm_xml_escape() shouldn't stop on Unicode characters * tools: crm_attribute emits garbage for --node localhost or auto * tools: Fix memory leak in crm_mon with HTML output * tools: crm_mon segfaults when fencer connection is lost (bsc#1219220) * attrd: Write Pacemaker Remote node attributes even if not in cache * agents: Use attrd_updater dampen delay in SysInfo * libcrmcommon: Check correct env vars in pcmk__node_attr_target() * scheduler: Restore nvpair behavior without id-ref * scheduler: Reject expression without op sooner * libcrmcommon: Fix NULL dereference in expand_idref() * scheduler: Improve logs for invalid id-ref's * pacemaker-attrd,libcrmcluster: Avoid use-after-free when remote node in cluster node cache * libcrmcluster: Avoid use-after-free in trace log * HealthSmart: Check the parameter values of check_temperature to avoid error output * agents: Handle dampening parameter consistently and correctly * crm_resource: Make --wait wait for pending actions in CIB * scheduler: Avoid double free with disabled recurring actions * agents: HealthCPU - fix the validation of input * controller: Don't try to execute agent action at shutdown * tools: The dampen parameter is disabled when setting values with attrd_updater. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-606=1 openSUSE-SLE-15.5-2024-606=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-606=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * pacemaker-libs-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-debugsource-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-remote-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-libs-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-devel-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-cli-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-remote-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-cli-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * openSUSE Leap 15.5 (noarch) * pacemaker-cts-2.1.5+20221208.a3f44794f-150500.6.11.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * pacemaker-libs-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-debugsource-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-remote-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-libs-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-devel-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-cli-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-remote-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-cli-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * pacemaker-debuginfo-2.1.5+20221208.a3f44794f-150500.6.11.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * pacemaker-cts-2.1.5+20221208.a3f44794f-150500.6.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219220 * https://bugzilla.suse.com/show_bug.cgi?id=1219323 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0605-1: important: Security update for java-1_8_0-ibm Message-ID: <170870580520.2219.10566160812032458968@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2024:0605-1 Rating: important References: * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218908 * bsc#1218909 * bsc#1218911 * bsc#1219843 Cross-References: * CVE-2023-33850 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20932 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-33850 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20932 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: Update to Java 8.0 Service Refresh 8 Fix Pack 20: [bsc#1219843] Security fixes: * CVE-2023-33850: Fixed information disclosure vulnerability due to the consumed GSKit library (bsc#1219843). * CVE-2024-20932: Fixed incorrect handling of ZIP files with duplicate entries (bsc#1218908). * CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (bsc#1218911). * CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (bsc#1218907). * CVE-2024-20921: Fixed range check loop optimization issue (bsc#1218905). * CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified bytecode execution (bsc#1218903). * CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906). * CVE-2024-20945: Fixed logging of digital signature private keys (bsc#1218909). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-605=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-605=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-605=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-605=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.20-30.120.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Server 12 SP5 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * java-1_8_0-ibm-alsa-1.8.0_sr8.20-30.120.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-30.120.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-30.120.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (nosrc) * java-1_8_0-ibm-1.8.0_sr8.20-30.120.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-30.120.1 ## References: * https://www.suse.com/security/cve/CVE-2023-33850.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20932.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218908 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 * https://bugzilla.suse.com/show_bug.cgi?id=1219843 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 20:30:02 -0000 Subject: SUSE-SU-2024:0608-1: important: Security update for MozillaThunderbird Message-ID: <170872020295.26708.15407591861556423657@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2024:0608-1 Rating: important References: * bsc#1220048 Cross-References: * CVE-2024-1546 * CVE-2024-1547 * CVE-2024-1548 * CVE-2024-1549 * CVE-2024-1550 * CVE-2024-1551 * CVE-2024-1552 * CVE-2024-1553 CVSS scores: Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Mozilla Thunderbird 115.8 (bsc#1220048): * CVE-2024-1546: Out-of-bounds memory read in networking channels * CVE-2024-1547: Alert dialog could have been spoofed on another site * CVE-2024-1548: Fullscreen Notification could have been hidden by select element * CVE-2024-1549: Custom cursor could obscure the permission dialog * CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants * CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts * CVE-2024-1552: Incorrect code generation on 32-bit ARM devices * CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-608=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-608=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-608=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-115.8.0-150200.8.148.1 * MozillaThunderbird-debugsource-115.8.0-150200.8.148.1 * MozillaThunderbird-debuginfo-115.8.0-150200.8.148.1 * MozillaThunderbird-translations-common-115.8.0-150200.8.148.1 * MozillaThunderbird-translations-other-115.8.0-150200.8.148.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-115.8.0-150200.8.148.1 * MozillaThunderbird-debugsource-115.8.0-150200.8.148.1 * MozillaThunderbird-debuginfo-115.8.0-150200.8.148.1 * MozillaThunderbird-translations-common-115.8.0-150200.8.148.1 * MozillaThunderbird-translations-other-115.8.0-150200.8.148.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-115.8.0-150200.8.148.1 * MozillaThunderbird-debugsource-115.8.0-150200.8.148.1 * MozillaThunderbird-debuginfo-115.8.0-150200.8.148.1 * MozillaThunderbird-translations-common-115.8.0-150200.8.148.1 * MozillaThunderbird-translations-other-115.8.0-150200.8.148.1 ## References: * https://www.suse.com/security/cve/CVE-2024-1546.html * https://www.suse.com/security/cve/CVE-2024-1547.html * https://www.suse.com/security/cve/CVE-2024-1548.html * https://www.suse.com/security/cve/CVE-2024-1549.html * https://www.suse.com/security/cve/CVE-2024-1550.html * https://www.suse.com/security/cve/CVE-2024-1551.html * https://www.suse.com/security/cve/CVE-2024-1552.html * https://www.suse.com/security/cve/CVE-2024-1553.html * https://bugzilla.suse.com/show_bug.cgi?id=1220048 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Feb 23 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Feb 2024 20:30:07 -0000 Subject: SUSE-SU-2024:0607-1: important: Security update for MozillaFirefox Message-ID: <170872020719.26708.12520408446448733832@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2024:0607-1 Rating: important References: * bsc#1184272 * bsc#1220048 Cross-References: * CVE-2024-1546 * CVE-2024-1547 * CVE-2024-1548 * CVE-2024-1549 * CVE-2024-1550 * CVE-2024-1551 * CVE-2024-1552 * CVE-2024-1553 CVSS scores: Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 115.8.0 ESR (MFSA 2024-06) (bsc#1220048): * CVE-2024-1546: Out-of-bounds memory read in networking channels * CVE-2024-1547: Alert dialog could have been spoofed on another site * CVE-2024-1548: Fullscreen Notification could have been hidden by select element * CVE-2024-1549: Custom cursor could obscure the permission dialog * CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants * CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts * CVE-2024-1552: Incorrect code generation on 32-bit ARM devices * CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 * Recommend libfido2-udev on codestreams that exist, in order to try to get security keys (e.g. Yubikeys) work out of the box. (bsc#1184272) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-607=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-607=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-607=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-607=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-607=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-607=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-607=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-607=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-607=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-607=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-607=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-607=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-607=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-607=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-branding-upstream-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * openSUSE Leap 15.5 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * Desktop Applications Module 15-SP5 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-115.8.0-150200.152.126.3 * MozillaFirefox-debuginfo-115.8.0-150200.152.126.3 * MozillaFirefox-translations-other-115.8.0-150200.152.126.3 * MozillaFirefox-debugsource-115.8.0-150200.152.126.3 * MozillaFirefox-translations-common-115.8.0-150200.152.126.3 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-115.8.0-150200.152.126.3 ## References: * https://www.suse.com/security/cve/CVE-2024-1546.html * https://www.suse.com/security/cve/CVE-2024-1547.html * https://www.suse.com/security/cve/CVE-2024-1548.html * https://www.suse.com/security/cve/CVE-2024-1549.html * https://www.suse.com/security/cve/CVE-2024-1550.html * https://www.suse.com/security/cve/CVE-2024-1551.html * https://www.suse.com/security/cve/CVE-2024-1552.html * https://www.suse.com/security/cve/CVE-2024-1553.html * https://bugzilla.suse.com/show_bug.cgi?id=1184272 * https://bugzilla.suse.com/show_bug.cgi?id=1220048 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 08:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 08:30:02 -0000 Subject: SUSE-FU-2024:0611-1: moderate: Feature providing a supportconfig plugin for servers with pmem memory Message-ID: <170893620242.10141.11385257049799644588@smelt2.prg2.suse.org> # Feature providing a supportconfig plugin for servers with pmem memory Announcement ID: SUSE-FU-2024:0611-1 Rating: moderate References: * jsc#PED-3251 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This feature provides supportutils-plugin-pmem, a supportconfig plugin for servers with pmem memory: * New package targeting SUSE:SLE-15-SP3:Update (jsc#PED-3251). This is a support utils plugin to gather information on ndctl (NVDIMM) & ipmctl (Intel pmem) tools for issue diagnosis. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-611=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-611=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-611=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-611=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-611=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-611=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-611=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-611=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-611=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-611=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-611=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-611=1 ## Package List: * openSUSE Leap 15.3 (x86_64) * ipmctl-02.00.00.3847-150300.3.2.2 * ipmctl-debuginfo-02.00.00.3847-150300.3.2.2 * ipmctl-devel-02.00.00.3847-150300.3.2.2 * ipmctl-debugsource-02.00.00.3847-150300.3.2.2 * openSUSE Leap 15.3 (aarch64 ppc64le x86_64) * ndctl-debuginfo-71.1-150300.3.5.2 * ndctl-debugsource-71.1-150300.3.5.2 * ndctl-71.1-150300.3.5.2 * libndctl6-71.1-150300.3.5.2 * libndctl-devel-71.1-150300.3.5.2 * libndctl6-debuginfo-71.1-150300.3.5.2 * openSUSE Leap 15.3 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * openSUSE Leap 15.4 (x86_64) * ipmctl-devel-03.00.00.0423-150400.3.2.2 * ipmctl-debuginfo-03.00.00.0423-150400.3.2.2 * ipmctl-debugsource-03.00.00.0423-150400.3.2.2 * ipmctl-03.00.00.0423-150400.3.2.2 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * ndctl-71.1-150400.10.5.1 * libndctl-devel-71.1-150400.10.5.1 * ndctl-debugsource-71.1-150400.10.5.1 * libndctl6-71.1-150400.10.5.1 * ndctl-debuginfo-71.1-150400.10.5.1 * libndctl6-debuginfo-71.1-150400.10.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libiniparser1-4.1-150500.4.5.1 * libiniparser1-debuginfo-4.1-150500.4.5.1 * iniparser-debugsource-4.1-150500.4.5.1 * libiniparser-devel-4.1-150500.4.5.1 * openSUSE Leap 15.5 (x86_64) * libiniparser1-32bit-debuginfo-4.1-150500.4.5.1 * libiniparser1-32bit-4.1-150500.4.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * libndctl-devel-75-150500.4.2.1 * ndctl-75-150500.4.2.1 * libndctl6-debuginfo-75-150500.4.2.1 * ndctl-debugsource-75-150500.4.2.1 * libndctl6-75-150500.4.2.1 * ndctl-debuginfo-75-150500.4.2.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libiniparser1-64bit-4.1-150500.4.5.1 * libiniparser1-64bit-debuginfo-4.1-150500.4.5.1 * Basesystem Module 15-SP5 (x86_64) * libndctl-devel-75-150500.4.2.1 * ndctl-75-150500.4.2.1 * libndctl6-debuginfo-75-150500.4.2.1 * ndctl-debugsource-75-150500.4.2.1 * libndctl6-75-150500.4.2.1 * ndctl-debuginfo-75-150500.4.2.1 * libiniparser1-4.1-150500.4.5.1 * ipmctl-03.00.00.0423-150400.3.2.2 * Basesystem Module 15-SP5 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * Server Applications Module 15-SP5 (x86_64) * ndctl-75-150500.4.2.1 * ndctl-debugsource-75-150500.4.2.1 * libiniparser1-debuginfo-4.1-150500.4.5.1 * ipmctl-devel-03.00.00.0423-150400.3.2.2 * ipmctl-03.00.00.0423-150400.3.2.2 * iniparser-debugsource-4.1-150500.4.5.1 * ipmctl-debugsource-03.00.00.0423-150400.3.2.2 * ndctl-debuginfo-75-150500.4.2.1 * libiniparser1-4.1-150500.4.5.1 * ipmctl-debuginfo-03.00.00.0423-150400.3.2.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * ipmctl-debugsource-02.00.00.3847-150300.3.2.2 * ipmctl-devel-02.00.00.3847-150300.3.2.2 * ndctl-debuginfo-71.1-150300.3.5.2 * ndctl-debugsource-71.1-150300.3.5.2 * ipmctl-02.00.00.3847-150300.3.2.2 * libndctl6-71.1-150300.3.5.2 * ndctl-71.1-150300.3.5.2 * libndctl-devel-71.1-150300.3.5.2 * libndctl6-debuginfo-71.1-150300.3.5.2 * ipmctl-debuginfo-02.00.00.3847-150300.3.2.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libndctl-devel-71.1-150400.10.5.1 * ndctl-71.1-150400.10.5.1 * ndctl-debugsource-71.1-150400.10.5.1 * libndctl6-71.1-150400.10.5.1 * ipmctl-devel-03.00.00.0423-150400.3.2.2 * ndctl-debuginfo-71.1-150400.10.5.1 * ipmctl-03.00.00.0423-150400.3.2.2 * ipmctl-debugsource-03.00.00.0423-150400.3.2.2 * libndctl6-debuginfo-71.1-150400.10.5.1 * ipmctl-debuginfo-03.00.00.0423-150400.3.2.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libndctl-devel-71.1-150400.10.5.1 * ndctl-71.1-150400.10.5.1 * ndctl-debugsource-71.1-150400.10.5.1 * libndctl6-71.1-150400.10.5.1 * ipmctl-devel-03.00.00.0423-150400.3.2.2 * ndctl-debuginfo-71.1-150400.10.5.1 * ipmctl-03.00.00.0423-150400.3.2.2 * ipmctl-debugsource-03.00.00.0423-150400.3.2.2 * libndctl6-debuginfo-71.1-150400.10.5.1 * ipmctl-debuginfo-03.00.00.0423-150400.3.2.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * ipmctl-debugsource-02.00.00.3847-150300.3.2.2 * ipmctl-devel-02.00.00.3847-150300.3.2.2 * ndctl-debuginfo-71.1-150300.3.5.2 * ndctl-debugsource-71.1-150300.3.5.2 * ipmctl-02.00.00.3847-150300.3.2.2 * libndctl6-71.1-150300.3.5.2 * ndctl-71.1-150300.3.5.2 * libndctl-devel-71.1-150300.3.5.2 * libndctl6-debuginfo-71.1-150300.3.5.2 * ipmctl-debuginfo-02.00.00.3847-150300.3.2.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libndctl-devel-71.1-150400.10.5.1 * ndctl-71.1-150400.10.5.1 * ndctl-debugsource-71.1-150400.10.5.1 * libndctl6-71.1-150400.10.5.1 * ipmctl-devel-03.00.00.0423-150400.3.2.2 * ndctl-debuginfo-71.1-150400.10.5.1 * ipmctl-03.00.00.0423-150400.3.2.2 * ipmctl-debugsource-03.00.00.0423-150400.3.2.2 * libndctl6-debuginfo-71.1-150400.10.5.1 * ipmctl-debuginfo-03.00.00.0423-150400.3.2.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * ipmctl-debugsource-02.00.00.3847-150300.3.2.2 * ipmctl-devel-02.00.00.3847-150300.3.2.2 * ndctl-debuginfo-71.1-150300.3.5.2 * ndctl-debugsource-71.1-150300.3.5.2 * ipmctl-02.00.00.3847-150300.3.2.2 * libndctl6-71.1-150300.3.5.2 * ndctl-71.1-150300.3.5.2 * libndctl-devel-71.1-150300.3.5.2 * libndctl6-debuginfo-71.1-150300.3.5.2 * ipmctl-debuginfo-02.00.00.3847-150300.3.2.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libndctl-devel-71.1-150400.10.5.1 * ndctl-71.1-150400.10.5.1 * ndctl-debugsource-71.1-150400.10.5.1 * libndctl6-71.1-150400.10.5.1 * ipmctl-devel-03.00.00.0423-150400.3.2.2 * ndctl-debuginfo-71.1-150400.10.5.1 * ipmctl-03.00.00.0423-150400.3.2.2 * ipmctl-debugsource-03.00.00.0423-150400.3.2.2 * libndctl6-debuginfo-71.1-150400.10.5.1 * ipmctl-debuginfo-03.00.00.0423-150400.3.2.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * supportutils-plugin-pmem-0.0.1-150300.7.5.1 ## References: * https://jira.suse.com/browse/PED-3251 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 08:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 08:30:04 -0000 Subject: SUSE-RU-2024:0610-1: moderate: Recommended update for selinux-policy Message-ID: <170893620425.10141.10337888447905169171@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2024:0610-1 Rating: moderate References: * bsc#1213594 Affected Products: * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that has one fix can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Allow haveged to manage tmpfs directories (bsc#1213594) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-610=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-610=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-610=1 ## Package List: * openSUSE Leap Micro 5.4 (noarch) * selinux-policy-targeted-20230511+git14.93d944dd-150400.4.27.1 * selinux-policy-devel-20230511+git14.93d944dd-150400.4.27.1 * selinux-policy-20230511+git14.93d944dd-150400.4.27.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * selinux-policy-targeted-20230511+git14.93d944dd-150400.4.27.1 * selinux-policy-devel-20230511+git14.93d944dd-150400.4.27.1 * selinux-policy-20230511+git14.93d944dd-150400.4.27.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * selinux-policy-targeted-20230511+git14.93d944dd-150400.4.27.1 * selinux-policy-devel-20230511+git14.93d944dd-150400.4.27.1 * selinux-policy-20230511+git14.93d944dd-150400.4.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213594 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 08:39:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 08:39:10 -0000 Subject: SUSE-RU-2024:0609-1: moderate: Recommended update for grub2 Message-ID: <170893675011.16007.3646241017783516084@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:0609-1 Rating: moderate References: * bsc#1217102 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for grub2 fixes the following issues: * Fix PowerPC grub slow loading time (bsc#1217102) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-609=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-609=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-609=1 openSUSE-SLE-15.5-2024-609=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-609=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * grub2-debuginfo-2.06-150500.29.16.1 * grub2-2.06-150500.29.16.1 * Basesystem Module 15-SP5 (noarch) * grub2-i386-pc-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-2.06-150500.29.16.1 * grub2-arm64-efi-2.06-150500.29.16.1 * grub2-x86_64-efi-2.06-150500.29.16.1 * grub2-snapper-plugin-2.06-150500.29.16.1 * grub2-systemd-sleep-plugin-2.06-150500.29.16.1 * Basesystem Module 15-SP5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.16.1 * Basesystem Module 15-SP5 (s390x) * grub2-s390x-emu-2.06-150500.29.16.1 * Server Applications Module 15-SP5 (noarch) * grub2-x86_64-xen-2.06-150500.29.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * grub2-debuginfo-2.06-150500.29.16.1 * grub2-branding-upstream-2.06-150500.29.16.1 * grub2-2.06-150500.29.16.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150500.29.16.1 * openSUSE Leap 15.5 (noarch) * grub2-powerpc-ieee1275-debug-2.06-150500.29.16.1 * grub2-i386-pc-2.06-150500.29.16.1 * grub2-arm64-efi-2.06-150500.29.16.1 * grub2-i386-efi-debug-2.06-150500.29.16.1 * grub2-x86_64-efi-debug-2.06-150500.29.16.1 * grub2-arm64-efi-debug-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-2.06-150500.29.16.1 * grub2-x86_64-xen-2.06-150500.29.16.1 * grub2-i386-efi-extras-2.06-150500.29.16.1 * grub2-s390x-emu-extras-2.06-150500.29.16.1 * grub2-x86_64-efi-extras-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-extras-2.06-150500.29.16.1 * grub2-i386-efi-2.06-150500.29.16.1 * grub2-i386-pc-debug-2.06-150500.29.16.1 * grub2-i386-pc-extras-2.06-150500.29.16.1 * grub2-arm64-efi-extras-2.06-150500.29.16.1 * grub2-x86_64-efi-2.06-150500.29.16.1 * grub2-snapper-plugin-2.06-150500.29.16.1 * grub2-i386-xen-2.06-150500.29.16.1 * grub2-x86_64-xen-extras-2.06-150500.29.16.1 * grub2-i386-xen-extras-2.06-150500.29.16.1 * grub2-systemd-sleep-plugin-2.06-150500.29.16.1 * openSUSE Leap 15.5 (s390x) * grub2-s390x-emu-debug-2.06-150500.29.16.1 * grub2-s390x-emu-2.06-150500.29.16.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150500.29.16.1 * grub2-2.06-150500.29.16.1 * grub2-debugsource-2.06-150500.29.16.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * grub2-i386-pc-2.06-150500.29.16.1 * grub2-arm64-efi-2.06-150500.29.16.1 * grub2-x86_64-xen-2.06-150500.29.16.1 * grub2-x86_64-efi-2.06-150500.29.16.1 * grub2-snapper-plugin-2.06-150500.29.16.1 * SUSE Linux Enterprise Micro 5.5 (s390x) * grub2-s390x-emu-2.06-150500.29.16.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217102 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0619-1: important: Security update for java-1_8_0-ibm Message-ID: <170895060271.3778.2745187038834738673@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2024:0619-1 Rating: important References: * bsc#1218903 * bsc#1218905 * bsc#1218906 * bsc#1218907 * bsc#1218908 * bsc#1218909 * bsc#1218911 * bsc#1219843 Cross-References: * CVE-2023-33850 * CVE-2024-20918 * CVE-2024-20919 * CVE-2024-20921 * CVE-2024-20926 * CVE-2024-20932 * CVE-2024-20945 * CVE-2024-20952 CVSS scores: * CVE-2023-33850 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20918 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-20919 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20921 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20926 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20932 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2024-20945 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-20952 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Legacy Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: Update to Java 8.0 Service Refresh 8 Fix Pack 20: [bsc#1219843] Security fixes: * CVE-2023-33850: Fixed information disclosure vulnerability due to the consumed GSKit library (bsc#1219843). * CVE-2024-20932: Fixed incorrect handling of ZIP files with duplicate entries (bsc#1218908). * CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (bsc#1218911). * CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (bsc#1218907). * CVE-2024-20921: Fixed range check loop optimization issue (bsc#1218905). * CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified bytecode execution (bsc#1218903). * CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906). * CVE-2024-20945: Fixed logging of digital signature private keys (bsc#1218909). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-619=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-619=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-619=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-619=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-619=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-619=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-619=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-619=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-619=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-619=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-619=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-619=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * SUSE Enterprise Storage 7.1 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * SUSE Enterprise Storage 7.1 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * openSUSE Leap 15.5 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * openSUSE Leap 15.5 (x86_64) * java-1_8_0-ibm-32bit-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-devel-32bit-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * java-1_8_0-ibm-demo-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-src-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * Legacy Module 15-SP5 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 * Legacy Module 15-SP5 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 * Legacy Module 15-SP5 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 ## References: * https://www.suse.com/security/cve/CVE-2023-33850.html * https://www.suse.com/security/cve/CVE-2024-20918.html * https://www.suse.com/security/cve/CVE-2024-20919.html * https://www.suse.com/security/cve/CVE-2024-20921.html * https://www.suse.com/security/cve/CVE-2024-20926.html * https://www.suse.com/security/cve/CVE-2024-20932.html * https://www.suse.com/security/cve/CVE-2024-20945.html * https://www.suse.com/security/cve/CVE-2024-20952.html * https://bugzilla.suse.com/show_bug.cgi?id=1218903 * https://bugzilla.suse.com/show_bug.cgi?id=1218905 * https://bugzilla.suse.com/show_bug.cgi?id=1218906 * https://bugzilla.suse.com/show_bug.cgi?id=1218907 * https://bugzilla.suse.com/show_bug.cgi?id=1218908 * https://bugzilla.suse.com/show_bug.cgi?id=1218909 * https://bugzilla.suse.com/show_bug.cgi?id=1218911 * https://bugzilla.suse.com/show_bug.cgi?id=1219843 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:30:05 -0000 Subject: SUSE-RU-2024:0618-1: moderate: Recommended update for crmsh Message-ID: <170895060552.3778.2860172131618520064@smelt2.prg2.suse.org> # Recommended update for crmsh Announcement ID: SUSE-RU-2024:0618-1 Rating: moderate References: * bsc#1213889 * bsc#1215549 * bsc#1218940 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has three fixes can now be installed. ## Description: This update for crmsh fixes the following issues: * Update to version 4.5.1+20240124.63fbb492: * Fix: bootstrap: ssh key of the init node is duplicated in the authorized_keys files of other node (bsc#1218940) * Fix: parallax: refine error message when parallax fails to perform passwordless authentication (bsc#1218940) * Fix: ui_cluster: Improve the process of 'crm cluster stop' (bsc#1213889) * Dev: report: Redirect warning and error from remote node into stderr * Fix: utils: Add 'sudo' only when there is a sudoer(bsc#1215549) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-618=1 openSUSE-SLE-15.5-2024-618=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-618=1 ## Package List: * openSUSE Leap 15.5 (noarch) * crmsh-scripts-4.5.1+20240124.63fbb492-150500.3.19.1 * crmsh-4.5.1+20240124.63fbb492-150500.3.19.1 * crmsh-test-4.5.1+20240124.63fbb492-150500.3.19.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * crmsh-scripts-4.5.1+20240124.63fbb492-150500.3.19.1 * crmsh-4.5.1+20240124.63fbb492-150500.3.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1213889 * https://bugzilla.suse.com/show_bug.cgi?id=1215549 * https://bugzilla.suse.com/show_bug.cgi?id=1218940 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:30:06 -0000 Subject: SUSE-RU-2024:0617-1: moderate: Recommended update for yast2-http-server Message-ID: <170895060693.3778.13201470867955228624@smelt2.prg2.suse.org> # Recommended update for yast2-http-server Announcement ID: SUSE-RU-2024:0617-1 Rating: moderate References: * bsc#1218943 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for yast2-http-server fixes the following issue: * bsc#1218943 * followup of previous fix - fixed internal issue which caused Server modules not to be displayed at all. * 4.4.3 upgrade ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-617=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-617=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-617=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-617=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-617=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-617=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-617=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-617=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-617=1 ## Package List: * openSUSE Leap 15.4 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Manager Proxy 4.3 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 * SUSE Manager Server 4.3 (noarch) * yast2-http-server-4.4.3-150400.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0616-1: moderate: Recommended update for yast2-http-server Message-ID: <170895060879.3778.15412226923330798456@smelt2.prg2.suse.org> # Recommended update for yast2-http-server Announcement ID: SUSE-RU-2024:0616-1 Rating: moderate References: * bsc#1218943 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for yast2-http-server fixes the following issues: * bsc#1218943 * followup of previous fix - fixed internal issue which caused Server modules not to be displayed at all. * 4.5.2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-616=1 SUSE-2024-616=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-616=1 ## Package List: * openSUSE Leap 15.5 (noarch) * yast2-http-server-4.5.2-150500.3.3.1 * Basesystem Module 15-SP5 (noarch) * yast2-http-server-4.5.2-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218943 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0615-1: moderate: Recommended update for netcfg Message-ID: <170895061015.3778.3863520945123934143@smelt2.prg2.suse.org> # Recommended update for netcfg Announcement ID: SUSE-RU-2024:0615-1 Rating: moderate References: * bsc#1211886 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for netcfg fixes the following issues: * Add krb-prop entry (bsc#1211886) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-615=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-615=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-615=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-615=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-615=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-615=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-615=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-615=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-615=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-615=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-615=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-615=1 ## Package List: * openSUSE Leap Micro 5.3 (noarch) * netcfg-11.6-150000.3.6.1 * openSUSE Leap Micro 5.4 (noarch) * netcfg-11.6-150000.3.6.1 * openSUSE Leap 15.5 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * netcfg-11.6-150000.3.6.1 * Basesystem Module 15-SP5 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * netcfg-11.6-150000.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * netcfg-11.6-150000.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211886 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:30:11 -0000 Subject: SUSE-RU-2024:0614-1: important: Recommended update for rpm Message-ID: <170895061198.3778.6136766546399126731@smelt2.prg2.suse.org> # Recommended update for rpm Announcement ID: SUSE-RU-2024:0614-1 Rating: important References: * bsc#1216752 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has one fix can now be installed. ## Description: This update for rpm fixes the following issues: * backport lua support for rpm.execute to ease migrating from SLE Micro 5.5 to 6.0 (bsc#1216752) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-614=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-614=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-614=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-614=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-614=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-614=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-614=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-614=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-614=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-614=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-614=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-614=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-614=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-614=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-614=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-614=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-614=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-614=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-614=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-614=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (x86_64) * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (aarch64_ilp32) * rpm-64bit-4.14.3-150400.59.7.1 * rpm-ndb-64bit-4.14.3-150400.59.7.1 * rpm-64bit-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-64bit-debuginfo-4.14.3-150400.59.7.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.5 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Basesystem Module 15-SP5 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216752 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:33:13 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:33:13 -0000 Subject: SUSE-RU-2024:0614-1: important: Recommended update for rpm Message-ID: <170895079365.6609.1387685351850643591@smelt2.prg2.suse.org> # Recommended update for rpm Announcement ID: SUSE-RU-2024:0614-1 Rating: important References: * bsc#1216752 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has one fix can now be installed. ## Description: This update for rpm fixes the following issues: * backport lua support for rpm.execute to ease migrating from SLE Micro 5.5 to 6.0 (bsc#1216752) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-614=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-614=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-614=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-614=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-614=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-614=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-614=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-614=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-614=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-614=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-614=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-614=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-614=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-614=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-614=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-614=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-614=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-614=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-614=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-614=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (x86_64) * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (aarch64_ilp32) * rpm-64bit-4.14.3-150400.59.7.1 * rpm-ndb-64bit-4.14.3-150400.59.7.1 * rpm-64bit-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-64bit-debuginfo-4.14.3-150400.59.7.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.5 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-rpm-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Basesystem Module 15-SP5 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216752 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:36:15 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:36:15 -0000 Subject: SUSE-RU-2024:0614-1: important: Recommended update for rpm Message-ID: <170895097528.6893.728353757841081011@smelt2.prg2.suse.org> # Recommended update for rpm Announcement ID: SUSE-RU-2024:0614-1 Rating: important References: * bsc#1216752 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has one fix can now be installed. ## Description: This update for rpm fixes the following issues: * backport lua support for rpm.execute to ease migrating from SLE Micro 5.5 to 6.0 (bsc#1216752) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-614=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-614=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-614=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-614=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-614=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-614=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-614=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-614=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-614=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-614=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-614=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-614=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-614=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-614=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-614=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-614=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-614=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-614=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-614=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-614=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * SUSE Manager Proxy 4.3 (x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 (x86_64) * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (x86_64) * rpm-ndb-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * openSUSE Leap 15.4 (aarch64_ilp32) * rpm-64bit-4.14.3-150400.59.7.1 * rpm-64bit-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-64bit-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-64bit-4.14.3-150400.59.7.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * openSUSE Leap 15.5 (x86_64) * rpm-ndb-32bit-4.14.3-150400.59.7.1 * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.7.1 * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * Basesystem Module 15-SP5 (x86_64) * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rpm-ndb-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-ndb-4.14.3-150400.59.7.1 * rpm-ndb-debuginfo-4.14.3-150400.59.7.1 * rpm-ndb-debugsource-4.14.3-150400.59.7.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python-rpm-debugsource-4.14.3-150400.59.7.1 * rpm-build-debuginfo-4.14.3-150400.59.7.1 * rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-devel-4.14.3-150400.59.7.1 * rpm-build-4.14.3-150400.59.7.1 * rpm-4.14.3-150400.59.7.1 * python311-rpm-4.14.3-150400.59.7.1 * python3-rpm-4.14.3-150400.59.7.1 * python311-rpm-debuginfo-4.14.3-150400.59.7.1 * python3-rpm-debuginfo-4.14.3-150400.59.7.1 * rpm-debugsource-4.14.3-150400.59.7.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.7.1 * rpm-32bit-debuginfo-4.14.3-150400.59.7.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216752 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:36:17 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:36:17 -0000 Subject: SUSE-SU-2024:0613-1: moderate: Security update for libxml2 Message-ID: <170895097740.6893.5151181102441459071@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2024:0613-1 Rating: moderate References: * bsc#1219576 Cross-References: * CVE-2024-25062 CVSS scores: * CVE-2024-25062 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25062 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-613=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-613=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-613=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-613=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-613=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-613=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-613=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-devel-2.9.14-150400.5.28.1 * python311-libxml2-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * python311-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (x86_64) * libxml2-2-32bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-devel-32bit-2.9.14-150400.5.28.1 * libxml2-2-32bit-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (noarch) * libxml2-doc-2.9.14-150400.5.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libxml2-devel-64bit-2.9.14-150400.5.28.1 * libxml2-2-64bit-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-64bit-2.9.14-150400.5.28.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-libxml2-2.9.14-150400.5.28.1 * libxml2-python-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-debuginfo-2.9.14-150400.5.28.1 * python3-libxml2-debuginfo-2.9.14-150400.5.28.1 * libxml2-2-2.9.14-150400.5.28.1 * libxml2-debugsource-2.9.14-150400.5.28.1 * libxml2-tools-2.9.14-150400.5.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25062.html * https://bugzilla.suse.com/show_bug.cgi?id=1219576 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 12:36:18 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 12:36:18 -0000 Subject: SUSE-RU-2024:0609-1: moderate: Recommended update for grub2 Message-ID: <170895097871.6893.11403596405266260192@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:0609-1 Rating: moderate References: * bsc#1217102 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for grub2 fixes the following issues: * Fix PowerPC grub slow loading time (bsc#1217102) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-609=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-609=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-609=1 openSUSE-SLE-15.5-2024-609=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-609=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * grub2-2.06-150500.29.16.1 * grub2-debuginfo-2.06-150500.29.16.1 * Basesystem Module 15-SP5 (noarch) * grub2-snapper-plugin-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-2.06-150500.29.16.1 * grub2-arm64-efi-2.06-150500.29.16.1 * grub2-systemd-sleep-plugin-2.06-150500.29.16.1 * grub2-i386-pc-2.06-150500.29.16.1 * grub2-x86_64-efi-2.06-150500.29.16.1 * Basesystem Module 15-SP5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.16.1 * Basesystem Module 15-SP5 (s390x) * grub2-s390x-emu-2.06-150500.29.16.1 * Server Applications Module 15-SP5 (noarch) * grub2-x86_64-xen-2.06-150500.29.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * grub2-2.06-150500.29.16.1 * grub2-branding-upstream-2.06-150500.29.16.1 * grub2-debuginfo-2.06-150500.29.16.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150500.29.16.1 * openSUSE Leap 15.5 (noarch) * grub2-i386-efi-extras-2.06-150500.29.16.1 * grub2-snapper-plugin-2.06-150500.29.16.1 * grub2-x86_64-efi-extras-2.06-150500.29.16.1 * grub2-i386-pc-2.06-150500.29.16.1 * grub2-arm64-efi-debug-2.06-150500.29.16.1 * grub2-x86_64-xen-extras-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-debug-2.06-150500.29.16.1 * grub2-x86_64-efi-debug-2.06-150500.29.16.1 * grub2-x86_64-efi-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-2.06-150500.29.16.1 * grub2-arm64-efi-2.06-150500.29.16.1 * grub2-arm64-efi-extras-2.06-150500.29.16.1 * grub2-i386-xen-2.06-150500.29.16.1 * grub2-powerpc-ieee1275-extras-2.06-150500.29.16.1 * grub2-i386-pc-debug-2.06-150500.29.16.1 * grub2-x86_64-xen-2.06-150500.29.16.1 * grub2-i386-pc-extras-2.06-150500.29.16.1 * grub2-systemd-sleep-plugin-2.06-150500.29.16.1 * grub2-s390x-emu-extras-2.06-150500.29.16.1 * grub2-i386-efi-2.06-150500.29.16.1 * grub2-i386-efi-debug-2.06-150500.29.16.1 * grub2-i386-xen-extras-2.06-150500.29.16.1 * openSUSE Leap 15.5 (s390x) * grub2-s390x-emu-2.06-150500.29.16.1 * grub2-s390x-emu-debug-2.06-150500.29.16.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * grub2-2.06-150500.29.16.1 * grub2-debugsource-2.06-150500.29.16.1 * grub2-debuginfo-2.06-150500.29.16.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * grub2-snapper-plugin-2.06-150500.29.16.1 * grub2-arm64-efi-2.06-150500.29.16.1 * grub2-i386-pc-2.06-150500.29.16.1 * grub2-x86_64-xen-2.06-150500.29.16.1 * grub2-x86_64-efi-2.06-150500.29.16.1 * SUSE Linux Enterprise Micro 5.5 (s390x) * grub2-s390x-emu-2.06-150500.29.16.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217102 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 20:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 20:30:02 -0000 Subject: SUSE-SU-2024:0624-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) Message-ID: <170897940275.4984.17492031086368347248@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0624-1 Rating: important References: * bsc#1215300 * bsc#1218733 Cross-References: * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_18 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-624=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-624=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-5-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-5-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-SLE15-SP5-RT_Update_5-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-5-150500.2.1 * kernel-livepatch-5_14_21-150500_13_18-rt-debuginfo-5-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 20:30:05 -0000 Subject: SUSE-SU-2024:0622-1: important: Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) Message-ID: <170897940501.4984.13585792996175292068@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0622-1 Rating: important References: * bsc#1215300 * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_11 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-623=1 SUSE-2024-622=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-623=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-622=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_5-rt-7-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-6-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_5-rt-7-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_1-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_13_5-rt-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_3-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_13_11-rt-6-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Feb 26 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Mon, 26 Feb 2024 20:30:07 -0000 Subject: SUSE-SU-2024:0620-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Message-ID: <170897940707.4984.18341836430709011300@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0620-1 Rating: important References: * bsc#1218733 Cross-References: * CVE-2023-51780 CVSS scores: * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_24 fixes one issue. The following security issue was fixed: * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-620=1 SUSE-2024-621=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-620=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-621=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_24-rt-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-4-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-4-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-4-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_24-rt-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-4-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_6-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_24-rt-debuginfo-4-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_7-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_13_21-rt-debuginfo-4-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 08:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 08:30:03 -0000 Subject: SUSE-RU-2024:0629-1: moderate: Recommended update for virt-manager Message-ID: <170902260305.31683.9536444994421099466@smelt2.prg2.suse.org> # Recommended update for virt-manager Announcement ID: SUSE-RU-2024:0629-1 Rating: moderate References: * bsc#1212195 * bsc#1213790 * bsc#1219791 * bsc#1220012 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has four fixes can now be installed. ## Description: This update for virt-manager fixes the following issues: * Fix KVM/QEMU video driver fails (bsc#1219791, bsc#1220012) * Fix collapsed application tab in virt-manager (bsc#1213790) * libvirtd crashes when virt-manager connects virt-manager qemu:///system (bsc#1212195) * Changes to osinfo-db cause some virt-manager tests to fail ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-629=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-629=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-629=1 openSUSE-SLE-15.5-2024-629=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (noarch) * virt-manager-common-4.1.0-150500.3.6.1 * virt-install-4.1.0-150500.3.6.1 * Server Applications Module 15-SP5 (noarch) * virt-manager-common-4.1.0-150500.3.6.1 * virt-manager-4.1.0-150500.3.6.1 * virt-install-4.1.0-150500.3.6.1 * openSUSE Leap 15.5 (noarch) * virt-manager-common-4.1.0-150500.3.6.1 * virt-manager-4.1.0-150500.3.6.1 * virt-install-4.1.0-150500.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212195 * https://bugzilla.suse.com/show_bug.cgi?id=1213790 * https://bugzilla.suse.com/show_bug.cgi?id=1219791 * https://bugzilla.suse.com/show_bug.cgi?id=1220012 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 08:30:05 -0000 Subject: SUSE-RU-2024:0628-1: moderate: Recommended update for open-lldp Message-ID: <170902260526.31683.865561086464930379@smelt2.prg2.suse.org> # Recommended update for open-lldp Announcement ID: SUSE-RU-2024:0628-1 Rating: moderate References: * bsc#1212749 * jsc#PED-6852 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for open-lldp fixes the following issues: * open-lldp was updated to version v1.1+77.75e83b6fb98e: * Fixed issue with `lldpad.service` failing in login/sched nodes (bsc#1212749) * Fixed various NULL pointer dereference issues * dcbx: Fixed memory vulnerability (UAF) * dcbx: Fixed leak when receiving legacy TLVs with mismatched mode * lldp: Reject frames with duplicate TLVs * dcbx: Free manifest in rchange callback * dcbx: Avoid memory leak if ifup is called twice * ctrl_iface: Fixed a memory leak in ctrl_iface_deinit * lldp: Avoid sending uninitialized data * Reverted "Use interface index instead of name in libconfig" * agent: Reset frame status on message delete * basman: Use return address when pulling address * 8021Qaz: Check for rx block validity * 8021qaz: Fixed squelch initialization errors * macvtap: Fixed error condition * vdp22: converted command parsing to null term ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-628=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-628=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-628=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-628=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-628=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-628=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-628=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-628=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-628=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-628=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-628=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-628=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-628=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-628=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-628=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-628=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-628=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-628=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-628=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-628=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-628=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-628=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * open-lldp-devel-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * open-lldp-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-debugsource-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-1.1+77.75e83b6-150300.3.6.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150300.3.6.1 * open-lldp-1.1+77.75e83b6-150300.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212749 * https://jira.suse.com/browse/PED-6852 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 08:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 08:30:06 -0000 Subject: SUSE-RU-2024:0627-1: moderate: Recommended update for open-lldp Message-ID: <170902260698.31683.4638419093618797013@smelt2.prg2.suse.org> # Recommended update for open-lldp Announcement ID: SUSE-RU-2024:0627-1 Rating: moderate References: * bsc#1212749 * jsc#PED-6852 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature and has one fix can now be installed. ## Description: This update for open-lldp fixes the following issues: * open-lldp was updated to version v1.1+77.75e83b6fb98e: * Fixed issue with `lldpad.service` failing in login/sched nodes (bsc#1212749) * Fixed various NULL pointer dereference issues * dcbx: Fixed memory vulnerability (UAF) * dcbx: Fixed leak when receiving legacy TLVs with mismatched mode * lldp: Reject frames with duplicate TLVs * dcbx: Free manifest in rchange callback * dcbx: Avoid memory leak if ifup is called twice * ctrl_iface: Fixed a memory leak in ctrl_iface_deinit * lldp: Avoid sending uninitialized data * Reverted "Use interface index instead of name in libconfig" * agent: Reset frame status on message delete * basman: Use return address when pulling address * 8021Qaz: Check for rx block validity * 8021qaz: Fixed squelch initialization errors * macvtap: Fixed error condition * vdp22: converted command parsing to null term * vdp22: convert command parsing to null term ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-627=1 SUSE-2024-627=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-627=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-627=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * open-lldp-debugsource-1.1+77.75e83b6-150500.3.3.1 * open-lldp-debuginfo-1.1+77.75e83b6-150500.3.3.1 * open-lldp-devel-1.1+77.75e83b6-150500.3.3.1 * open-lldp-1.1+77.75e83b6-150500.3.3.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150500.3.3.1 * liblldp_clif1-1.1+77.75e83b6-150500.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * open-lldp-debugsource-1.1+77.75e83b6-150500.3.3.1 * open-lldp-debuginfo-1.1+77.75e83b6-150500.3.3.1 * open-lldp-1.1+77.75e83b6-150500.3.3.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150500.3.3.1 * liblldp_clif1-1.1+77.75e83b6-150500.3.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * open-lldp-debugsource-1.1+77.75e83b6-150500.3.3.1 * open-lldp-debuginfo-1.1+77.75e83b6-150500.3.3.1 * open-lldp-devel-1.1+77.75e83b6-150500.3.3.1 * open-lldp-1.1+77.75e83b6-150500.3.3.1 * liblldp_clif1-debuginfo-1.1+77.75e83b6-150500.3.3.1 * liblldp_clif1-1.1+77.75e83b6-150500.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212749 * https://jira.suse.com/browse/PED-6852 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 08:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 08:30:08 -0000 Subject: SUSE-RU-2024:0626-1: important: Recommended update for ecj Message-ID: <170902260857.31683.11629071587576104214@smelt2.prg2.suse.org> # Recommended update for ecj Announcement ID: SUSE-RU-2024:0626-1 Rating: important References: * bsc#1219862 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for ecj fixes the following issues: * Allow building ecj with language levels 8 (bsc#1219862) * Distribute the bundled javax17api.jar under maven coordinate of org.eclipse:javax17api:17, so that it can be used if needed ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-626=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-626=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-626=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-626=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-626=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-626=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-626=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-626=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-626=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-626=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-626=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-626=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-626=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-626=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-626=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-626=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-626=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Manager Proxy 4.3 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Manager Server 4.3 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Enterprise Storage 7.1 (noarch) * ecj-4.23-150200.3.12.1 * openSUSE Leap 15.5 (noarch) * ecj-4.23-150200.3.12.1 * Basesystem Module 15-SP5 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * ecj-4.23-150200.3.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * ecj-4.23-150200.3.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219862 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 08:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 08:30:10 -0000 Subject: SUSE-RU-2024:0625-1: moderate: Recommended update for python-SPARQLWrapper Message-ID: <170902261027.31683.12930694386116702512@smelt2.prg2.suse.org> # Recommended update for python-SPARQLWrapper Announcement ID: SUSE-RU-2024:0625-1 Rating: moderate References: * bsc#1215704 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for python-SPARQLWrapper fixes the following issues: * Added missing python3-SPARQLWrapper to Package Hub for SLE-15-SP5 (no source changes) (bsc#1215704) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-625=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-625=1 ## Package List: * openSUSE Leap 15.5 (noarch) * python3-SPARQLWrapper-1.8.0-150000.4.2.1 * SUSE Package Hub 15 15-SP5 (noarch) * python3-SPARQLWrapper-1.8.0-150000.4.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215704 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 08:58:50 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 08:58:50 -0000 Subject: SUSE-SU-2023:0592-1: critical: Security update for SUSE Manager 4.2.11 Message-ID: <170902433038.6375.11317483893650027504@smelt2.prg2.suse.org> # Security update for SUSE Manager 4.2.11 Announcement ID: SUSE-SU-2023:0592-1 Rating: critical References: * bsc#1188191 * bsc#1195979 * bsc#1197027 * bsc#1198226 * bsc#1200096 * bsc#1200169 * bsc#1201142 * bsc#1201476 * bsc#1201893 * bsc#1202093 * bsc#1202217 * bsc#1203287 * bsc#1203288 * bsc#1203521 * bsc#1203532 * bsc#1203588 * bsc#1203633 * bsc#1203698 * bsc#1203826 * bsc#1203884 * bsc#1203886 * bsc#1204011 * bsc#1204029 * bsc#1204032 * bsc#1204186 * bsc#1204208 * bsc#1204330 * bsc#1204437 * bsc#1204517 * bsc#1204519 * bsc#1204541 * bsc#1204651 * bsc#1204699 * bsc#1204712 * bsc#1204879 * bsc#1205012 * bsc#1205040 * bsc#1205523 * bsc#1205663 * bsc#1205759 * bsc#1205920 * bsc#1205943 * bsc#1205976 * bsc#1206146 * bsc#1206168 * bsc#1206249 * bsc#1206375 * bsc#1206470 * bsc#1206613 * bsc#1206817 * bsc#1206861 * bsc#1206932 * bsc#1206933 * bsc#1206963 * bsc#1206979 * bsc#1206981 * bsc#1207141 * bsc#1208306 * bsc#1208335 * bsc#1208418 * bsc#1208499 Cross-References: * CVE-2021-42740 * CVE-2022-0860 * CVE-2022-1415 * CVE-2022-31129 * CVE-2022-40152 CVSS scores: * CVE-2021-42740 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2021-42740 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0860 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2022-0860 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1415 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2022-1415 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2022-31129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-31129 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-40152 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-40152 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 * SUSE Manager Server 4.2 Module 4.2 An update that solves five vulnerabilities and has 56 security fixes can now be installed. ## Security update for SUSE Manager Server 4.2 ### Description: This update fixes the following issues: cobbler: * Fix improper authorization (bsc#1197027, CVE-2022-0860) * Prevent error when starting up logrotate.service (bsc#1188191) drools: * Deserialization of Untrusted Data: unsafe data deserialization in DroolsStreamUtils.java (bsc#1204879, CVE-2022-1415) grafana-formula: * Version 0.8.1 * Fix Uyuni/SUMA dashboard names * Version 0.8.0 * Set dashboard names depending on project * Update dashboards to use new JSON schema * Fix PostgreSQL dashboard queries * Migrate deprecated panels to their current replacements * Version 0.7.1 * Fix default password field description (bsc#1203698) * Do not require default admin and password fields inter-server-sync: * Version 0.2.7 * Do not update pillars table if it does not exists like in 4.2 * Version 0.2.6 * Export package extra tags for complete debian repo metatdata (bsc#1206375) * Replace URLs in OS Images pillars when exporting and importing images * Version 0.2.5 * Correct error when importing without debug log level (bsc#1204699) mgr-osad: * Version 4.2.9-1 * Updated logrotate configuration (bsc#1206470) prometheus-formula: * Version 0.7.0 * Switch from basic authentication to TLS certificate client authentication for Blackbox exporter * Fix scheme label in clients targets configration * Add README.md py27-compat-salt: * Ignore extend declarations from excluded SLS files (bsc#1203886) * Enhance capture of error messages for Zypper calls in zypperpkg module rhnlib: * Version 4.2.7-1 * Don't get stuck at the end of SSL transfers (bsc#1204032) saltboot-formula: * Update to version 0.1.1676908681.e90e0b1 * Add failsafe stop file when salt-minion does not stop (bsc#1208418) * Support salt bundle (bsc#1208499) salt-netapi-client: * Version 0.21.0 * See: https://github.com/SUSE/salt-netapi-client/releases/tag/v0.21.0 * Add transactional_update module * Improve logging when creating salt exception smdba: * Version 1.7.11 * fix config update from wal_keep_segments to wal_keep_size for newer postgresql versions (bsc#1204519) spacecmd: * Version 4.2.21-1 * Prevent string api parameters to be parsed as dates if not in ISO-8601 format (bsc#1205759) * Add python-dateutil dependency, required to process date values in spacecmd api calls * Correctly understand 'ssm' keyword on scap scheduling * Fix dict_keys not supporting indexing in systems_setconfigchannelorger spacewalk-admin: * Version 4.2.13-1 * Generate uyuni_roster.conf with salt-secrets-config (bsc#1200096) spacewalk-backend: * Version 4.2.26-1 * Fix reposync error about missing "content-type" key when syncing certain channels * Compute headers as list of two-tuples to be used by url grabber (bsc#1205523) * Updated logrotate configuration (bsc#1206470) * Add 'octet-stream' to accepted content-types for reposync mirrorlists * Exclude invalid mirror urls for reposync (bsc#1203826) * do not fetch mirrorlist when a file url is given * Keep older module metadata files in database (bsc#1201893) * Removed the activation keys report from the debug information spacewalk-certs-tools: * Version 4.2.19-1 * some i18n functions moved to new module which needs to be loaded (bsc#1201142) * Generated bootstrap scripts installs all needed Salt 3004 dependencies for Ubuntu 18.04 (bsc#1204517) spacewalk-client-tools: * Version 4.2.22-1 * Update translation strings spacewalk-java: * Version 4.2.47-1 * Use uyuni roster salt module instead of flat roster files (bsc#1200096) * Version 4.2.46-1 * Fix registration with proxy and tunnel SSH (bsc#1200096) * Version 4.2.45-1 * Add 'none' matcher to CLM AppStream filters (bsc#1206817) * Improve logs when sls action chain file is missing * Do not forward ssh command if proxy and tunnel are present (bsc#1200096) * Fix not being able to delete CLM environment if there are custom child channels that where not built by the environment (bsc#1206932) * Include missing 'gpg' states to avoid issues on SSH minions. * Optimize the number of salt calls on minion startup (bsc#1203532) * Fix CVE Audit ignoring errata in parent channels if patch in successor product exists (bsc#1206168) * Fix CVE Audit incorrectly displaying predecessor product (bsc#1205663) * Fix modular channel check during system update via XMLRPC (bsc#1206613) * Trigger a package profile update when a new live-patch is installed (bsc#1206249) * prevent ISE on activation key page when selected base channel value is null * Only remove product catalog if PAYG ssh credentials are defined (bsc#1205943) * Updated logrotate configuration (bsc#1206470) * Limit changelog data in generated metadata to 20 entries * Fix CLM to not remove necessary packages when filtering erratas (bsc#1195979) * check for NULL in DEB package install size value * Allowed cancelling pending actions with a failed prerequisite (bsc#1204712) * disable cloned vendor channel auto selection by default (bsc#1204186) * adapt permissions of temporary ssh key directory * format results for package, errata and image build actions in system history similar to state apply results * Fix ClassCastException * Run only minion actions that are in the pending status (bsc#1205012) * Manager reboot in transactional update action chain (bsc#1201476 * Optimize performance of config channels operations for UI and API (bsc#1204029) * Don't add the same channel twice in the System config addChannel API (bsc#1204029) * fix xmlrpc call randomly failing with translation error (bsc#1203633) * Optimize action chain processing on job return event (bsc#1203532) * Re-calculate salt event queue numbers on restart * Fix out of memory error when building a CLM project (bsc#1202217) * Process salt events in FIFO order (bsc#1203532) * Remove 'SSM' column text where not applicable (bsc#1203588) * Fix rendering of ssm/MigrateSystems page (bsc#1204651) * Pass mgr_sudo_user pillar on salt ssh client cleanup (bsc#1202093) * Deny packages from older module metadata when building CLM projects (bsc#1201893) * Refresh pillar data for the assigned systems when a CLM channel is built (bsc#1200169) * delay hardware refresh action to avoid missing channels (bsc#1204208) * During re-activation, recalculate grains if * Remove unused gson-extras.jar during build spacewalk-search: * Version 4.2.9-1 * Updated logrotate configuration (bsc#1206470) spacewalk-web: * Version 4.2.32-1 * Add 'none' matcher to CLM AppStream filters (bsc#1206817) * fix frontend logging in react pages * Add bugzilla references to past security fixes * shell-quote fix CVE-2021-42740 (bsc#1203287) * moment fix CVE-2022-31129 (bsc#1203288) supportutils-plugin-susemanager: * Version 4.2.5-1 * Added dependency for XML Simple * update susemanager plugin to export the number of pending salt events susemanager: * Version 4.2.40-1 * Add mgr-salt-ssh wrapper to use with uyuni roster Salt module (bsc#1200096) * Version 4.2.39-1 * fix bootstrap repo path for SLES for SAP 12 (bsc#1207141) * make venv-salt-minion optional for SUSE Manager Proxy 4.2 bootstrap repository (bsc#1206933) * show RHEL target for bootstrap repo creation only if it is really connected to the CDN (bsc#1206861) * add python3-extras to bootstrap repo as dependency of python3-libxml2, optional SLES 15 does not have it and it is only required on SP4 or greater (bsc#1204437) susemanager-build-keys: * Version 15.3.6 * Add rpmlintrc configuration, so "W: backup-file-in-package" for the keyring is ignored. We do not ship backup files, but we own them because they are created each time gpg is called, and we want them removed if the package is removed * uyuni-build-keys.rpmlintrc susemanager-doc-indexes: * Include RHEL7 in Salt 3000 to Salt Bundle migration section of the Client Configuration Guide * Update Salt Bundle guide as Salt Bundle is now the default registration method * Re-added statement about Cobbler support in Reference Guide and Client Configuration Guide (bsc#1206963) * Added information about java.salt_event_thread_pool_size in Large Deployments Guide * Added information about GPG key usage in the Debian section of the * Updated default number of changelog entries in Administration Guide * Include migration guide from Salt 3000 to Bundle for SUSE Linux Enterprise 12 and CentOS7 in Troubleshooting Clients * Removed mentions to ABRT in Reference Guide * Extended note about using Salt SSH with Salt Bundle in 4.2 * Fixed Liberty Linux client tools label in Client Configuration Guide susemanager-docs_en: * Include RHEL7 in Salt 3000 to Salt Bundle migration section of the Client Configuration Guide * Update Salt Bundle guide as Salt Bundle is now the default registration method * Re-added statement about Cobbler support in Reference Guide and Client Configuration Guide (bsc#1206963) * Added information about java.salt_event_thread_pool_size in Large Deployments Guide * Added information about GPG key usage in the Debian section of the * Updated default number of changelog entries in Administration Guide * Include migration guide from Salt 3000 to Bundle for SUSE Linux Enterprise 12 and CentOS7 in Troubleshooting Clients. * Removed mentions to ABRT in Reference Guide * Extended note about using Salt SSH with Salt Bundle in 4.2 * Fixed Liberty Linux client tools label in Client Configuration Guide susemanager-schema: * Version 4.2.27-1 * Add created and modified fields to suseMinionInfo to make uyuni roster module cache validation more accurate (bsc#1200096) * Version 4.2.26-1 * Add 'none' matcher to CLM AppStream filters (bsc#1206817) * Increase cron_expr varchar length to 120 in suseRecurringAction table (bsc#1205040) * Keep older module metadata files in database (bsc#1201893) * Fix setting of last modified date in channel clone procedure susemanager-sls: * Version 4.2.30-1 * Flush uyuni roster cache if the config has changed * Implement uyuni roster module for Salt (bsc#1200096) * Version 4.2.30-1 * Fix dnf plugin path calculation when using Salt Bundle (bsc#1208335) * Version 4.2.29-1 * Improve _mgractionchains.conf logs * Prevent possible errors from "mgractionschains" module when there is no action chain to resume. * Fix mgrnet custom module to be compatible with old Python 2.6 (bsc#1206979) (bsc#1206981) * Fix custom "mgrcompat.module_run" state module to work with Salt 3005.1 * filter out libvirt engine events (bsc#1206146) * Optimize the number of salt calls on minion startup (bsc#1203532) * Updated logrotate configuration (bsc#1206470) * Make libvirt-events.conf path depend on what minion is used (bsc#1205920) * Fix kiwi inspect regexp to allow image names with "-" (bsc#1204541) * Avoid installing recommended packages from assigned products (bsc#1204330) * Manager reboot in transactional update action chain (bsc#1201476) * Use the actual sudo user home directory for salt ssh clients on bootstrap and clean up (bsc#1202093) * Perform refresh with packages.pkgupdate state (bsc#1203884) uyuni-common-libs: * Version 4.2.9-1 * Fix crash due missing "context_manager" when running salt-secrets-config service (bsc#1200096) * Version 4.2.8-1 * some i18n functions moved to new module which needs to be loaded (bsc#1201142) virtual-host-gatherer: * Version 1.0.24-1 * Report total memory of a libvirt hypervisor * Improve interoperability with other Python projects woodstox: * CVE-2022-40152: Fixed stack overflow in XML serialization. (bsc#1203521) How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Security update for SUSE Manager Proxy and Retail Branch Server 4.2 ### Description: This update fixes the following issues: mgr-osad: * Version 4.2.9-1 * Updated logrotate configuration (bsc#1206470) rhnlib: * Version 4.2.7-1 * Don't get stuck at the end of SSL transfers (bsc#1204032) spacecmd: * Version 4.2.21-1 * Prevent string api parameters to be parsed as dates if not in ISO-8601 format (bsc#1205759) * Add python-dateutil dependency, required to process date values in spacecmd api calls * Correctly understand 'ssm' keyword on scap scheduling * Fix dict_keys not supporting indexing in systems_setconfigchannelorger spacewalk-backend: * Version 4.2.26-1 * Fix reposync error about missing "content-type" key when syncing certain channels * Compute headers as list of two-tuples to be used by url grabber (bsc#1205523) * Updated logrotate configuration (bsc#1206470) * Add 'octet-stream' to accepted content-types for reposync mirrorlists * Exclude invalid mirror urls for reposync (bsc#1203826) * do not fetch mirrorlist when a file url is given * Keep older module metadata files in database (bsc#1201893) * Removed the activation keys report from the debug information spacewalk-certs-tools: * Version 4.2.19-1 * some i18n functions moved to new module which needs to be loaded (bsc#1201142) * Generated bootstrap scripts installs all needed Salt 3004 dependencies for Ubuntu 18.04 (bsc#1204517) spacewalk-client-tools: * Version 4.2.22-1 * Update translation strings spacewalk-proxy: * Version 4.2.13-1 * Updated logrotate configuration (bsc#1206470) * Handle tftp in rhn-proxy (bsc#1205976) spacewalk-proxy-installer: * Version 4.2.11-1 * Detect salt bundle when fetching certificate using salt event (bsc#1208306) * Version 4.2.10-1 * Correctly detect salt-bundle (bsc#1208306) * Version 4.2.9-1 * Prefer salt-bundle minion config if available (bsc#1198226, bsc#1208306) * Version 4.2.8-1 * Increase maximum object size to 500MB (bsc#1204011) spacewalk-web: * Version 4.2.32-1 * Add 'none' matcher to CLM AppStream filters (bsc#1206817) * fix frontend logging in react pages * Add bugzilla references to past security fixes * shell-quote fix CVE-2021-42740 (bsc#1203287) * moment fix CVE-2022-31129 (bsc#1203288) susemanager-build-keys: * Version 15.3.6 * Add rpmlintrc configuration, so "W: backup-file-in-package" for the keyring is ignored. We do not ship backup files, but we own them because they are created each time gpg is called, and we want them removed if the package is removed * uyuni-build-keys.rpmlintrc uyuni-common-libs: * Version 4.2.9-1 * Fix crash due missing "context_manager" when running salt-secrets-config service (bsc#1200096) * Version 4.2.8-1 * some i18n functions moved to new module which needs to be loaded (bsc#1201142) How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-592=1 * SUSE Manager Server 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-592=1 ## Package List: * SUSE Manager Proxy 4.2 Module 4.2 (noarch) * spacewalk-base-minimal-config-4.2.32-150300.3.36.4 * python3-spacewalk-client-tools-4.2.22-150300.4.30.2 * spacewalk-proxy-salt-4.2.13-150300.3.24.2 * python3-rhnlib-4.2.7-150300.4.12.2 * mgr-osad-4.2.9-150300.2.12.2 * spacewalk-certs-tools-4.2.19-150300.3.27.4 * spacewalk-proxy-broker-4.2.13-150300.3.24.2 * spacewalk-proxy-redirect-4.2.13-150300.3.24.2 * spacewalk-proxy-installer-4.2.11-150300.3.14.2 * spacewalk-proxy-management-4.2.13-150300.3.24.2 * python3-mgr-osa-common-4.2.9-150300.2.12.2 * spacewalk-check-4.2.22-150300.4.30.2 * spacecmd-4.2.21-150300.4.33.2 * spacewalk-client-tools-4.2.22-150300.4.30.2 * spacewalk-proxy-common-4.2.13-150300.3.24.2 * python3-mgr-osad-4.2.9-150300.2.12.2 * python3-spacewalk-certs-tools-4.2.19-150300.3.27.4 * spacewalk-base-minimal-4.2.32-150300.3.36.4 * susemanager-build-keys-15.3.6-150300.3.6.2 * spacewalk-backend-4.2.26-150300.4.35.6 * python3-spacewalk-client-setup-4.2.22-150300.4.30.2 * spacewalk-client-setup-4.2.22-150300.4.30.2 * spacewalk-proxy-package-manager-4.2.13-150300.3.24.2 * python3-spacewalk-check-4.2.22-150300.4.30.2 * susemanager-build-keys-web-15.3.6-150300.3.6.2 * SUSE Manager Proxy 4.2 Module 4.2 (x86_64) * python3-uyuni-common-libs-4.2.9-150300.3.14.1 * SUSE Manager Server 4.2 Module 4.2 (noarch) * spacewalk-base-minimal-config-4.2.32-150300.3.36.4 * python3-spacewalk-client-tools-4.2.22-150300.4.30.2 * spacewalk-java-lib-4.2.47-150300.3.58.1 * spacewalk-search-4.2.9-150300.3.15.2 * susemanager-docs_en-pdf-4.2-150300.12.39.2 * python3-rhnlib-4.2.7-150300.4.12.2 * prometheus-formula-0.7.0-150300.3.17.2 * spacewalk-certs-tools-4.2.19-150300.3.27.4 * spacewalk-admin-4.2.13-150300.3.18.1 * cobbler-3.1.2-150300.5.19.1 * grafana-formula-0.8.1-150300.3.9.2 * spacewalk-backend-config-files-common-4.2.26-150300.4.35.6 * spacewalk-backend-server-4.2.26-150300.4.35.6 * uyuni-config-modules-4.2.31-150300.3.43.1 * virtual-host-gatherer-VMware-1.0.24-150300.3.9.2 * spacewalk-backend-config-files-tool-4.2.26-150300.4.35.6 * spacewalk-backend-iss-4.2.26-150300.4.35.6 * spacewalk-java-config-4.2.47-150300.3.58.1 * python3-mgr-osa-dispatcher-4.2.9-150300.2.12.2 * spacewalk-java-4.2.47-150300.3.58.1 * python3-mgr-osa-common-4.2.9-150300.2.12.2 * spacewalk-backend-xmlrpc-4.2.26-150300.4.35.6 * virtual-host-gatherer-Nutanix-1.0.24-150300.3.9.2 * susemanager-doc-indexes-4.2-150300.12.39.4 * saltboot-formula-0.1.1676908681.e90e0b1-150300.3.15.1 * spacewalk-backend-sql-postgresql-4.2.26-150300.4.35.6 * drools-7.17.0-150300.4.9.2 * spacewalk-backend-sql-4.2.26-150300.4.35.6 * spacewalk-backend-xml-export-libs-4.2.26-150300.4.35.6 * spacewalk-backend-config-files-4.2.26-150300.4.35.6 * spacecmd-4.2.21-150300.4.33.2 * spacewalk-html-4.2.32-150300.3.36.4 * spacewalk-backend-package-push-server-4.2.26-150300.4.35.6 * spacewalk-client-tools-4.2.22-150300.4.30.2 * woodstox-4.4.2-150300.3.6.2 * susemanager-schema-4.2.27-150300.3.35.1 * python3-spacewalk-certs-tools-4.2.19-150300.3.27.4 * spacewalk-base-minimal-4.2.32-150300.3.36.4 * spacewalk-backend-app-4.2.26-150300.4.35.6 * virtual-host-gatherer-1.0.24-150300.3.9.2 * virtual-host-gatherer-libcloud-1.0.24-150300.3.9.2 * susemanager-build-keys-15.3.6-150300.3.6.2 * susemanager-docs_en-4.2-150300.12.39.2 * py27-compat-salt-3000.3-150300.7.7.29.2 * susemanager-sls-4.2.31-150300.3.43.1 * mgr-osa-dispatcher-4.2.9-150300.2.12.2 * spacewalk-backend-applet-4.2.26-150300.4.35.6 * spacewalk-backend-4.2.26-150300.4.35.6 * spacewalk-java-postgresql-4.2.47-150300.3.58.1 * supportutils-plugin-susemanager-4.2.5-150300.3.9.2 * spacewalk-base-4.2.32-150300.3.36.4 * virtual-host-gatherer-Kubernetes-1.0.24-150300.3.9.2 * spacewalk-backend-tools-4.2.26-150300.4.35.6 * salt-netapi-client-0.21.0-150300.3.12.4 * spacewalk-taskomatic-4.2.47-150300.3.58.1 * susemanager-build-keys-web-15.3.6-150300.3.6.2 * spacewalk-backend-iss-export-4.2.26-150300.4.35.6 * SUSE Manager Server 4.2 Module 4.2 (ppc64le s390x x86_64) * susemanager-4.2.40-150300.3.49.1 * smdba-1.7.11-0.150300.3.12.2 * susemanager-tools-4.2.40-150300.3.49.1 * python3-uyuni-common-libs-4.2.9-150300.3.14.1 * inter-server-sync-debuginfo-0.2.7-150300.8.28.2 * inter-server-sync-0.2.7-150300.8.28.2 ## References: * https://www.suse.com/security/cve/CVE-2021-42740.html * https://www.suse.com/security/cve/CVE-2022-0860.html * https://www.suse.com/security/cve/CVE-2022-1415.html * https://www.suse.com/security/cve/CVE-2022-31129.html * https://www.suse.com/security/cve/CVE-2022-40152.html * https://bugzilla.suse.com/show_bug.cgi?id=1188191 * https://bugzilla.suse.com/show_bug.cgi?id=1195979 * https://bugzilla.suse.com/show_bug.cgi?id=1197027 * https://bugzilla.suse.com/show_bug.cgi?id=1198226 * https://bugzilla.suse.com/show_bug.cgi?id=1200096 * https://bugzilla.suse.com/show_bug.cgi?id=1200169 * https://bugzilla.suse.com/show_bug.cgi?id=1201142 * https://bugzilla.suse.com/show_bug.cgi?id=1201476 * https://bugzilla.suse.com/show_bug.cgi?id=1201893 * https://bugzilla.suse.com/show_bug.cgi?id=1202093 * https://bugzilla.suse.com/show_bug.cgi?id=1202217 * https://bugzilla.suse.com/show_bug.cgi?id=1203287 * https://bugzilla.suse.com/show_bug.cgi?id=1203288 * https://bugzilla.suse.com/show_bug.cgi?id=1203521 * https://bugzilla.suse.com/show_bug.cgi?id=1203532 * https://bugzilla.suse.com/show_bug.cgi?id=1203588 * https://bugzilla.suse.com/show_bug.cgi?id=1203633 * https://bugzilla.suse.com/show_bug.cgi?id=1203698 * https://bugzilla.suse.com/show_bug.cgi?id=1203826 * https://bugzilla.suse.com/show_bug.cgi?id=1203884 * https://bugzilla.suse.com/show_bug.cgi?id=1203886 * https://bugzilla.suse.com/show_bug.cgi?id=1204011 * https://bugzilla.suse.com/show_bug.cgi?id=1204029 * https://bugzilla.suse.com/show_bug.cgi?id=1204032 * https://bugzilla.suse.com/show_bug.cgi?id=1204186 * https://bugzilla.suse.com/show_bug.cgi?id=1204208 * https://bugzilla.suse.com/show_bug.cgi?id=1204330 * https://bugzilla.suse.com/show_bug.cgi?id=1204437 * https://bugzilla.suse.com/show_bug.cgi?id=1204517 * https://bugzilla.suse.com/show_bug.cgi?id=1204519 * https://bugzilla.suse.com/show_bug.cgi?id=1204541 * https://bugzilla.suse.com/show_bug.cgi?id=1204651 * https://bugzilla.suse.com/show_bug.cgi?id=1204699 * https://bugzilla.suse.com/show_bug.cgi?id=1204712 * https://bugzilla.suse.com/show_bug.cgi?id=1204879 * https://bugzilla.suse.com/show_bug.cgi?id=1205012 * https://bugzilla.suse.com/show_bug.cgi?id=1205040 * https://bugzilla.suse.com/show_bug.cgi?id=1205523 * https://bugzilla.suse.com/show_bug.cgi?id=1205663 * https://bugzilla.suse.com/show_bug.cgi?id=1205759 * https://bugzilla.suse.com/show_bug.cgi?id=1205920 * https://bugzilla.suse.com/show_bug.cgi?id=1205943 * https://bugzilla.suse.com/show_bug.cgi?id=1205976 * https://bugzilla.suse.com/show_bug.cgi?id=1206146 * https://bugzilla.suse.com/show_bug.cgi?id=1206168 * https://bugzilla.suse.com/show_bug.cgi?id=1206249 * https://bugzilla.suse.com/show_bug.cgi?id=1206375 * https://bugzilla.suse.com/show_bug.cgi?id=1206470 * https://bugzilla.suse.com/show_bug.cgi?id=1206613 * https://bugzilla.suse.com/show_bug.cgi?id=1206817 * https://bugzilla.suse.com/show_bug.cgi?id=1206861 * https://bugzilla.suse.com/show_bug.cgi?id=1206932 * https://bugzilla.suse.com/show_bug.cgi?id=1206933 * https://bugzilla.suse.com/show_bug.cgi?id=1206963 * https://bugzilla.suse.com/show_bug.cgi?id=1206979 * https://bugzilla.suse.com/show_bug.cgi?id=1206981 * https://bugzilla.suse.com/show_bug.cgi?id=1207141 * https://bugzilla.suse.com/show_bug.cgi?id=1208306 * https://bugzilla.suse.com/show_bug.cgi?id=1208335 * https://bugzilla.suse.com/show_bug.cgi?id=1208418 * https://bugzilla.suse.com/show_bug.cgi?id=1208499 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:01:39 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:01:39 -0000 Subject: SUSE-SU-2023:0774-1: important: Security update for the Linux Kernel Message-ID: <170903169926.18240.1294141199939799374@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2023:0774-1 Rating: important References: * bsc#1166486 * bsc#1177529 * bsc#1193629 * bsc#1197534 * bsc#1198438 * bsc#1200054 * bsc#1202633 * bsc#1203331 * bsc#1203332 * bsc#1204363 * bsc#1204993 * bsc#1205544 * bsc#1206103 * bsc#1206224 * bsc#1206232 * bsc#1206459 * bsc#1206640 * bsc#1206877 * bsc#1206878 * bsc#1206880 * bsc#1206881 * bsc#1206882 * bsc#1206883 * bsc#1206884 * bsc#1206886 * bsc#1206894 * bsc#1206935 * bsc#1207036 * bsc#1207050 * bsc#1207051 * bsc#1207125 * bsc#1207270 * bsc#1207328 * bsc#1207588 * bsc#1207590 * bsc#1207591 * bsc#1207592 * bsc#1207593 * bsc#1207594 * bsc#1207603 * bsc#1207605 * bsc#1207606 * bsc#1207608 * bsc#1207609 * bsc#1207613 * bsc#1207615 * bsc#1207617 * bsc#1207618 * bsc#1207619 * bsc#1207620 * bsc#1207621 * bsc#1207623 * bsc#1207624 * bsc#1207625 * bsc#1207626 * bsc#1207630 * bsc#1207631 * bsc#1207632 * bsc#1207634 * bsc#1207635 * bsc#1207636 * bsc#1207638 * bsc#1207639 * bsc#1207640 * bsc#1207641 * bsc#1207642 * bsc#1207643 * bsc#1207644 * bsc#1207645 * bsc#1207646 * bsc#1207647 * bsc#1207648 * bsc#1207649 * bsc#1207650 * bsc#1207651 * bsc#1207652 * bsc#1207653 * bsc#1207768 * bsc#1207770 * bsc#1207771 * bsc#1207773 * bsc#1207795 * bsc#1207845 * bsc#1207875 * bsc#1208149 * bsc#1208153 * bsc#1208183 * bsc#1208212 * bsc#1208290 * bsc#1208420 * bsc#1208428 * bsc#1208429 * bsc#1208449 * bsc#1208534 * bsc#1208541 * bsc#1208542 * bsc#1208570 * bsc#1208607 * bsc#1208628 * bsc#1208700 * bsc#1208741 * bsc#1208759 * bsc#1208776 * bsc#1208784 * bsc#1208787 * bsc#1208816 * bsc#1208837 * bsc#1208843 * bsc#1209188 Cross-References: * CVE-2022-3523 * CVE-2022-36280 * CVE-2022-38096 * CVE-2023-0045 * CVE-2023-0122 * CVE-2023-0461 * CVE-2023-0590 * CVE-2023-0597 * CVE-2023-1118 * CVE-2023-22995 * CVE-2023-22998 * CVE-2023-23000 * CVE-2023-23004 * CVE-2023-23454 * CVE-2023-23455 * CVE-2023-23559 * CVE-2023-26545 CVSS scores: * CVE-2022-3523 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3523 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-38096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0045 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0045 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0122 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0122 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0461 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0461 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0590 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0590 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1118 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-22995 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-22995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-22998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22998 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23000 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-23000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23004 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-23004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23454 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23455 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23455 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-26545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-26545 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 17 vulnerabilities and has 92 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 Azure kernel was updated to receive various security and bugfixes. * CVE-2022-3523: Fixed use after free related to device private page handling (bsc#1204363). * CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332). * CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331). * CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773). * CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bsc#1207050). * CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787). * CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795). * CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845). * CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837). * CVE-2023-22995: Fixed lacks of certain platform_device_put and kfree in drivers/usb/dwc3/dwc3-qcom.c (bsc#1208741). * CVE-2023-22998: Fixed misinterpretatino of the irtio_gpu_object_shmem_init() return value (bsc#1208776). * CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function (bsc#1208816). * CVE-2023-23004: Fixed misinterpretatino of the get_sg_table return value in arm/malidp_planes.c (bsc#1208843). * CVE-2023-23454: Fixed a type-confusion in the CBQ network scheduler (bsc#1207036). * CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125). * CVE-2023-23559: Fixed integer overflow in rndis_wlan that leads to a buffer overflow (bsc#1207051). * CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700). The following non-security bugs were fixed: * acpi / x86: Add support for LPS0 callback handler (git-fixes). * acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes). * acpi: PM: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224). * acpi: PM: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224). * acpi: battery: Fix missing NUL-termination with large strings (git-fixes). * acpi: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224). * acpi: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224). * acpi: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224). * acpi: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224). * acpi: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224). * acpi: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224). * acpi: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224). * acpi: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224). * acpi: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224). * acpi: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224). * acpi: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224). * acpica: Drop port I/O validation for some regions (git-fixes). * acpica: nsrepair: handle cases without a return value correctly (git-fixes). * alsa: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes). * alsa: hda/ca0132: minor fix for allocation size (git-fixes). * alsa: hda/conexant: add a new hda codec SN6180 (git-fixes). * alsa: hda/realtek - fixed wrong gpio assigned (git-fixes). * alsa: hda/realtek: Add Positivo N14KP6-TG (git-fixes). * alsa: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes). * alsa: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git- fixes). * alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes). * alsa: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git- fixes). * alsa: hda: Do not unset preset when cleaning up codec (git-fixes). * alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes). * alsa: ice1712: Do not left ice->gpio_mutex locked in aureon_add_controls() (git-fixes). * alsa: pci: lx6464es: fix a debug loop (git-fixes). * applicom: Fix PCI device refcount leak in applicom_init() (git-fixes). * arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git- fixes). * arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes). * arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes). * arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git- fixes). * arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes). * arm64: dts: meson-g12-common: Make mmc host controller interrupts level- sensitive (git-fixes). * arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes). * arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes). * arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git- fixes). * arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes). * arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git- fixes). * arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes). * arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes). * arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes). * arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git- fixes). * arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes). * arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes). * arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes). * arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes). * arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git- fixes). * arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes). * arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git- fixes). * arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git- fixes). * arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes). * arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes). * arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes). * arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes). * arm: bcm2835_defconfig: Enable the framebuffer (git-fixes). * arm: dts: am5748: keep usb4_tm disabled (git-fixes) * arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes). * arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes). * arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes). * arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes). * arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes). * arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes). * arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes). * arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git- fixes). * arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes) * arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes). * arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes) * arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes). * arm: dts: rockchip: add power-domains property to dp node on rk3288 (git- fixes). * arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes). * arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes) * arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes) * arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes). * arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes). * arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes) * arm: omap: remove debug-leds driver (git-fixes) * arm: remove some dead code (git-fixes) * arm: renumber bits related to _TIF_WORK_MASK (git-fixes) * arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes). * arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes) * arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes). * asoc: Intel: boards: fix spelling in comments (git-fixes). * asoc: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes). * asoc: Intel: bytcht_es8316: move comment to the right place (git-fixes). * asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git- fixes). * asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes). * asoc: adau7118: do not disable regulators on device unbind (git-fixes). * asoc: cs42l56: fix DT probe (git-fixes). * asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes). * asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes). * asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes). * asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes). * asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes). * asoc: rsnd: fixup #endif position (git-fixes). * asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes). * asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git- fixes). * asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git- fixes). * asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes). * asoc: topology: Return -ENOMEM on memory allocation failure (git-fixes). * auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git- fixes). * avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529). * backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes). * blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes). * blk-mq: fix possible memleak when register 'hctx' failed (git-fixes). * block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes). * block/bfq-iosched.c: use "false" rather than "BLK_RW_ASYNC" (git-fixes). * block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541). * block: clear ->slave_dir when dropping the main slave_dir reference (git- fixes). * block: do not allow splitting of a REQ_NOWAIT bio (git-fixes). * block: fix and cleanup bio_check_ro (git-fixes). * block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes). * block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes). * bluetooth: L2CAP: Fix potential user-after-free (git-fixes). * bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes). * bpf: Fix a possible task gone issue with bpf_send_signal_thread helpers (git-fixes). * bpf: Skip task with pid=1 in send_signal_common() (git-fixes). * can: j1939: do not wait 250 ms if the same addr was already claimed (git- fixes). * ceph: flush cap releases when the session is flushed (bsc#1208428). * cifs: Check the lease context if we actually got a lease (bsc#1193629). * cifs: Convert struct fealist away from 1-element array (bsc#1193629). * cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes). * cifs: Fix oops due to uncleared server->smbd_conn in reconnect (git-fixes). * cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629). * cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629). * cifs: Fix use-after-free in rdata->read_into_pages() (git-fixes). * cifs: Fix warning and UAF when destroy the MR list (git-fixes). * cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629). * cifs: Replace remaining 1-element arrays (bsc#1193629). * cifs: Replace zero-length arrays with flexible-array members (bsc#1193629). * cifs: Use kstrtobool() instead of strtobool() (bsc#1193629). * cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629). * cifs: do not include page data when checking signature (git-fixes). * cifs: do not take exclusive lock for updating target hints (bsc#1193629). * cifs: do not try to use rdma offload on encrypted connections (bsc#1193629). * cifs: fix mount on old smb servers (boo#1206935). * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1193629). * cifs: get rid of dns resolve worker (bsc#1193629). * cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629). * cifs: handle cache lookup errors different than -ENOENT (bsc#1193629). * cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git- fixes). * cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629). * cifs: match even the scope id for ipv6 addresses (bsc#1193629). * cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629). * cifs: prevent data race in smb2_reconnect() (bsc#1193629). * cifs: print last update time for interface list (bsc#1193629). * cifs: remove duplicate code in __refresh_tcon() (bsc#1193629). * cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629). * cifs: remove unused function (bsc#1193629). * cifs: return a single-use cfid if we did not get a lease (bsc#1193629). * cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629). * cifs: split out smb3_use_rdma_offload() helper (bsc#1193629). * cifs: update ip_addr for ses only for primary chan setup (bsc#1193629). * cifs: use tcon allocation functions even for dummy tcon (git-fixes). * cifs: use the least loaded channel for sending requests (bsc#1193629). * clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes). * clk: imx: avoid memory leak (git-fixes). * clk: mxl: Add option to override gate clks (git-fixes). * clk: mxl: Fix a clk entry by adding relevant flags (git-fixes). * clk: mxl: Remove redundant spinlocks (git-fixes). * clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git- fixes). * clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes). * clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes). * clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git- fixes). * clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes). * clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes). * clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes). * comedi: use menuconfig for main Comedi menu (git-fixes). * crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git- fixes). * crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes). * crypto: crypto4xx - Call dma_unmap_page when done (git-fixes). * crypto: essiv - Handle EBUSY correctly (git-fixes). * crypto: qat - fix out-of-bounds read (git-fixes). * crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes). * crypto: seqiv - Handle EBUSY correctly (git-fixes). * crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes). * crypto: xts - Handle EBUSY correctly (git-fixes). * dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes). * dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes). * dmaengine: dw-edma: Drop chancnt initialization (git-fixes). * dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes). * dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git- fixes). * dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes). * dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes). * dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git- fixes). * docs: ftrace: fix a issue with duplicated subtitle number (git-fixes). * docs: gdbmacros: print newest record (git-fixes). * documentation: simplify and clarify DCO contribution example language (git- fixes). * driver core: fix potential null-ptr-deref in device_add() (git-fixes). * driver core: fix resource leak in device_add() (git-fixes). * driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git- fixes). * drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes). * drivers: base: transport_class: fix possible memory leak (git-fixes). * drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes). * drm/amd/display: Fail atomic_check early on normalize_zpos error (git- fixes). * drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes). * drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes). * drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git- fixes). * drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git- fixes). * drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes). * drm/bridge: lt8912b: Add hot plug detection (git-fixes). * drm/bridge: lt9611: fix HPD reenablement (git-fixes). * drm/bridge: lt9611: fix clock calculation (git-fixes). * drm/bridge: lt9611: fix polarity programming (git-fixes). * drm/bridge: lt9611: fix programming of video modes (git-fixes). * drm/bridge: lt9611: fix sleep mode setup (git-fixes). * drm/bridge: lt9611: pass a pointer to the of node (git-fixes). * drm/bridge: megachips: Fix error handling in i2c_register_driver() (git- fixes). * drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes). * drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes). * drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes). * drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes). * drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git- fixes). * drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes). * drm/i915: Fix VBT DSI DVO port handling (git-fixes). * drm/i915: Initialize the obj flags for shmem objects (git-fixes). * drm/mediatek: Clean dangling pointer on bind error path (git-fixes). * drm/mediatek: Drop unbalanced obj unref (git-fixes). * drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes). * drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git- fixes). * drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes). * drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes). * drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes). * drm/msm/dpu: Add check for cstate (git-fixes). * drm/msm/dpu: Add check for pstates (git-fixes). * drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes). * drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes). * drm/msm/dpu: set pdpu->is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes). * drm/msm/gem: Add check for kmalloc (git-fixes). * drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes). * drm/msm/mdp5: Add check for kzalloc (git-fixes). * drm/msm: clean event_thread->worker in case of an error (git-fixes). * drm/msm: use strscpy instead of strncpy (git-fixes). * drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git- fixes). * drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes). * drm/vc4: hdmi: Correct interlaced timings again (git-fixes). * drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes). * drm/vc4: hvs: Set AXI panic modes (git-fixes). * drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes). * drm/virtio: exbuf->fence_fd unmodified on interrupted wait (git-fixes). * drm/vkms: Fix memory leak in vkms_init() (git-fixes). * drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes). * drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git- fixes). * drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes). * drm: tidss: Fix pixel format definition (git-fixes). * dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes). * dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes). * dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes). * dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git- fixes). * dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git- fixes). * dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes). * dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes). * eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes). * efi: Accept version 2 of memory attributes table (git-fixes). * exit: Add and use make_task_dead (bsc#1207328). * exit: Allow oops_limit to be disabled (bsc#1207328). * exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328). * exit: Move force_uaccess back into do_exit (bsc#1207328). * exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328). * exit: Put an upper limit on how often we can oops (bsc#1207328). * exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328). * exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328). * ext4,f2fs: fix readahead of verity data (bsc#1207648). * ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619). * ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878). * ext4: add helper to check quota inums (bsc#1207618). * ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617). * ext4: add missing validation of fast-commit record lengths (bsc#1207626). * ext4: allocate extended attribute value in vmalloc area (bsc#1207635). * ext4: avoid crash when inline data creation follows DIO write (bsc#1206883). * ext4: avoid resizing to a partial cluster size (bsc#1206880). * ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634). * ext4: continue to expand file system when the target size does not reach (bsc#1206882). * ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592). * ext4: correct max_inline_xattr_value_size computing (bsc#1206878). * ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878). * ext4: disable fast-commit of encrypted dir operations (bsc#1207623). * ext4: do not allow journal inode to have encrypt flag (bsc#1207621). * ext4: do not increase iversion counter for ea_inodes (bsc#1207605). * ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603). * ext4: do not set up encryption key during jbd2 transaction (bsc#1207624). * ext4: drop ineligible txn start stop APIs (bsc#1207588). * ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606). * ext4: factor out ext4_fc_get_tl() (bsc#1207615). * ext4: fast commit may miss file actions (bsc#1207591). * ext4: fast commit may not fallback for ineligible commit (bsc#1207590). * ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886). * ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 (bsc#1206881). * ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620). * ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594). * ext4: fix deadlock due to mbcache entry corruption (bsc#1207653). * ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631). * ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608). * ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630). * ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593). * ext4: fix extent status tree race in writeback error recovery path (bsc#1206877). * ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636). * ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894). * ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625). * ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609). * ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884). * ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628). * ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611). * ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612). * ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616). * ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637). * ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627). * ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890). * ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893). * ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888). * ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622). * ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878). * ext4: fix warning in 'ext4_da_release_space' (bsc#1206887). * ext4: goto right label 'failed_mount3a' (bsc#1207610). * ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629). * ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633). * ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614). * ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602). * ext4: make ext4_lazyinit_thread freezable (bsc#1206885). * ext4: place buffer head allocation before handle start (bsc#1207607). * ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889). * ext4: simplify updating of fast commit stats (bsc#1207589). * ext4: update 'state->fc_regions_size' after successful memory allocation (bsc#1207613). * ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876). * fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes). * firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes). * firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git- fixes). * firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes). * fix page corruption caused by racy check in __free_pages (bsc#1208149). * fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632). * fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429). * fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759). * genirq: Provide new interfaces for affinity hints (bsc#1208153). * gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes). * gpio: vf610: connect GPIO label to dev name (git-fixes). * gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes). * gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes). * hid: asus: use spinlock to protect concurrent accesses (git-fixes). * hid: asus: use spinlock to safely schedule workers (git-fixes). * hid: bigben: use spinlock to protect concurrent accesses (git-fixes). * hid: bigben: use spinlock to safely schedule workers (git-fixes). * hid: bigben_probe(): validate report count (git-fixes). * hid: bigben_worker() remove unneeded check on report_field (git-fixes). * hid: core: Fix deadloop in hid_apply_multiplier (git-fixes). * hid: elecom: add support for TrackBall 056E:011C (git-fixes). * hv: fix comment typo in vmbus_channel/low_latency (git-fixes). * hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes). * hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes). * hwmon: (ftsteutates) Fix scaling of measurements (git-fixes). * hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes). * hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes). * i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes). * i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes). * i2c: mxs: suppress probe-deferral error message (git-fixes). * i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes). * ib/hfi1: Restore allocated resources on failed copyout (git-fixes) * ib/ipoib: Fix legacy IPoIB due to wrong number of queues (git-fixes) * iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes). * infiniband: READ is "data destination", not source... (git-fixes) * input: ads7846 - always set last command to PWRDOWN (git-fixes). * input: ads7846 - do not check penirq immediately for 7845 (git-fixes). * input: ads7846 - do not report pressure for ads7845 (git-fixes). * input: iqs269a - configure device with a single block write (git-fixes). * input: iqs269a - drop unused device node references (git-fixes). * input: iqs269a - increase interrupt handler return delay (git-fixes). * input: iqs626a - drop unused device node references (git-fixes). * iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes). * ipmi:ssif: Add a timer between request retries (bsc#1206459). * ipmi:ssif: Remove rtc_us_timer (bsc#1206459). * ipmi:ssif: resend_msg() cannot fail (bsc#1206459). * ipmi_ssif: Rename idle state and check (bsc#1206459). * irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes) * jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590). * jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646). * jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641). * jbd2: fix potential buffer head reference count leak (bsc#1207644). * jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645). * jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643). * kabi FIX FOR: NFS: Further optimisations for 'ls -l' (git-fixes). * kabi FIX FOR: NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes). * kabi FIX FOR: nfsv4.1 query for fs_location attr on a new file system (Never, kabi). * kabi fix for: nfsv3: handle out-of-order write replies (bsc#1205544). * kasan: no need to unset panic_on_warn in end_report() (bsc#1207328). * leds: led-class: Add missing put_device() to led_put() (git-fixes). * leds: led-core: Fix refcount leak in of_led_get() (git-fixes). * lib/mpi: Fix buffer overrun when SG is too long (git-fixes). * lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git- fixes). * locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270). * locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270). * locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270). * locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270). * locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270). * locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270). * locking/rwsem: Make handoff bit handling more consistent (bsc#1207270). * locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270). * locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270). * locking: Add missing __sched attributes (bsc#1207270). * mbcache: Avoid nesting of cache->c_list_lock under bit locks (bsc#1207647). * mbcache: Fixup kABI of mb_cache_entry (bsc#1207653). * md/bitmap: Fix bitmap chunk size overflow issues (git-fixes). * md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes). * md: fix a crash in mempool_free (git-fixes). * media: coda: Add check for dcoda_iram_alloc (git-fixes). * media: coda: Add check for kmalloc (git-fixes). * media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes). * media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes). * media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes). * media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes). * media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes). * media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes). * media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes). * media: platform: ti: Add missing check for devm_regulator_get (git-fixes). * media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes). * media: saa7134: Use video_unregister_device for radio_dev (git-fixes). * media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes). * media: usb: siano: Fix use after free bugs caused by do_submit_urb (git- fixes). * media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes). * media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git- fixes). * media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes). * mfd: cs5535: Do not build on UML (git-fixes). * mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git- fixes). * misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes). * misc: enclosure: Fix doc for enclosure_find() (git-fixes). * mmc: jz4740: Work around bug on JZ4760(B) (git-fixes). * mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes). * mmc: sdio: fix possible resource leaks in some error paths (git-fixes). * move upstreamed i915 and media fixes into sorted section * mtd: dataflash: remove duplicate SPI ID table (git-fixes). * mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes). * mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes). * mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes). * mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes). * mtd: spi-nor: core: fix implicit declaration warning (git-fixes). * mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes). * mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes). * net/rose: Fix to not accept on connected socket (git-fixes). * net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git- fixes). * net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes). * net/x25: Fix to not accept on connected socket (git-fixes). * net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes). * net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153). * net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875). * net: mana: Fix accessing freed irq affinity_hint (bsc#1208153). * net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git- fixes). * net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git- fixes). * nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes). * nfs: Always initialise fattr->label in nfs_fattr_alloc() (git-fixes). * nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes). * nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git- fixes). * nfs: Further optimisations for 'ls -l' (git-fixes). * nfs: nfs4clinet: check the return value of kstrdup() (git-fixes). * nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes). * nfsd: De-duplicate net_generic(nf->nf_net, nfsd_net_id) (git-fixes). * nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes). * nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git- fixes). * nfsv3: handle out-of-order write replies (bsc#1205544). * nfsv4 expose nfs_parse_server_name function (git-fixes). * nfsv4 handle port presence in fs_location server string (git-fixes). * nfsv4 only print the label when its queried (git-fixes). * nfsv4 remove zero number of fs_locations entries error check (git-fixes). * nfsv4 store server support for fs_location attribute (git-fixes). * nfsv4.1 query for fs_location attr on a new file system (git-fixes). * nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes). * nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes). * nfsv4: Protect the state recovery thread against direct reclaim (git-fixes). * nvdimm: disable namespace on error (bsc#1166486). * nvme-auth: check chap ctrl_key once constructed (bsc#1202633). * nvme-auth: clear sensitive info right after authentication completes (bsc#1202633). * nvme-auth: convert dhchap_auth_list to an array (bsc#1202633). * nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633). * nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633). * nvme-auth: do not override ctrl keys before validation (bsc#1202633). * nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633). * nvme-auth: do not use NVMe status codes (bsc#1202633). * nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633). * nvme-auth: fix smatch warning complaints (bsc#1202633). * nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633). * nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633). * nvme-auth: mark nvme_auth_wq static (bsc#1202633). * nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633). * nvme-auth: remove redundant auth_work flush (bsc#1202633). * nvme-auth: remove redundant buffer deallocations (bsc#1202633). * nvme-auth: remove redundant deallocations (bsc#1202633). * nvme-auth: remove redundant if statement (bsc#1202633). * nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633). * nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633). * nvme-auth: rename authentication work elements (bsc#1202633). * nvme-auth: use workqueue dedicated to authentication (bsc#1202633). * nvme-fabrics: show well known discovery name (bsc#1200054). * objtool: Add a missing comma to avoid string concatenation (bsc#1207328). * ocfs2: Fix data corruption after failed write (bsc#1208542). * ocfs2: clear dinode links count in case of error (bsc#1207650). * ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649). * ocfs2: fix crash when mount with quota enabled (bsc#1207640). * ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652). * ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651). * ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770). * ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768). * ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771). * of/address: Return an error when no valid dma-ranges are found (git-fixes). * panic: Consolidate open-coded panic_on_warn checks (bsc#1207328). * panic: Introduce warn_limit (bsc#1207328). * panic: unset panic_on_warn inside panic() (bsc#1207328). * pci/ioc: Enlarge virtfn sysfs name buffer (git-fixes). * pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes). * pci: Fix dropping valid root bus resources with .end = zero (git-fixes). * pci: hotplug: Allow marking devices as disconnected during bind/unbind (git- fixes). * pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes). * phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes). * pinctrl: aspeed: Fix confusing types in return value (git-fixes). * pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git- fixes). * pinctrl: mediatek: Fix the drive register definition of some Pins (git- fixes). * pinctrl: mediatek: Initialize variable *buf to zero (git-fixes). * pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git- fixes). * pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git- fixes). * pinctrl: single: fix potential NULL dereference (git-fixes). * pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes). * platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420). * platform/x86: amd-pmc: Correct usage of SMU version (git-fixes). * platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes). * platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git- fixes). * platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git- fixes). * platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes). * platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes). * powercap: fix possible name leak in powercap_register_zone() (git-fixes). * powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612). * printf: fix errname.c list (git-fixes). * quota: Check next/prev free block number after reading from quota file (bsc#1206640). * quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639). * rdma/irdma: Fix potential NULL-ptr-dereference (git-fixes) * rdma/usnic: use iommu_map_atomic() under spin_lock() (git-fixes) * remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes). * remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes). * revert "char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol" (git-fixes). * revert "crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete" (git-fixes). * revert "hid: logitech-hidpp: add a module parameter to keep firmware gestures" (git-fixes). * revert "usb: dwc3: qcom: Keep power domain on to retain controller status" (git-fixes). * rtc: allow rtc_read_alarm without read_alarm callback (git-fixes). * rtc: pm8xxx: fix set-alarm race (git-fixes). * rtc: sun6i: Always export the internal oscillator (git-fixes). * s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes). * scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607). * scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607). * scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607). * scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607). * scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607). * scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607). * scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534). * scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607). * scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607). * scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607). * scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607). * scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607). * scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103). * scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570). * scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570). * scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570). * scsi: qla2xxx: Fix erroneous link down (bsc#1208570). * scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570). * scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570). * scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570). * scsi: qla2xxx: Fix printk() format string (bsc#1208570). * scsi: qla2xxx: Fix stalled login (bsc#1208570). * scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570). * scsi: qla2xxx: Relocate/rename vp map (bsc#1208570). * scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570). * scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570). * scsi: qla2xxx: Remove dead code (bsc#1208570). * scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570). * scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570). * scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570). * scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570). * scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570). * scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570). * scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570). * scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570). * scsi: qla2xxx: edif: Fix clang warning (bsc#1208570). * scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570). * scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570). * scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570). * sefltests: netdevsim: wait for devlink instance after netns removal (git- fixes). * selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git- fixes). * selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103). * selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103). * selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232). * selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232). * selftests/powerpc: Move perror closer to its use (bsc#1206232). * selftests: forwarding: lib: quote the sysctl values (git-fixes). * selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes). * selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes). * selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes). * selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes). * serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes). * serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes). * signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes). * smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629). * soundwire: cadence: Do not overflow the command FIFOs (git-fixes). * spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes). * spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes). * spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git- fixes). * spi: tegra210-quad: Fix validate combined sequence (git-fixes). * staging: mt7621-dts: change palmbus address to lower case (git-fixes). * struct uvc_device move flush_status new member to end (git-fixes). * sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git- fixes). * sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git- fixes). * sunrpc: Fix socket waits for write buffer space (git-fixes). * sysctl: add a new register_sysctl_init() interface (bsc#1207328). * thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes). * thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes). * thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes). * thermal/drivers/tsens: fix slope values for msm8939 (git-fixes). * thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes). * thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git- fixes). * thermal: intel: powerclamp: Fix cur_state for multi package system (git- fixes). * thermal: intel: quark_dts: fix error pointer dereference (git-fixes). * trace_events_hist: add check for return value of 'create_hist_field' (git- fixes). * tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes). * tracing: Make sure trace_printk() can output as soon as it can be used (git- fixes). * tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git- fixes). * tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes). * tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git- fixes). * tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git- fixes). * ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328). * update internal module version number for cifs.ko (bsc#1193629). * update patches.suse/0001-exit-Put-an-upper-limit-on-how-often-we-can- oops.patch (bsc#1207328, bsc#1208290). * usb: core: Do not hold device lock while reading the "descriptors" sysfs file (git-fixes). * usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes). * usb: dwc3: core: Host wake up support from system suspend (git-fixes). * usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes). * usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes). * usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes). * usb: dwc3: qcom: Keep power domain on to retain controller status (git- fixes). * usb: dwc3: qcom: clean up icc init (git-fixes). * usb: dwc3: qcom: clean up suspend callbacks (git-fixes). * usb: dwc3: qcom: fix gadget-only builds (git-fixes). * usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes). * usb: dwc3: qcom: fix wakeup implementation (git-fixes). * usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes). * usb: dwc3: qcom: suppress unused-variable warning (git-fixes). * usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git- fixes). * usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes). * usb: gadget: f_hid: fix refcount leak on error path (git-fixes). * usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes). * usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes). * usb: max-3421: Fix setting of I/O pins (git-fixes). * usb: musb: Add and use inline function musb_otg_state_string (git-fixes). * usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes). * usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes). * usb: musb: remove schedule work called after flush (git-fixes). * usb: serial: option: add support for VW/Skoda "Carstick LTE" (git-fixes). * usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes). * vc_screen: do not clobber return value in vcs_read (git-fixes). * vc_screen: modify vcs_size() handling in vcs_read() (git-fixes). * vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes). * vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642). * vfs: filename_create(): fix incorrect intent (bsc#1197534). * virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449). * virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449). * virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449). * virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449). * virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449). * virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449). * vmci: check context->notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes). * vmxnet3: move rss code block under eop descriptor (bsc#1208212). * watchdog/hpwdt: Enable HP_WATCHDOG for ARM64 systems. (jsc#PED-3210) Also enable module in aarch64 default configuration. * watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes). * watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes). * watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git- fixes). * watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes). * wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes). * wifi: ath11k: allow system suspend to survive ath11k (git-fixes). * wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes). * wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes). * wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git- fixes). * wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes). * wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes). * wifi: cfg80211: Fix use after free for wext (git-fixes). * wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes). * wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git- fixes). * wifi: iwl3945: Add missing check for create_singlethread_workqueue (git- fixes). * wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git- fixes). * wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes). * wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git- fixes). * wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes). * wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes). * wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git- fixes). * wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes). * wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes). * wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes). * wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git- fixes). * wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes). * wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: rtw89: Add missing check for alloc_workqueue (git-fixes). * wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes). * wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git- fixes). * writeback: avoid use-after-free after removing device (bsc#1207638). * x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes). * x86/asm: Fix an assembler warning with current binutils (git-fixes). * x86/boot: Avoid using Intel mnemonics in AT&T syntax asm (git-fixes). * x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes). * x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git- fixes). * x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git- fixes). * x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes). * x86/microcode/intel: Do not retry microcode reloading on the APs (git- fixes). * x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes). * x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes). * x86: acpi: cstate: Optimize C3 entry on AMD CPUs (git-fixes). * xen-netfront: Fix NULL sring after live migration (git-fixes). * xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes). * xen/arm: Fix race in RB-tree based P2M accounting (git-fixes) * xen/netback: do some code cleanup (git-fixes). * xen/netback: fix build warning (git-fixes). * xen/netfront: destroy queues before real_num_tx_queues is zeroed (git- fixes). * xen/platform-pci: add missing free_irq() in error path (git-fixes). * xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git- fixes). * xen: fix "direction" argument of iov_iter_kvec() (git-fixes). * xfs: estimate post-merge refcounts correctly (bsc#1208183). * xfs: hoist refcount record merge predicates (bsc#1208183). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-774=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-774=1 ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64) * ocfs2-kmp-azure-debuginfo-5.14.21-150400.14.37.1 * cluster-md-kmp-azure-5.14.21-150400.14.37.1 * kernel-azure-extra-5.14.21-150400.14.37.1 * kernel-syms-azure-5.14.21-150400.14.37.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150400.14.37.1 * kselftests-kmp-azure-debuginfo-5.14.21-150400.14.37.1 * gfs2-kmp-azure-debuginfo-5.14.21-150400.14.37.1 * kernel-azure-debuginfo-5.14.21-150400.14.37.1 * gfs2-kmp-azure-5.14.21-150400.14.37.1 * kernel-azure-extra-debuginfo-5.14.21-150400.14.37.1 * dlm-kmp-azure-5.14.21-150400.14.37.1 * ocfs2-kmp-azure-5.14.21-150400.14.37.1 * dlm-kmp-azure-debuginfo-5.14.21-150400.14.37.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150400.14.37.1 * kselftests-kmp-azure-5.14.21-150400.14.37.1 * kernel-azure-optional-5.14.21-150400.14.37.1 * kernel-azure-optional-debuginfo-5.14.21-150400.14.37.1 * kernel-azure-devel-5.14.21-150400.14.37.1 * kernel-azure-debugsource-5.14.21-150400.14.37.1 * kernel-azure-livepatch-devel-5.14.21-150400.14.37.1 * kernel-azure-devel-debuginfo-5.14.21-150400.14.37.1 * reiserfs-kmp-azure-5.14.21-150400.14.37.1 * openSUSE Leap 15.4 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150400.14.37.1 * openSUSE Leap 15.4 (noarch) * kernel-source-azure-5.14.21-150400.14.37.1 * kernel-devel-azure-5.14.21-150400.14.37.1 * Public Cloud Module 15-SP4 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150400.14.37.1 * Public Cloud Module 15-SP4 (aarch64 x86_64) * kernel-azure-devel-5.14.21-150400.14.37.1 * kernel-azure-debugsource-5.14.21-150400.14.37.1 * kernel-azure-debuginfo-5.14.21-150400.14.37.1 * kernel-azure-devel-debuginfo-5.14.21-150400.14.37.1 * kernel-syms-azure-5.14.21-150400.14.37.1 * Public Cloud Module 15-SP4 (noarch) * kernel-source-azure-5.14.21-150400.14.37.1 * kernel-devel-azure-5.14.21-150400.14.37.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3523.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-38096.html * https://www.suse.com/security/cve/CVE-2023-0045.html * https://www.suse.com/security/cve/CVE-2023-0122.html * https://www.suse.com/security/cve/CVE-2023-0461.html * https://www.suse.com/security/cve/CVE-2023-0590.html * https://www.suse.com/security/cve/CVE-2023-0597.html * https://www.suse.com/security/cve/CVE-2023-1118.html * https://www.suse.com/security/cve/CVE-2023-22995.html * https://www.suse.com/security/cve/CVE-2023-22998.html * https://www.suse.com/security/cve/CVE-2023-23000.html * https://www.suse.com/security/cve/CVE-2023-23004.html * https://www.suse.com/security/cve/CVE-2023-23454.html * https://www.suse.com/security/cve/CVE-2023-23455.html * https://www.suse.com/security/cve/CVE-2023-23559.html * https://www.suse.com/security/cve/CVE-2023-26545.html * https://bugzilla.suse.com/show_bug.cgi?id=1166486 * https://bugzilla.suse.com/show_bug.cgi?id=1177529 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1197534 * https://bugzilla.suse.com/show_bug.cgi?id=1198438 * https://bugzilla.suse.com/show_bug.cgi?id=1200054 * https://bugzilla.suse.com/show_bug.cgi?id=1202633 * https://bugzilla.suse.com/show_bug.cgi?id=1203331 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1204363 * https://bugzilla.suse.com/show_bug.cgi?id=1204993 * https://bugzilla.suse.com/show_bug.cgi?id=1205544 * https://bugzilla.suse.com/show_bug.cgi?id=1206103 * https://bugzilla.suse.com/show_bug.cgi?id=1206224 * https://bugzilla.suse.com/show_bug.cgi?id=1206232 * https://bugzilla.suse.com/show_bug.cgi?id=1206459 * https://bugzilla.suse.com/show_bug.cgi?id=1206640 * https://bugzilla.suse.com/show_bug.cgi?id=1206877 * https://bugzilla.suse.com/show_bug.cgi?id=1206878 * https://bugzilla.suse.com/show_bug.cgi?id=1206880 * https://bugzilla.suse.com/show_bug.cgi?id=1206881 * https://bugzilla.suse.com/show_bug.cgi?id=1206882 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206894 * https://bugzilla.suse.com/show_bug.cgi?id=1206935 * https://bugzilla.suse.com/show_bug.cgi?id=1207036 * https://bugzilla.suse.com/show_bug.cgi?id=1207050 * https://bugzilla.suse.com/show_bug.cgi?id=1207051 * https://bugzilla.suse.com/show_bug.cgi?id=1207125 * https://bugzilla.suse.com/show_bug.cgi?id=1207270 * https://bugzilla.suse.com/show_bug.cgi?id=1207328 * https://bugzilla.suse.com/show_bug.cgi?id=1207588 * https://bugzilla.suse.com/show_bug.cgi?id=1207590 * https://bugzilla.suse.com/show_bug.cgi?id=1207591 * https://bugzilla.suse.com/show_bug.cgi?id=1207592 * https://bugzilla.suse.com/show_bug.cgi?id=1207593 * https://bugzilla.suse.com/show_bug.cgi?id=1207594 * https://bugzilla.suse.com/show_bug.cgi?id=1207603 * https://bugzilla.suse.com/show_bug.cgi?id=1207605 * https://bugzilla.suse.com/show_bug.cgi?id=1207606 * https://bugzilla.suse.com/show_bug.cgi?id=1207608 * https://bugzilla.suse.com/show_bug.cgi?id=1207609 * https://bugzilla.suse.com/show_bug.cgi?id=1207613 * https://bugzilla.suse.com/show_bug.cgi?id=1207615 * https://bugzilla.suse.com/show_bug.cgi?id=1207617 * https://bugzilla.suse.com/show_bug.cgi?id=1207618 * https://bugzilla.suse.com/show_bug.cgi?id=1207619 * https://bugzilla.suse.com/show_bug.cgi?id=1207620 * https://bugzilla.suse.com/show_bug.cgi?id=1207621 * https://bugzilla.suse.com/show_bug.cgi?id=1207623 * https://bugzilla.suse.com/show_bug.cgi?id=1207624 * https://bugzilla.suse.com/show_bug.cgi?id=1207625 * https://bugzilla.suse.com/show_bug.cgi?id=1207626 * https://bugzilla.suse.com/show_bug.cgi?id=1207630 * https://bugzilla.suse.com/show_bug.cgi?id=1207631 * https://bugzilla.suse.com/show_bug.cgi?id=1207632 * https://bugzilla.suse.com/show_bug.cgi?id=1207634 * https://bugzilla.suse.com/show_bug.cgi?id=1207635 * https://bugzilla.suse.com/show_bug.cgi?id=1207636 * https://bugzilla.suse.com/show_bug.cgi?id=1207638 * https://bugzilla.suse.com/show_bug.cgi?id=1207639 * https://bugzilla.suse.com/show_bug.cgi?id=1207640 * https://bugzilla.suse.com/show_bug.cgi?id=1207641 * https://bugzilla.suse.com/show_bug.cgi?id=1207642 * https://bugzilla.suse.com/show_bug.cgi?id=1207643 * https://bugzilla.suse.com/show_bug.cgi?id=1207644 * https://bugzilla.suse.com/show_bug.cgi?id=1207645 * https://bugzilla.suse.com/show_bug.cgi?id=1207646 * https://bugzilla.suse.com/show_bug.cgi?id=1207647 * https://bugzilla.suse.com/show_bug.cgi?id=1207648 * https://bugzilla.suse.com/show_bug.cgi?id=1207649 * https://bugzilla.suse.com/show_bug.cgi?id=1207650 * https://bugzilla.suse.com/show_bug.cgi?id=1207651 * https://bugzilla.suse.com/show_bug.cgi?id=1207652 * https://bugzilla.suse.com/show_bug.cgi?id=1207653 * https://bugzilla.suse.com/show_bug.cgi?id=1207768 * https://bugzilla.suse.com/show_bug.cgi?id=1207770 * https://bugzilla.suse.com/show_bug.cgi?id=1207771 * https://bugzilla.suse.com/show_bug.cgi?id=1207773 * https://bugzilla.suse.com/show_bug.cgi?id=1207795 * https://bugzilla.suse.com/show_bug.cgi?id=1207845 * https://bugzilla.suse.com/show_bug.cgi?id=1207875 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1208153 * https://bugzilla.suse.com/show_bug.cgi?id=1208183 * https://bugzilla.suse.com/show_bug.cgi?id=1208212 * https://bugzilla.suse.com/show_bug.cgi?id=1208290 * https://bugzilla.suse.com/show_bug.cgi?id=1208420 * https://bugzilla.suse.com/show_bug.cgi?id=1208428 * https://bugzilla.suse.com/show_bug.cgi?id=1208429 * https://bugzilla.suse.com/show_bug.cgi?id=1208449 * https://bugzilla.suse.com/show_bug.cgi?id=1208534 * https://bugzilla.suse.com/show_bug.cgi?id=1208541 * https://bugzilla.suse.com/show_bug.cgi?id=1208542 * https://bugzilla.suse.com/show_bug.cgi?id=1208570 * https://bugzilla.suse.com/show_bug.cgi?id=1208607 * https://bugzilla.suse.com/show_bug.cgi?id=1208628 * https://bugzilla.suse.com/show_bug.cgi?id=1208700 * https://bugzilla.suse.com/show_bug.cgi?id=1208741 * https://bugzilla.suse.com/show_bug.cgi?id=1208759 * https://bugzilla.suse.com/show_bug.cgi?id=1208776 * https://bugzilla.suse.com/show_bug.cgi?id=1208784 * https://bugzilla.suse.com/show_bug.cgi?id=1208787 * https://bugzilla.suse.com/show_bug.cgi?id=1208816 * https://bugzilla.suse.com/show_bug.cgi?id=1208837 * https://bugzilla.suse.com/show_bug.cgi?id=1208843 * https://bugzilla.suse.com/show_bug.cgi?id=1209188 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:07:11 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:07:11 -0000 Subject: SUSE-SU-2023:1830-1: moderate: Security update for SUSE Manager 4.3: Server security fixes Message-ID: <170903203156.18769.17849512084126204256@smelt2.prg2.suse.org> # Security update for SUSE Manager 4.3: Server security fixes Announcement ID: SUSE-SU-2023:1830-1 Rating: moderate References: * bsc#1209386 * bsc#1209395 * bsc#1209689 * bsc#1209703 Affected Products: * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has four security fixes can now be installed. ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: spacewalk-java: * Version 4.3.52-1 * Add more restricted arguments to prevent HTTP API logging sensitive data (bsc#1209386, bsc#1209395) spacewalk-web: * Version 4.3.29-1 * Fix datepicker appearing behind modal edge (bsc#1209703) * Fix datepicker layout shift on Highstate pages How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: spacewalk-web: * Version 4.3.29-1 * Fix datepicker appearing behind modal edge (bsc#1209703) * Fix datepicker layout shift on Highstate pages How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-1830=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-1830=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * spacewalk-base-minimal-config-4.3.29-150400.3.18.1 * spacewalk-base-minimal-4.3.29-150400.3.18.1 * SUSE Manager Server 4.3 Module 4.3 (noarch) * spacewalk-java-postgresql-4.3.52-150400.3.41.3 * spacewalk-base-4.3.29-150400.3.18.1 * spacewalk-java-config-4.3.52-150400.3.41.3 * spacewalk-java-lib-4.3.52-150400.3.41.3 * spacewalk-base-minimal-4.3.29-150400.3.18.1 * spacewalk-taskomatic-4.3.52-150400.3.41.3 * spacewalk-base-minimal-config-4.3.29-150400.3.18.1 * spacewalk-html-4.3.29-150400.3.18.1 * spacewalk-java-4.3.52-150400.3.41.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209386 * https://bugzilla.suse.com/show_bug.cgi?id=1209395 * https://bugzilla.suse.com/show_bug.cgi?id=1209689 * https://bugzilla.suse.com/show_bug.cgi?id=1209703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:10:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:10:14 -0000 Subject: SUSE-SU-2023:1831-1: important: Maintenance update for SUSE Manager 4.2: Server, Proxy and Retail Branch Server Message-ID: <170903221491.19149.14707071405018706247@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.2: Server, Proxy and Retail Branch Server Announcement ID: SUSE-SU-2023:1831-1 Rating: important References: * bsc#1179926 * bsc#1197027 * bsc#1206562 * bsc#1206973 * bsc#1207063 * bsc#1207308 * bsc#1207352 * bsc#1207490 * bsc#1207799 * bsc#1207829 * bsc#1207830 * bsc#1207838 * bsc#1207883 * bsc#1208288 * bsc#1208321 * bsc#1208325 * bsc#1208586 * bsc#1208687 * bsc#1208719 * bsc#1208772 * bsc#1208908 * bsc#1209369 * bsc#1209386 * bsc#1209434 * bsc#1209703 * jsc#PED-2777 Cross-References: * CVE-2020-8908 * CVE-2022-0860 * CVE-2023-22644 CVSS scores: * CVE-2020-8908 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2020-8908 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-0860 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2022-0860 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2023-22644 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * Development Tools Module 15-SP4 * openSUSE Leap 15.4 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.2 Module 4.2 * SUSE Manager Server 4.3 An update that solves three vulnerabilities, contains one feature and has 22 security fixes can now be installed. ## Security update for SUSE Manager Server 4.2 ### Description: This update fixes the following issues: cobbler: * CVE-2022-0860: Unbreak PAM authentication due to missing encode of user input in the PAM auth module of Cobbler (bsc#1197027) * Fix S390X auto-installation for cases where kernel options are longer than 79 characters (bsc#1207308) * Switch packaging from patch based to Git tree based development * All patches that are being removed in this revision are contained in the new Git tree. guava: * Upgrade to guava 30.1.1 * CVE-2020-8908: temp directory creation vulnerability in Guava versions prior to 30.0. (bsc#1179926) * Remove parent reference from ALL distributed pom files * Avoid version-less dependencies that can cause problems with some tools * Build the package with ant in order to prevent build cycles using a generated and customized ant build system * Produce with Java >= 9 binaries that are compatible with Java 8 jsr-305: * Deliver jsr-305 to SUSE Manager as Guava dependency mgr-libmod: * Version 4.2.8-1 * Ignore extra metadata fields for Liberty Linux (bsc#1208908) spacecmd: * Version 4.2.22-1 * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) * Fix spacecmd not showing any output for softwarechannel_diff and softwarechannel_errata_diff (bsc#1207352) spacewalk-backend: * Version 4.2.27-1 * Fix the mgr-inter-sync not creating valid repository metadata when dealing with empty channels (bsc#1207829) * Fix repo sync for cloud "Pay As You Go" connected repositories (bsc#1208772) * Fix issues with kickstart syncing on mirrorlist repositories * Do not sync .mirrorlist and other non needed files * reposync: catch local file not found urlgrabber error properly (bsc#1208288) spacewalk-client-tools: * Version 4.2.23-1 * Update translation strings spacewalk-java: * Version 4.2.49-1 * Refactor Java notification synchronize to avoid deadlocks (bsc#1209369) * Version 4.2.48-1 * Prevent logging formula data (bsc#1209386) * Use gnu-jaf instead of jaf * Use reload4j instead of log4j or log4j12 * Use slf4j-reload4j * Save scheduler user when creating Patch actions manually (bsc#1208321) * Add `mgr_server_is_uyuni` minion pillar item * Do not execute immediately Package Refresh action for the SSH minion (bsc#1208325) * Mark as failed actions that cannot be scheduled because earliest date is too old * Update earliest date when rescheduling failed actions (bsc#1206562) * Fix reconnection of postgres event stream * fix NumberFormatException when syncing Ubuntu errata (bsc#1207883) * Fix duplicate keys in image tables (bsc#1207799) * Fix CLM environments UI for environment labels containing dots (bsc#1207838) spacewalk-search: * Version 4.2.10-1 * Use reload4j instead of log4j or log4j12 spacewalk-web: * Version 4.2.34-1 * Fix datetime picker appearing behind modal edge (bsc#1209703) * Version 4.2.33-1 * Deprecate jQuery datepicker, integrate React datepicker * Fix CLM environments UI for environment labels containing dots (bsc#1207838) subscription-matcher: * Relax antlr version requirement supportutils-plugin-susemanager: * Version 4.2.6-1 * Fix DB connection check tool (bsc#1208586) susemanager-build-keys: * Version 15.3.7 (jsc#PED-2777): * Add new 4096 bit RSA build key gpg-pubkey-3fa1d6ce-63c9481c.asc * add new 4096 bit RSA reserve build key gpg-pubkey-d588dc46-63c939db.asc * Add 2022 2048 bit RSA PTF key suse_ptf_key-6F5DA62B.asc * Add new 4096 bit RSA PTF key suse_ptf_key_2023.asc susemanager-doc-indexes: * Removed z196 and z114 from listing in System Z chapter of the Installation and Upgrade Guide (bsc#1206973) * Branding updated for 2023 * New search engine optimization improvements for documentation * Translations are now included in the webui help documentation * Local search is now provided with the webui help documentation susemanager-docs_en: * Removed z196 and z114 from listing in System Z chapter of the Installation and Upgrade Guide (bsc#1206973) * Branding updated for 2023 * New search engine optimization improvements for documentation * Translations are now included in the WebUI help documentation * Local search is now provided with the WebUI help documentation susemanager-sls: * Version 4.2.32-1 * Improve error handling in mgr_events.py (bsc#1208687) susemanager-tftpsync: * Version 4.2.4-1 * Fix removal of proxies section in cobbler settings (bsc#1207063) uyuni-common-libs: * Version 4.2.10-1 * Allow default component for context manager. virtual-host-gatherer: * Version 1.0.25-1 * Report total CPU numbers in the libvirt module How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.2 ### Description: This update fixes the following issues: mgr-daemon: * Version 4.2.11-1 * Update translation strings spacecmd: * Version 4.2.22-1 * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) * Fix spacecmd not showing any output for softwarechannel_diff and softwarechannel_errata_diff (bsc#1207352) spacewalk-backend: * Version 4.2.27-1 * Fix the mgr-inter-sync not creating valid repository metadata when dealing with empty channels (bsc#1207829) * fix repo sync for cloud payg connected repositories (bsc#1208772) * Fix issues with kickstart syncing on mirrorlist repositories * Do not sync .mirrorlist and other non needed files * reposync: catch local file not found urlgrabber error properly (bsc#1208288) spacewalk-client-tools: * Version 4.2.23-1 * Update translation strings spacewalk-proxy: * Version 4.2.14-1 * Avoid unnecessary debug messages from proxy backend (bsc#1207490) spacewalk-web: * Version 4.2.34-1 * Fix datetime picker appearing behind modal edge (bsc#1209703) * Version 4.2.33-1 * Deprecate jQuery datepicker, integrate React datepicker * Fix CLM environments UI for environment labels containing dots (bsc#1207838) susemanager-build-keys: * Version 15.3.7 (jsc#PED-2777): * Add new 4096 bit RSA build key gpg-pubkey-3fa1d6ce-63c9481c.asc * Add new 4096 bit RSA reserve build key gpg-pubkey-d588dc46-63c939db.asc * Add 2022 2048 bit RSA PTF key suse_ptf_key-6F5DA62B.asc * Add new 4096 bit RSA PTF key suse_ptf_key_2023.asc uyuni-common-libs: * Version 4.2.10-1 * Allow default component for context manager. How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Recommended update for jsr-305 ### Description: This update for jsr-305 provides the following fix: - Ship the correct versions of jsr-305 on SUSE Manager repositories (no source changes). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-1831=1 * SUSE Manager Server 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-1831=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-1831=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-1831=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-1831=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-1831=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-1831=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-1831=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-1831=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-1831=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-1831=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-1831=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-1831=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-1831=1 ## Package List: * SUSE Manager Proxy 4.2 Module 4.2 (noarch) * spacewalk-proxy-salt-4.2.14-150300.3.27.6 * python3-spacewalk-client-tools-4.2.23-150300.4.33.7 * spacewalk-client-setup-4.2.23-150300.4.33.7 * spacewalk-base-minimal-4.2.34-150300.3.41.5 * python3-spacewalk-client-setup-4.2.23-150300.4.33.7 * susemanager-build-keys-15.3.6-150300.3.9.5 * spacewalk-client-tools-4.2.23-150300.4.33.7 * spacewalk-proxy-management-4.2.14-150300.3.27.6 * spacecmd-4.2.22-150300.4.36.7 * mgr-daemon-4.2.11-150300.2.12.5 * spacewalk-proxy-redirect-4.2.14-150300.3.27.6 * spacewalk-check-4.2.23-150300.4.33.7 * spacewalk-base-minimal-config-4.2.34-150300.3.41.5 * spacewalk-proxy-package-manager-4.2.14-150300.3.27.6 * susemanager-build-keys-web-15.3.6-150300.3.9.5 * spacewalk-proxy-common-4.2.14-150300.3.27.6 * python3-spacewalk-check-4.2.23-150300.4.33.7 * spacewalk-proxy-broker-4.2.14-150300.3.27.6 * spacewalk-backend-4.2.27-150300.4.38.7 * SUSE Manager Proxy 4.2 Module 4.2 (x86_64) * python3-uyuni-common-libs-4.2.10-150300.3.17.6 * SUSE Manager Server 4.2 Module 4.2 (noarch) * guava-30.1.1-150300.4.3.4 * virtual-host-gatherer-libcloud-1.0.25-150300.3.12.5 * virtual-host-gatherer-VMware-1.0.25-150300.3.12.5 * spacewalk-backend-package-push-server-4.2.27-150300.4.38.7 * spacewalk-backend-xmlrpc-4.2.27-150300.4.38.7 * spacewalk-java-lib-4.2.49-150300.3.63.3 * spacewalk-backend-app-4.2.27-150300.4.38.7 * spacewalk-java-4.2.49-150300.3.63.3 * spacewalk-base-minimal-config-4.2.34-150300.3.41.5 * susemanager-sls-4.2.32-150300.3.46.5 * susemanager-docs_en-pdf-4.2-150300.12.42.5 * susemanager-doc-indexes-4.2-150300.12.42.6 * subscription-matcher-0.29-150300.6.15.5 * virtual-host-gatherer-Nutanix-1.0.25-150300.3.12.5 * spacewalk-backend-4.2.27-150300.4.38.7 * spacewalk-search-4.2.10-150300.3.18.6 * spacewalk-base-minimal-4.2.34-150300.3.41.5 * spacewalk-backend-sql-postgresql-4.2.27-150300.4.38.7 * mgr-libmod-4.2.8-150300.3.9.6 * spacewalk-backend-iss-export-4.2.27-150300.4.38.7 * susemanager-docs_en-4.2-150300.12.42.5 * supportutils-plugin-susemanager-4.2.6-150300.3.12.5 * spacewalk-backend-applet-4.2.27-150300.4.38.7 * spacewalk-backend-config-files-common-4.2.27-150300.4.38.7 * spacewalk-html-4.2.34-150300.3.41.5 * spacewalk-backend-server-4.2.27-150300.4.38.7 * spacewalk-backend-config-files-tool-4.2.27-150300.4.38.7 * spacewalk-backend-config-files-4.2.27-150300.4.38.7 * cobbler-3.1.2-150300.5.22.5 * spacewalk-base-4.2.34-150300.3.41.5 * spacewalk-backend-xml-export-libs-4.2.27-150300.4.38.7 * virtual-host-gatherer-1.0.25-150300.3.12.5 * spacewalk-backend-iss-4.2.27-150300.4.38.7 * spacecmd-4.2.22-150300.4.36.7 * spacewalk-backend-tools-4.2.27-150300.4.38.7 * virtual-host-gatherer-Kubernetes-1.0.25-150300.3.12.5 * susemanager-build-keys-15.3.6-150300.3.9.5 * spacewalk-java-postgresql-4.2.49-150300.3.63.3 * jsr-305-3.0.2-150200.3.7.5 * python3-spacewalk-client-tools-4.2.23-150300.4.33.7 * uyuni-config-modules-4.2.32-150300.3.46.5 * spacewalk-client-tools-4.2.23-150300.4.33.7 * spacewalk-backend-sql-4.2.27-150300.4.38.7 * susemanager-build-keys-web-15.3.6-150300.3.9.5 * spacewalk-java-config-4.2.49-150300.3.63.3 * spacewalk-taskomatic-4.2.49-150300.3.63.3 * SUSE Manager Server 4.2 Module 4.2 (ppc64le s390x x86_64) * susemanager-tftpsync-4.2.4-150300.3.6.6 * python3-uyuni-common-libs-4.2.10-150300.3.17.6 * openSUSE Leap 15.4 (noarch) * jsr-305-3.0.2-150200.3.7.5 * jsr-305-javadoc-3.0.2-150200.3.7.5 * Development Tools Module 15-SP4 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise Real Time 15 SP3 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Enterprise Storage 7.1 (noarch) * jsr-305-3.0.2-150200.3.7.5 * SUSE Enterprise Storage 7 (noarch) * jsr-305-3.0.2-150200.3.7.5 ## References: * https://www.suse.com/security/cve/CVE-2020-8908.html * https://www.suse.com/security/cve/CVE-2022-0860.html * https://www.suse.com/security/cve/CVE-2023-22644.html * https://bugzilla.suse.com/show_bug.cgi?id=1179926 * https://bugzilla.suse.com/show_bug.cgi?id=1197027 * https://bugzilla.suse.com/show_bug.cgi?id=1206562 * https://bugzilla.suse.com/show_bug.cgi?id=1206973 * https://bugzilla.suse.com/show_bug.cgi?id=1207063 * https://bugzilla.suse.com/show_bug.cgi?id=1207308 * https://bugzilla.suse.com/show_bug.cgi?id=1207352 * https://bugzilla.suse.com/show_bug.cgi?id=1207490 * https://bugzilla.suse.com/show_bug.cgi?id=1207799 * https://bugzilla.suse.com/show_bug.cgi?id=1207829 * https://bugzilla.suse.com/show_bug.cgi?id=1207830 * https://bugzilla.suse.com/show_bug.cgi?id=1207838 * https://bugzilla.suse.com/show_bug.cgi?id=1207883 * https://bugzilla.suse.com/show_bug.cgi?id=1208288 * https://bugzilla.suse.com/show_bug.cgi?id=1208321 * https://bugzilla.suse.com/show_bug.cgi?id=1208325 * https://bugzilla.suse.com/show_bug.cgi?id=1208586 * https://bugzilla.suse.com/show_bug.cgi?id=1208687 * https://bugzilla.suse.com/show_bug.cgi?id=1208719 * https://bugzilla.suse.com/show_bug.cgi?id=1208772 * https://bugzilla.suse.com/show_bug.cgi?id=1208908 * https://bugzilla.suse.com/show_bug.cgi?id=1209369 * https://bugzilla.suse.com/show_bug.cgi?id=1209386 * https://bugzilla.suse.com/show_bug.cgi?id=1209434 * https://bugzilla.suse.com/show_bug.cgi?id=1209703 * https://jira.suse.com/browse/PED-2777 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:19:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:19:08 -0000 Subject: SUSE-SU-2023:1864-1: important: Security update for wayland Message-ID: <170903274810.20013.8403103208607070205@smelt2.prg2.suse.org> # Security update for wayland Announcement ID: SUSE-SU-2023:1864-1 Rating: important References: * bsc#1190486 Cross-References: * CVE-2021-3782 CVSS scores: * CVE-2021-3782 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-3782 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for wayland fixes the following issues: * CVE-2021-3782: Fixed a reference-count overflow in libwayland-server SHM handling. (bsc#1190486) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-1864=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-1864=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-1864=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-1864=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libwayland-cursor0-debuginfo-1.13.0-3.3.1 * wayland-devel-1.13.0-3.3.1 * libwayland-client0-debuginfo-1.13.0-3.3.1 * libwayland-server0-debuginfo-1.13.0-3.3.1 * libwayland-server0-1.13.0-3.3.1 * libwayland-cursor0-1.13.0-3.3.1 * wayland-debugsource-1.13.0-3.3.1 * libwayland-client0-1.13.0-3.3.1 * wayland-devel-debuginfo-1.13.0-3.3.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libwayland-client0-debuginfo-1.13.0-3.3.1 * wayland-debugsource-1.13.0-3.3.1 * libwayland-client0-1.13.0-3.3.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libwayland-client0-debuginfo-1.13.0-3.3.1 * wayland-debugsource-1.13.0-3.3.1 * libwayland-client0-1.13.0-3.3.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libwayland-client0-debuginfo-1.13.0-3.3.1 * wayland-debugsource-1.13.0-3.3.1 * libwayland-client0-1.13.0-3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2021-3782.html * https://bugzilla.suse.com/show_bug.cgi?id=1190486 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:21:25 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:21:25 -0000 Subject: SUSE-SU-2023:2181-1: important: Security update for SUSE Manager 4.3: Server Message-ID: <170903288562.20161.1267036996575063523@smelt2.prg2.suse.org> # Security update for SUSE Manager 4.3: Server Announcement ID: SUSE-SU-2023:2181-1 Rating: important References: * bsc#1208060 * bsc#1208965 * jsc#MSQA-663 Cross-References: * CVE-2022-46146 CVSS scores: * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.2 Module 4.2 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: system-user-prometheus: * Provide system-user-prometheus to SUSE Manager Server repositories and resolve installation issues (no source changes) prometheus-postgres_exporter: * Security issues fixed: * CVE-2022-46146: Fix authentication bypass via cache poisoning (bsc#1208060) * Other non-security issues fixed: * Adapt the systemd service security configuration to be able to start it on for Red Hat Linux Enterprise systems and clones * Create the prometheus user for Red Hat Linux Enterprise systems and clones * Fix broken log-level for values other than debug (bsc#1208965) How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Optional update for system-user-prometheus ### Description: This update for system-user-prometheus provides the following fix: * Provide system-user-prometheus to SUSE Manager Server repositories and resolve installation issues (no source changes) ## Recommended update for SUSE Manager 4.2 and Proxy 4.3 ### Description: This update fixes the following issues: system-user-prometheus: * Provide system-user-prometheus to SUSE Manager Server repositories and resolve installation issues (no source changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-2181=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2181=1 * SUSE Manager Server 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2181=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2181=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2181=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2023-2181=1 ## Package List: * SUSE Manager Proxy 4.2 Module 4.2 (noarch) * system-user-prometheus-1.0.0-150000.8.4 * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * system-user-prometheus-1.0.0-150000.8.4 * SUSE Manager Server 4.2 Module 4.2 (noarch) * system-user-prometheus-1.0.0-150000.8.4 * SUSE Manager Server 4.3 Module 4.3 (ppc64le s390x x86_64) * prometheus-postgres_exporter-0.10.1-150400.3.3.6 * SUSE Manager Server 4.3 Module 4.3 (noarch) * system-user-prometheus-1.0.0-150000.8.4 * openSUSE Leap 15.4 (noarch) * system-user-prometheus-1.0.0-150000.8.4 * SUSE Manager Client Tools for SLE 15 (noarch) * system-user-prometheus-1.0.0-150000.8.4 ## References: * https://www.suse.com/security/cve/CVE-2022-46146.html * https://bugzilla.suse.com/show_bug.cgi?id=1208060 * https://bugzilla.suse.com/show_bug.cgi?id=1208965 * https://jira.suse.com/browse/MSQA-663 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:23:59 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:23:59 -0000 Subject: SUSE-SU-2023:2826-1: moderate: Security update for installation-images Message-ID: <170903303903.20541.12330595460763171482@smelt2.prg2.suse.org> # Security update for installation-images Announcement ID: SUSE-SU-2023:2826-1 Rating: moderate References: * bsc#1209188 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that has one security fix can now be installed. ## Description: This update of installation-images fixes the following issues: * rebuild the package with the new secure boot key (bsc#1209188). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2826=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2826=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2826=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2826=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2826=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2826=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2826=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2826=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2826=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2826=1 ## Package List: * SUSE Manager Proxy 4.2 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Manager Retail Branch Server 4.2 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Manager Server 4.2 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Enterprise Storage 7.1 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * installation-images-debuginfodeps-SLES-16.56.15-150300.3.17.19 * install-initrd-SLES-16.56.15-150300.3.17.19 * installation-images-SLES-16.56.15-150300.3.17.19 * skelcd-installer-SLES-16.56.15-150300.3.17.19 * skelcd-installer-net-SLES-16.56.15-150300.3.17.19 * openSUSE Leap 15.3 (noarch) * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Linux Enterprise Real Time 15 SP3 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tftpboot-installation-SLE-15-SP3-aarch64-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-ppc64le-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-s390x-16.56.15-150300.3.17.19 * tftpboot-installation-SLE-15-SP3-x86_64-16.56.15-150300.3.17.19 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1209188 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:26:20 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:26:20 -0000 Subject: SUSE-RU-2023:2566-1: moderate: Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Message-ID: <170903318097.20692.15816339723257340739@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2023:2566-1 Rating: moderate References: * bsc#1201063 * bsc#1203599 * bsc#1204089 * bsc#1204270 * bsc#1204900 * bsc#1205600 * bsc#1206060 * bsc#1206191 * bsc#1206423 * bsc#1206725 * bsc#1206783 * bsc#1207063 * bsc#1207595 * bsc#1207814 * bsc#1207829 * bsc#1207830 * bsc#1208288 * bsc#1208321 * bsc#1208427 * bsc#1208522 * bsc#1208536 * bsc#1208540 * bsc#1208550 * bsc#1208586 * bsc#1208661 * bsc#1208687 * bsc#1208719 * bsc#1208772 * bsc#1208965 * bsc#1209119 * bsc#1209143 * bsc#1209149 * bsc#1209215 * bsc#1209220 * bsc#1209231 * bsc#1209253 * bsc#1209277 * bsc#1209386 * bsc#1209395 * bsc#1209434 * bsc#1209508 * bsc#1209557 * bsc#1209926 * bsc#1209938 * bsc#1209993 * bsc#1210086 * bsc#1210094 * bsc#1210101 * bsc#1210107 * bsc#1210154 * bsc#1210162 * bsc#1210349 * bsc#1210437 * bsc#1210458 * bsc#1210776 * bsc#1210835 * bsc#1211956 * bsc#1211958 * bsc#1212363 * jsc#MSQA-666 Cross-References: * CVE-2023-22644 CVSS scores: * CVE-2023-22644 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability, contains one feature and has 58 recommended fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: mgr-daemon: * Version 4.3.7-1 * Update translation strings spacecmd: * Version 4.3.21-1 * fix argument parsing of distribution_update (bsc#1210458) * Version 4.3.20-1 * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) spacewalk-backend: * Version 4.3.21-1 * Add package details to reposync error logging * Fix the mgr-inter-sync not creating valid repository metadata when dealing with empty channels (bsc#1207829) * Filter CLM modular packages using release strings (bsc#1207814) * Fix issues with kickstart syncing on mirrorlist repositories * Do not sync .mirrorlist and other non needed files * reposync: catch local file not found urlgrabber error properly (bsc#1208288) * Version 4.3.20-1 * fix repo sync for cloud payg connected repositories (bsc#1208772) spacewalk-proxy: * Version 4.3.16-1 * Better error message on missing systemid file (bsc#1209119) spacewalk-proxy-installer: * version 4.3.11-1 * Fix squid refresh_pattern for "venv-enabled-*.txt" files to avoid serving outdated version of the file (bsc#1211956) spacewalk-web: * Version 4.3.31-1 * Fix title on recurring actions edit page * Version 4.3.30-1 * Disable login button with empty password * Ignore mandatory channels results that don't match list of channels (bsc#1204270) * Increase datetimepicker font sizes (bsc#1210437) * Recurring custom states * fix an issue where the datetimepicker shows wrong date (bsc#1209231) * Add support to add optional channels via webUI * Added pages to install and remove ptf * Added CLM filters to match product temporary fixes packages * Refactor Software / Manage / Packages to use SQL paging (bsc#1206725) susemanager-build-keys: * Version 15.4.9 * add Debian 12 (bookworm) GPG keys (bsc#1212363) * add new 4096 bit RSA SUSE Package Hub key * Version 15.4.8 * add new 4096 bit RSA openSUSE build key gpg-pubkey-29b700a4.asc uyuni-common-libs: * Version 4.3.8-1 * Allow default component for context manager How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: branch-network-formula: * Update to version 0.1.1680167239.23f2fec * Remove unnecessary import of "salt.ext.six" cobbler: * Fix cobbler buildiso so that the artifact can be booted by EFI firmware. (bsc#1206060) * Switch packaging from patch based to Git tree based development * S390X systems require their kernel options to have a linebreak at 79 characters (bsc#1207595) * Settings-migration-v1-to-v2.sh will now handle paths with whitespace correctly * Fix renaming Cobbler items (bsc#1204900, bsc#1209149) * "cobbler buildiso" arguments "\--system" and "\--profile" are now accepted in the right order (bsc#1210776) cpu-mitigations-formula: * Update to version 0.5.0: * Mark all SUSE Linux Enterprise 15 SP4 and newer and openSUSE 15.4 and newer as supported (bsc#1210835) hub-xmlrpc-api: * Do not strictly require Go 1.18 on SUSE Linux Enterprise 15 SP3 (bsc#1203599) perl-Satcon: * Version 4.3.2-1 * Accept keys with dots python-urlgrabber: * Raise proper exception from urlgrab() when local file is not found (bsc#1208288) spacecmd: * Version 4.3.21-1 * Fix argument parsing of distribution_update (bsc#1210458) * Version 4.3.20-1 * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) spacewalk-admin: * Version 4.3.11-1 * change backup file extension from .orig to .current_time (bsc#1206783) spacewalk-backend: * Version 4.3.21-1 * Add package details to reposync error logging * Fix the mgr-inter-sync not creating valid repository metadata when dealing with empty channels (bsc#1207829) * Filter CLM modular packages using release strings (bsc#1207814) * Fix issues with kickstart syncing on mirrorlist repositories * Do not sync .mirrorlist and other non needed files * reposync: catch local file not found urlgrabber error properly (bsc#1208288) * Version 4.3.20-1 * Fix repo sync for cloud payg connected repositories (bsc#1208772) spacewalk-config: * Version 4.3.10-1 * Add /saltboot directory * Mark /os-images and /tftp as static content spacewalk-java: * Security fixes included in this version update from 4.3.52-1 to 4.3.58-1: * CVE-2023-22644: Fix session information leak (bsc#1210107) * CVE-2023-22644: Do not output cobbler xmlrpc token in debug logs (bsc#1210162) * CVE-2023-22644: fix credentials and other secrets disclosure when debug log is enabled (bsc#1210154) * CVE-2023-22644: Don't output URL parameters for tiny urls (bsc#1210101) * CVE-2023-22644: Do not log SSL certificate / key file content (bsc#1210094) * CVE-2023-22644: Remove web session swap secrets output in logs (bsc#1210086) * Non-security bug fixes included in this version update from 4.3.52-1 to 4.3.58-1: * Version 4.3.58-1 * Make sure that all hibernate connections are closed (bsc#1208687) * Version 4.3.57-1 * Update version of tomcat build dependencies * Version 4.3.55-1 * Fix breadcrumbs on recurring actions pages * Version 4.3.54-1 * Kernel options: only add quotes if there is a space in the value (bsc#1209926) * Version 4.3.53-1 * Update Cobbler profile when a new image is deployed * Add mapping of image URLs for containerized proxy * Remove channels from client after transfer to a different organization (bsc#1209220) * Fix RHEL9 / SLL9 product discovery (bsc#1209993) * Fix displaying system channels when no base product is installed (bsc#1206423) * Fix NPE in cobbler system sync when server has no creator set * Recurring custom states * Removed the expensive 'diff' column (bsc#1208427) * Fix possible "NullPointerException" when clicking on the "Create PXE installation configuration" button from Provising page * Fix possible "NullPointerException" issues when running cobbler-sync-bunch * Do not trigger extra cobbler sync when changing kickstart data (bsc#1208536) * Set jasper development mode to false (bsc#1206191) * Fixed select all for ptf packages list (bsc#1209143) * Added SLES 12 support for ptf removal * Fixed issue with checking ptf repositories on cloned channels * Add support to add optional channels via webUI * Added APIs to allow frontend to install and remove ptf * Show the package summary where applicable to better describe PTF packages * Added CLM filters to match product temporary fixes packages * Restrict product temporary fixes visibility in the UI and in the APIs responses * Fixed empty selection warning in the lock/unlock page * Set GPG Key Url for PTF repositories * Fix deleting custom info pillar (bsc#1209253) * Update report outdated system query to de-duplicate errata id's * Refactor Software / Manage / Packages to use SQL paging (bsc#1206725) * Filter CLM modular packages using release strings (bsc#1207814) * Fix systems subscribed to channel CSV download (bsc#1201063) * Fix cobbler system entries for retail terminals (bsc#1208661) * Make API method systemgroup.listSystemsMinimal read-only (bsc#1208550) * Add missing text for user preferenaces page * Do not include channels from different orgs when listing mandatory channels (bsc#1204270) * Save scheduler user when creating Patch actions manually (bsc#1208321) * Version 4.3.52-1 * Add more restricted arguments to prevent HTTP API logging sensitive data (bsc#1209386, bsc#1209395) * Version 4.3.51-1 * Support multiple gpgkey urls for a channel (bsc#1208540) spacewalk-search: * Version 4.3.9-1 * Add maxPoolSize option to search spacewalk-setup: * Version 4.3.16-1 * Enable netapi clients in master configuration (required for Salt 3006) * Persist report_db_sslrootcert value (bsc#1210349) * Fix migration test * Escape `%` in spec file. * remove useless tomcat configuration (bsc#1206191) * use template for reportdb configuration (bsc#1206783) spacewalk-web: * Version 4.3.31-1 * Fix title on recurring actions edit page * Version 4.3.30-1 * Disable login button with empty password * Ignore mandatory channels results that don't match list of channels (bsc#1204270) * Increase datetimepicker font sizes (bsc#1210437) * Recurring custom states * fix an issue where the datetimepicker shows wrong date (bsc#1209231) * Add support to add optional channels via webUI * Added pages to install and remove ptf * Added CLM filters to match product temporary fixes packages * Refactor Software / Manage / Packages to use SQL paging (bsc#1206725) subscription-matcher: * Relax antlr version requirement supportutils-plugin-susemanager: * Version 4.3.7-1 * fix db connection check tool (bsc#1208586) susemanager: * version 4.3.27-1 * Use newest venv-salt-minion version available to generate the venv- enabled-*.txt file in bootstrap repos (bsc#1211958) * Version 4.3.26-1 * Add bootstrap repository definitions for SLE-Micro 5.4 * Make python3-ordered-set optional for the SLE15 bootstrap repo as it is not required or present in SLE15SP3 or older * Add bootstrap repository definitions for openSUSE Leap 15.5 * add bootstrap repository definitions for SLE-Micro 5.1 (bsc#1209557) * Add SLES15SP5 to bootstrap repo definitions susemanager-build-keys: * Version 15.4.9 * add Debian 12 (bookworm) GPG keys (bsc#1212363) * add new 4096 bit RSA SUSE Package Hub key * Version 15.4.8 * add new 4096 bit RSA openSUSE build key gpg-pubkey-29b700a4.asc susemanager-docs_en: * Change cleanup Salt Client description * Documentation Salt version updated to 3006 * Added SUSE Linux Enterprise Micro 5.4 support * Added openSUSE Leap version 15.5 * Added SUSE Linux Enterprise version 15 SP5 * Documented new Recurring Actions feature * Adjusted Single Sign-On example in Administration Guide according to Keycloak 21.0.1 update * Add multiple GPG key url usage to Client Configuration Guide to Keycloak 22.0.1 update * Documented custom info is available via pillars in Client Configuration Guide (bsc#1209253) * Added updated options for rhn.conf file in the Administration Guide (bsc#1209508) * Added instruction for Cobbler to use the correct label in Client Config Guide distro label (bsc#1205600) * Adjusted python version and openSUSE Leap version in public cloud document (bsc#1209938) * Fixed calculation of DB max-connections and align it with the supportconfig checking tool in the Tuning Guide * Fixed Troubleshooting Corrupt Repositories procedure * Branding updated for 2023 * New search engine optimization improvements for documentation * Translations are now included in the WebUI help documentation * Local search is now provided with the WebUI help documentation susemanager-schema: * Version 4.3.18-1 * Recurring custom states * Added view to handle ptf packages and updated the procedures to refresh the updatable/installable packages * Fix update of sql function create_new_org * Filter CLM modular packages using release strings (bsc#1207814) susemanager-sls: * Version 4.3.33-1 * fix duplicate packages in state * Version 4.3.32-1 * disable salt-minion and remove its config file on cleanup (bsc#1209277) * Add kiwi supported disk images to be collectable (bsc#1208522) * Rename internal state 'synccustomall' to 'syncall' * Recurring custom states * to update everything on a debian system, call dist-upgrade to be able to install and remove packages * Allow KiwiNG to be used on SLE12 buildhosts (bsc#1204089) * Enforce installation of the PTF GPG key package * Improve error handling in mgr_events.py (bsc#1208687) * Version 4.3.31-1 * support multiple gpgkey urls for a channel (bsc#1208540) * make SUSE Addon GPG key available on all instance (bsc#1208540) susemanager-tftpsync: * Version 4.3.4-1 * Fix server-side cache that's used for only pushing files to proxies that need to be pushed, as well as propagating deletions (bsc#1209215) * Fix removal of proxies section in cobbler settings (bsc#1207063) uyuni-common-libs: * Version 4.3.8-1 * Allow default component for context manager virtual-host-gatherer: * Version 1.0.26-1 * fix cpu calculation in the libvirt module and enhance the data structure by os value How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2566=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-2566=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * spacewalk-base-minimal-config-4.3.31-150400.3.21.7 * spacewalk-proxy-redirect-4.3.16-150400.3.20.6 * spacewalk-base-minimal-4.3.31-150400.3.21.7 * spacewalk-proxy-salt-4.3.16-150400.3.20.6 * susemanager-build-keys-web-15.4.9-150400.3.20.2 * susemanager-build-keys-15.4.9-150400.3.20.2 * spacewalk-proxy-management-4.3.16-150400.3.20.6 * spacecmd-4.3.21-150400.3.18.5 * mgr-daemon-4.3.7-150400.3.9.5 * spacewalk-proxy-package-manager-4.3.16-150400.3.20.6 * spacewalk-proxy-common-4.3.16-150400.3.20.6 * spacewalk-backend-4.3.21-150400.3.21.13 * spacewalk-proxy-installer-4.3.11-150400.3.6.4 * spacewalk-proxy-broker-4.3.16-150400.3.20.6 * SUSE Manager Proxy 4.3 Module 4.3 (x86_64) * python3-uyuni-common-libs-4.3.8-150400.3.12.5 * SUSE Manager Server 4.3 Module 4.3 (noarch) * spacewalk-backend-applet-4.3.21-150400.3.21.13 * susemanager-schema-utility-4.3.18-150400.3.18.7 * spacewalk-base-minimal-4.3.31-150400.3.21.7 * virtual-host-gatherer-1.0.26-150400.3.12.3 * perl-Satcon-4.3.2-150400.3.3.5 * spacewalk-taskomatic-4.3.58-150400.3.46.4 * spacewalk-backend-server-4.3.21-150400.3.21.13 * virtual-host-gatherer-Nutanix-1.0.26-150400.3.12.3 * spacewalk-backend-iss-4.3.21-150400.3.21.13 * spacewalk-backend-config-files-tool-4.3.21-150400.3.21.13 * spacewalk-java-postgresql-4.3.58-150400.3.46.4 * spacewalk-java-4.3.58-150400.3.46.4 * spacewalk-java-lib-4.3.58-150400.3.46.4 * susemanager-build-keys-web-15.4.9-150400.3.20.2 * virtual-host-gatherer-Kubernetes-1.0.26-150400.3.12.3 * spacewalk-backend-sql-postgresql-4.3.21-150400.3.21.13 * susemanager-docs_en-4.3-150400.9.27.3 * virtual-host-gatherer-VMware-1.0.26-150400.3.12.3 * spacewalk-backend-sql-4.3.21-150400.3.21.13 * cpu-mitigations-formula-0.5.0-150400.3.3.3 * susemanager-schema-4.3.18-150400.3.18.7 * spacewalk-setup-4.3.16-150400.3.21.6 * spacewalk-html-4.3.31-150400.3.21.7 * spacewalk-search-4.3.9-150400.3.12.7 * branch-network-formula-0.1.1680167239.23f2fec-150400.3.3.3 * spacewalk-backend-config-files-4.3.21-150400.3.21.13 * spacewalk-backend-app-4.3.21-150400.3.21.13 * spacewalk-backend-package-push-server-4.3.21-150400.3.21.13 * spacewalk-backend-iss-export-4.3.21-150400.3.21.13 * spacewalk-backend-4.3.21-150400.3.21.13 * spacewalk-backend-xmlrpc-4.3.21-150400.3.21.13 * spacewalk-base-4.3.31-150400.3.21.7 * python3-urlgrabber-4.1.0-150400.4.3.6.3 * spacewalk-java-config-4.3.58-150400.3.46.4 * uyuni-config-modules-4.3.33-150400.3.25.7 * spacewalk-base-minimal-config-4.3.31-150400.3.21.7 * supportutils-plugin-susemanager-4.3.7-150400.3.9.6 * spacewalk-backend-config-files-common-4.3.21-150400.3.21.13 * spacewalk-config-4.3.10-150400.3.6.3 * susemanager-sls-4.3.33-150400.3.25.7 * spacecmd-4.3.21-150400.3.18.5 * spacewalk-backend-tools-4.3.21-150400.3.21.13 * susemanager-docs_en-pdf-4.3-150400.9.27.3 * spacewalk-backend-xml-export-libs-4.3.21-150400.3.21.13 * virtual-host-gatherer-libcloud-1.0.26-150400.3.12.3 * susemanager-build-keys-15.4.9-150400.3.20.2 * cobbler-3.3.3-150400.5.25.3 * spacewalk-admin-4.3.11-150400.3.6.6 * SUSE Manager Server 4.3 Module 4.3 (ppc64le s390x x86_64) * susemanager-4.3.27-150400.3.26.5 * python3-uyuni-common-libs-4.3.8-150400.3.12.5 * susemanager-tools-4.3.27-150400.3.26.5 * hub-xmlrpc-api-0.7-150400.5.6.5 * susemanager-tftpsync-4.3.4-150400.3.9.9 ## References: * https://www.suse.com/security/cve/CVE-2023-22644.html * https://bugzilla.suse.com/show_bug.cgi?id=1201063 * https://bugzilla.suse.com/show_bug.cgi?id=1203599 * https://bugzilla.suse.com/show_bug.cgi?id=1204089 * https://bugzilla.suse.com/show_bug.cgi?id=1204270 * https://bugzilla.suse.com/show_bug.cgi?id=1204900 * https://bugzilla.suse.com/show_bug.cgi?id=1205600 * https://bugzilla.suse.com/show_bug.cgi?id=1206060 * https://bugzilla.suse.com/show_bug.cgi?id=1206191 * https://bugzilla.suse.com/show_bug.cgi?id=1206423 * https://bugzilla.suse.com/show_bug.cgi?id=1206725 * https://bugzilla.suse.com/show_bug.cgi?id=1206783 * https://bugzilla.suse.com/show_bug.cgi?id=1207063 * https://bugzilla.suse.com/show_bug.cgi?id=1207595 * https://bugzilla.suse.com/show_bug.cgi?id=1207814 * https://bugzilla.suse.com/show_bug.cgi?id=1207829 * https://bugzilla.suse.com/show_bug.cgi?id=1207830 * https://bugzilla.suse.com/show_bug.cgi?id=1208288 * https://bugzilla.suse.com/show_bug.cgi?id=1208321 * https://bugzilla.suse.com/show_bug.cgi?id=1208427 * https://bugzilla.suse.com/show_bug.cgi?id=1208522 * https://bugzilla.suse.com/show_bug.cgi?id=1208536 * https://bugzilla.suse.com/show_bug.cgi?id=1208540 * https://bugzilla.suse.com/show_bug.cgi?id=1208550 * https://bugzilla.suse.com/show_bug.cgi?id=1208586 * https://bugzilla.suse.com/show_bug.cgi?id=1208661 * https://bugzilla.suse.com/show_bug.cgi?id=1208687 * https://bugzilla.suse.com/show_bug.cgi?id=1208719 * https://bugzilla.suse.com/show_bug.cgi?id=1208772 * https://bugzilla.suse.com/show_bug.cgi?id=1208965 * https://bugzilla.suse.com/show_bug.cgi?id=1209119 * https://bugzilla.suse.com/show_bug.cgi?id=1209143 * https://bugzilla.suse.com/show_bug.cgi?id=1209149 * https://bugzilla.suse.com/show_bug.cgi?id=1209215 * https://bugzilla.suse.com/show_bug.cgi?id=1209220 * https://bugzilla.suse.com/show_bug.cgi?id=1209231 * https://bugzilla.suse.com/show_bug.cgi?id=1209253 * https://bugzilla.suse.com/show_bug.cgi?id=1209277 * https://bugzilla.suse.com/show_bug.cgi?id=1209386 * https://bugzilla.suse.com/show_bug.cgi?id=1209395 * https://bugzilla.suse.com/show_bug.cgi?id=1209434 * https://bugzilla.suse.com/show_bug.cgi?id=1209508 * https://bugzilla.suse.com/show_bug.cgi?id=1209557 * https://bugzilla.suse.com/show_bug.cgi?id=1209926 * https://bugzilla.suse.com/show_bug.cgi?id=1209938 * https://bugzilla.suse.com/show_bug.cgi?id=1209993 * https://bugzilla.suse.com/show_bug.cgi?id=1210086 * https://bugzilla.suse.com/show_bug.cgi?id=1210094 * https://bugzilla.suse.com/show_bug.cgi?id=1210101 * https://bugzilla.suse.com/show_bug.cgi?id=1210107 * https://bugzilla.suse.com/show_bug.cgi?id=1210154 * https://bugzilla.suse.com/show_bug.cgi?id=1210162 * https://bugzilla.suse.com/show_bug.cgi?id=1210349 * https://bugzilla.suse.com/show_bug.cgi?id=1210437 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://bugzilla.suse.com/show_bug.cgi?id=1210776 * https://bugzilla.suse.com/show_bug.cgi?id=1210835 * https://bugzilla.suse.com/show_bug.cgi?id=1211956 * https://bugzilla.suse.com/show_bug.cgi?id=1211958 * https://bugzilla.suse.com/show_bug.cgi?id=1212363 * https://jira.suse.com/browse/MSQA-666 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:30:59 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:30:59 -0000 Subject: SUSE-SU-2023:2585-1: moderate: Security update for salt and python-pyzmq Message-ID: <170903345992.21165.3954198029295013165@smelt2.prg2.suse.org> # Security update for salt and python-pyzmq Announcement ID: SUSE-SU-2023:2585-1 Rating: moderate References: * bsc#1186945 * bsc#1207071 * bsc#1209233 * bsc#1211612 * bsc#1211754 * bsc#1212516 * bsc#1212517 * jsc#MSQA-666 * jsc#PED-4361 Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that contains two features and has seven security fixes can now be installed. ## Description: This update for salt and python-pyzmq fixes the following issues: salt: * Update to Salt release version 3006.0 (jsc#PED-4361) * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html * Add missing patch after rebase to fix collections Mapping issues * Add python3-looseversion as new dependency for salt * Add python3-packaging as new dependency for salt * Allow entrypoint compatibility for "importlib-metadata>=5.0.0" (bsc#1207071) * Avoid conflicts with Salt dependencies versions (bsc#1211612) * Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754) * Create new salt-tests subpackage containing Salt tests * Drop conflictive patch dicarded from upstream * Fix package build with old setuptools versions * Fix SLS rendering error when Jinja macros are used * Fix version detection and avoid building and testing failures * Prevent deadlocks in salt-ssh executions * Require python3-jmespath runtime dependency (bsc#1209233) * Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517) python-pyzmq: * Update python-pyzmq to version 17.1.2 in LTSS products (bsc#1186945) ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2023-2585=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2023-2585=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2585=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2585=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-2585=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-2585=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-2585=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-2585=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2585=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2585=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2585=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2585=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2585=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2585=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2585=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2585=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2585=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2585=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2585=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2585=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2585=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2585=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2585=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2585=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2585=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2585=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-2585=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-2585=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-2585=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-2585=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python3-pyzmq-devel-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-pyzmq-devel-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-devel-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * salt-ssh-3006.0-150000.97.2 * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-master-3006.0-150000.97.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-3006.0-150000.97.2 * python3-pyzmq-17.1.2-150000.3.5.2 * salt-api-3006.0-150000.97.2 * salt-doc-3006.0-150000.97.2 * salt-proxy-3006.0-150000.97.2 * salt-standalone-formulas-configuration-3006.0-150000.97.2 * salt-syndic-3006.0-150000.97.2 * salt-transactional-update-3006.0-150000.97.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * salt-minion-3006.0-150000.97.2 * salt-cloud-3006.0-150000.97.2 * python3-salt-3006.0-150000.97.2 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * salt-bash-completion-3006.0-150000.97.2 * salt-zsh-completion-3006.0-150000.97.2 * salt-fish-completion-3006.0-150000.97.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * salt-ssh-3006.0-150000.97.2 * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-master-3006.0-150000.97.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-3006.0-150000.97.2 * python3-pyzmq-17.1.2-150000.3.5.2 * salt-api-3006.0-150000.97.2 * salt-doc-3006.0-150000.97.2 * salt-proxy-3006.0-150000.97.2 * salt-standalone-formulas-configuration-3006.0-150000.97.2 * salt-syndic-3006.0-150000.97.2 * salt-transactional-update-3006.0-150000.97.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * salt-minion-3006.0-150000.97.2 * salt-cloud-3006.0-150000.97.2 * python3-salt-3006.0-150000.97.2 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * salt-bash-completion-3006.0-150000.97.2 * salt-zsh-completion-3006.0-150000.97.2 * salt-fish-completion-3006.0-150000.97.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * salt-ssh-3006.0-150000.97.2 * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-master-3006.0-150000.97.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-3006.0-150000.97.2 * python3-pyzmq-17.1.2-150000.3.5.2 * salt-api-3006.0-150000.97.2 * salt-doc-3006.0-150000.97.2 * salt-proxy-3006.0-150000.97.2 * salt-standalone-formulas-configuration-3006.0-150000.97.2 * salt-syndic-3006.0-150000.97.2 * salt-transactional-update-3006.0-150000.97.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * salt-minion-3006.0-150000.97.2 * salt-cloud-3006.0-150000.97.2 * python3-salt-3006.0-150000.97.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * salt-bash-completion-3006.0-150000.97.2 * salt-zsh-completion-3006.0-150000.97.2 * salt-fish-completion-3006.0-150000.97.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Manager Proxy 4.2 (x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Manager Retail Branch Server 4.2 (x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Enterprise Storage 7 (aarch64 x86_64) * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE CaaS Platform 4.0 (x86_64) * salt-ssh-3006.0-150000.97.2 * python2-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-master-3006.0-150000.97.2 * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python2-pyzmq-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * salt-3006.0-150000.97.2 * python3-pyzmq-17.1.2-150000.3.5.2 * salt-api-3006.0-150000.97.2 * salt-doc-3006.0-150000.97.2 * salt-proxy-3006.0-150000.97.2 * salt-standalone-formulas-configuration-3006.0-150000.97.2 * salt-syndic-3006.0-150000.97.2 * salt-transactional-update-3006.0-150000.97.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * salt-minion-3006.0-150000.97.2 * salt-cloud-3006.0-150000.97.2 * python3-salt-3006.0-150000.97.2 * SUSE CaaS Platform 4.0 (noarch) * salt-bash-completion-3006.0-150000.97.2 * salt-zsh-completion-3006.0-150000.97.2 * salt-fish-completion-3006.0-150000.97.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-debuginfo-17.1.2-150000.3.5.2 * python3-pyzmq-17.1.2-150000.3.5.2 * python-pyzmq-debugsource-17.1.2-150000.3.5.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1186945 * https://bugzilla.suse.com/show_bug.cgi?id=1207071 * https://bugzilla.suse.com/show_bug.cgi?id=1209233 * https://bugzilla.suse.com/show_bug.cgi?id=1211612 * https://bugzilla.suse.com/show_bug.cgi?id=1211754 * https://bugzilla.suse.com/show_bug.cgi?id=1212516 * https://bugzilla.suse.com/show_bug.cgi?id=1212517 * https://jira.suse.com/browse/MSQA-666 * https://jira.suse.com/browse/PED-4361 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:33:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:33:17 -0000 Subject: SUSE-RU-2023:2592-1: important: Maintenance update for SUSE Manager 4.3.6 Release Notes Message-ID: <170903359712.21310.12593512261888658830@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3.6 Release Notes Announcement ID: SUSE-RU-2023:2592-1 Rating: important References: * bsc#1201059 * bsc#1201063 * bsc#1203599 * bsc#1204089 * bsc#1204186 * bsc#1204270 * bsc#1204900 * bsc#1205011 * bsc#1205088 * bsc#1205600 * bsc#1205759 * bsc#1206060 * bsc#1206146 * bsc#1206191 * bsc#1206423 * bsc#1206520 * bsc#1206562 * bsc#1206725 * bsc#1206783 * bsc#1206800 * bsc#1206817 * bsc#1206861 * bsc#1206932 * bsc#1206963 * bsc#1206973 * bsc#1206979 * bsc#1206981 * bsc#1207063 * bsc#1207087 * bsc#1207141 * bsc#1207297 * bsc#1207352 * bsc#1207595 * bsc#1207792 * bsc#1207799 * bsc#1207814 * bsc#1207829 * bsc#1207830 * bsc#1207838 * bsc#1207867 * bsc#1207883 * bsc#1208046 * bsc#1208119 * bsc#1208288 * bsc#1208321 * bsc#1208325 * bsc#1208427 * bsc#1208522 * bsc#1208536 * bsc#1208540 * bsc#1208550 * bsc#1208586 * bsc#1208611 * bsc#1208661 * bsc#1208687 * bsc#1208719 * bsc#1208772 * bsc#1208908 * bsc#1209119 * bsc#1209143 * bsc#1209149 * bsc#1209215 * bsc#1209220 * bsc#1209231 * bsc#1209253 * bsc#1209259 * bsc#1209277 * bsc#1209369 * bsc#1209386 * bsc#1209395 * bsc#1209434 * bsc#1209508 * bsc#1209557 * bsc#1209926 * bsc#1209938 * bsc#1209993 * bsc#1210086 * bsc#1210094 * bsc#1210101 * bsc#1210107 * bsc#1210154 * bsc#1210162 * bsc#1210349 * bsc#1210437 * bsc#1210458 * bsc#1210776 * bsc#1210835 * bsc#1211956 * bsc#1211958 * bsc#1212096 * bsc#1212363 * bsc#1212516 * jsc#MSQA-666 Cross-References: * CVE-2022-46146 * CVE-2023-22644 CVSS scores: * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-22644 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities, contains one feature and has 90 recommended fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager-proxy: * Update to SUSE Manager 4.3.6 * Salt has been upgraded to 3006.0 * Bugs mentioned bsc#1204270, bsc#1206725, bsc#1207814, bsc#1207829, bsc#1207830 bsc#1208288, bsc#1208719, bsc#1208772, bsc#1209119, bsc#1209231 bsc#1210437, bsc#1210458, bsc#1211956 ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.6 * Salt has been upgraded to 3006.0 * SUSE Linux Enterprise Server 15 SP5 Family support has been added * SUSE Linux Enterprise Server Micro 5.4 support has been added * openSUSE Leap 15.5 support has been added * Ability to install PTFs from SUSE Manager has been added * Scheduling Custom States on recurrent basis is now possible * Syncing optional channels from the webUI is now possible * All Tomcat logs are now rotated with logrotate * Grafana upgraded to 9.5.1 * Node exporter upgraded to 1.5.0 * Prometheus upgraded to 2.37.6 * Postgres exporter upgraded to 0.10.1 * CVEs fixed CVE-2023-22644, CVE-2022-46146 * Bugs mentioned bsc#1201063, bsc#1203599, bsc#1204089, bsc#1204270, bsc#1204900 bsc#1205600, bsc#1206060, bsc#1206191, bsc#1206423, bsc#1206725 bsc#1206783, bsc#1207063, bsc#1207595, bsc#1207814, bsc#1207829 bsc#1207830, bsc#1208288, bsc#1208321, bsc#1208427, bsc#1208522 bsc#1208536, bsc#1208540, bsc#1208550, bsc#1208586, bsc#1208661 bsc#1208687, bsc#1208719, bsc#1208772, bsc#1209143, bsc#1209149 bsc#1209215, bsc#1209220, bsc#1209231, bsc#1209253, bsc#1209277 bsc#1209386, bsc#1209395, bsc#1209508, bsc#1209557, bsc#1209926 bsc#1209938, bsc#1209993, bsc#1210086, bsc#1210094, bsc#1210101 bsc#1210107, bsc#1210154, bsc#1210162, bsc#1210349, bsc#1210437 bsc#1210458, bsc#1210835, bsc#1211958, bsc#1210776, bsc#1209434 bsc#1208046, bsc#1212363, bsc#1212096, bsc#1212516 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-2592=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2023-2592=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2023-2592=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2023-2592=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-proxy-4.3.6-150400.3.55.4 * release-notes-susemanager-4.3.6-150400.3.63.2 * SUSE Manager Proxy 4.3 (noarch) * release-notes-susemanager-proxy-4.3.6-150400.3.55.4 * SUSE Manager Retail Branch Server 4.3 (noarch) * release-notes-susemanager-proxy-4.3.6-150400.3.55.4 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.6-150400.3.63.2 ## References: * https://www.suse.com/security/cve/CVE-2022-46146.html * https://www.suse.com/security/cve/CVE-2023-22644.html * https://bugzilla.suse.com/show_bug.cgi?id=1201059 * https://bugzilla.suse.com/show_bug.cgi?id=1201063 * https://bugzilla.suse.com/show_bug.cgi?id=1203599 * https://bugzilla.suse.com/show_bug.cgi?id=1204089 * https://bugzilla.suse.com/show_bug.cgi?id=1204186 * https://bugzilla.suse.com/show_bug.cgi?id=1204270 * https://bugzilla.suse.com/show_bug.cgi?id=1204900 * https://bugzilla.suse.com/show_bug.cgi?id=1205011 * https://bugzilla.suse.com/show_bug.cgi?id=1205088 * https://bugzilla.suse.com/show_bug.cgi?id=1205600 * https://bugzilla.suse.com/show_bug.cgi?id=1205759 * https://bugzilla.suse.com/show_bug.cgi?id=1206060 * https://bugzilla.suse.com/show_bug.cgi?id=1206146 * https://bugzilla.suse.com/show_bug.cgi?id=1206191 * https://bugzilla.suse.com/show_bug.cgi?id=1206423 * https://bugzilla.suse.com/show_bug.cgi?id=1206520 * https://bugzilla.suse.com/show_bug.cgi?id=1206562 * https://bugzilla.suse.com/show_bug.cgi?id=1206725 * https://bugzilla.suse.com/show_bug.cgi?id=1206783 * https://bugzilla.suse.com/show_bug.cgi?id=1206800 * https://bugzilla.suse.com/show_bug.cgi?id=1206817 * https://bugzilla.suse.com/show_bug.cgi?id=1206861 * https://bugzilla.suse.com/show_bug.cgi?id=1206932 * https://bugzilla.suse.com/show_bug.cgi?id=1206963 * https://bugzilla.suse.com/show_bug.cgi?id=1206973 * https://bugzilla.suse.com/show_bug.cgi?id=1206979 * https://bugzilla.suse.com/show_bug.cgi?id=1206981 * https://bugzilla.suse.com/show_bug.cgi?id=1207063 * https://bugzilla.suse.com/show_bug.cgi?id=1207087 * https://bugzilla.suse.com/show_bug.cgi?id=1207141 * https://bugzilla.suse.com/show_bug.cgi?id=1207297 * https://bugzilla.suse.com/show_bug.cgi?id=1207352 * https://bugzilla.suse.com/show_bug.cgi?id=1207595 * https://bugzilla.suse.com/show_bug.cgi?id=1207792 * https://bugzilla.suse.com/show_bug.cgi?id=1207799 * https://bugzilla.suse.com/show_bug.cgi?id=1207814 * https://bugzilla.suse.com/show_bug.cgi?id=1207829 * https://bugzilla.suse.com/show_bug.cgi?id=1207830 * https://bugzilla.suse.com/show_bug.cgi?id=1207838 * https://bugzilla.suse.com/show_bug.cgi?id=1207867 * https://bugzilla.suse.com/show_bug.cgi?id=1207883 * https://bugzilla.suse.com/show_bug.cgi?id=1208046 * https://bugzilla.suse.com/show_bug.cgi?id=1208119 * https://bugzilla.suse.com/show_bug.cgi?id=1208288 * https://bugzilla.suse.com/show_bug.cgi?id=1208321 * https://bugzilla.suse.com/show_bug.cgi?id=1208325 * https://bugzilla.suse.com/show_bug.cgi?id=1208427 * https://bugzilla.suse.com/show_bug.cgi?id=1208522 * https://bugzilla.suse.com/show_bug.cgi?id=1208536 * https://bugzilla.suse.com/show_bug.cgi?id=1208540 * https://bugzilla.suse.com/show_bug.cgi?id=1208550 * https://bugzilla.suse.com/show_bug.cgi?id=1208586 * https://bugzilla.suse.com/show_bug.cgi?id=1208611 * https://bugzilla.suse.com/show_bug.cgi?id=1208661 * https://bugzilla.suse.com/show_bug.cgi?id=1208687 * https://bugzilla.suse.com/show_bug.cgi?id=1208719 * https://bugzilla.suse.com/show_bug.cgi?id=1208772 * https://bugzilla.suse.com/show_bug.cgi?id=1208908 * https://bugzilla.suse.com/show_bug.cgi?id=1209119 * https://bugzilla.suse.com/show_bug.cgi?id=1209143 * https://bugzilla.suse.com/show_bug.cgi?id=1209149 * https://bugzilla.suse.com/show_bug.cgi?id=1209215 * https://bugzilla.suse.com/show_bug.cgi?id=1209220 * https://bugzilla.suse.com/show_bug.cgi?id=1209231 * https://bugzilla.suse.com/show_bug.cgi?id=1209253 * https://bugzilla.suse.com/show_bug.cgi?id=1209259 * https://bugzilla.suse.com/show_bug.cgi?id=1209277 * https://bugzilla.suse.com/show_bug.cgi?id=1209369 * https://bugzilla.suse.com/show_bug.cgi?id=1209386 * https://bugzilla.suse.com/show_bug.cgi?id=1209395 * https://bugzilla.suse.com/show_bug.cgi?id=1209434 * https://bugzilla.suse.com/show_bug.cgi?id=1209508 * https://bugzilla.suse.com/show_bug.cgi?id=1209557 * https://bugzilla.suse.com/show_bug.cgi?id=1209926 * https://bugzilla.suse.com/show_bug.cgi?id=1209938 * https://bugzilla.suse.com/show_bug.cgi?id=1209993 * https://bugzilla.suse.com/show_bug.cgi?id=1210086 * https://bugzilla.suse.com/show_bug.cgi?id=1210094 * https://bugzilla.suse.com/show_bug.cgi?id=1210101 * https://bugzilla.suse.com/show_bug.cgi?id=1210107 * https://bugzilla.suse.com/show_bug.cgi?id=1210154 * https://bugzilla.suse.com/show_bug.cgi?id=1210162 * https://bugzilla.suse.com/show_bug.cgi?id=1210349 * https://bugzilla.suse.com/show_bug.cgi?id=1210437 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://bugzilla.suse.com/show_bug.cgi?id=1210776 * https://bugzilla.suse.com/show_bug.cgi?id=1210835 * https://bugzilla.suse.com/show_bug.cgi?id=1211956 * https://bugzilla.suse.com/show_bug.cgi?id=1211958 * https://bugzilla.suse.com/show_bug.cgi?id=1212096 * https://bugzilla.suse.com/show_bug.cgi?id=1212363 * https://bugzilla.suse.com/show_bug.cgi?id=1212516 * https://jira.suse.com/browse/MSQA-666 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:34:38 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:34:38 -0000 Subject: SUSE-SU-2023:2897-1: critical: Security update for python-azure-core, python-azure-storage-blob Message-ID: <170903367892.21634.14314064657638066509@smelt2.prg2.suse.org> # Security update for python-azure-core, python-azure-storage-blob Announcement ID: SUSE-SU-2023:2897-1 Rating: critical References: * bsc#1199282 * bsc#1202088 * jsc#PM-3243 * jsc#SLE-24629 Cross-References: * CVE-2022-30187 CVSS scores: * CVE-2022-30187 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-30187 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update for python-azure-core, python-azure-storage-blob fixes the following issues: Security fixes: * CVE-2022-30187: Fixed information disclosure vulnerability (bsc#1202088). Recommended fixes: * New upstream release version 1.23.1 to SLE 15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2897=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2897=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-2897=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-2897=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2023-2897=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-2897=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-2897=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python3-azure-core-1.23.1-150100.3.13.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 * openSUSE Leap 15.5 (noarch) * python3-azure-core-1.23.1-150100.3.13.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 * Public Cloud Module 15-SP1 (noarch) * python2-azure-core-1.23.1-150100.3.13.1 * python2-typing_extensions-3.10.0.0-150100.3.5.1 * python3-azure-core-1.23.1-150100.3.13.1 * python3-typing_extensions-3.10.0.0-150100.3.5.1 * python2-azure-storage-blob-12.13.1-150100.3.10.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 * Public Cloud Module 15-SP2 (noarch) * python2-azure-core-1.23.1-150100.3.13.1 * python2-typing_extensions-3.10.0.0-150100.3.5.1 * python3-azure-core-1.23.1-150100.3.13.1 * python3-typing_extensions-3.10.0.0-150100.3.5.1 * python2-azure-storage-blob-12.13.1-150100.3.10.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 * Public Cloud Module 15-SP3 (noarch) * python3-azure-core-1.23.1-150100.3.13.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 * python3-typing_extensions-3.10.0.0-150100.3.5.1 * Public Cloud Module 15-SP4 (noarch) * python3-azure-core-1.23.1-150100.3.13.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 * Public Cloud Module 15-SP5 (noarch) * python3-azure-core-1.23.1-150100.3.13.1 * python3-azure-storage-blob-12.13.1-150100.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2022-30187.html * https://bugzilla.suse.com/show_bug.cgi?id=1199282 * https://bugzilla.suse.com/show_bug.cgi?id=1202088 * https://jira.suse.com/browse/PM-3243 * https://jira.suse.com/browse/SLE-24629 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:36:52 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:36:52 -0000 Subject: SUSE-SU-2023:2598-1: important: Security update for golang-github-prometheus-prometheus Message-ID: <170903381274.21788.16307000484446167190@smelt2.prg2.suse.org> # Security update for golang-github-prometheus-prometheus Announcement ID: SUSE-SU-2023:2598-1 Rating: important References: * bsc#1204023 * bsc#1208049 * bsc#1208298 * jsc#MSQA-665 * jsc#PED-3576 Cross-References: * CVE-2022-41715 * CVE-2022-41723 * CVE-2022-46146 CVSS scores: * CVE-2022-41715 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41715 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-41723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves three vulnerabilities and contains two features can now be installed. ## Description: This update for golang-github-prometheus-prometheus fixes the following issues: golang-github-prometheus-prometheus: * Security issues fixed in this version update to 2.37.6: * CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576) * CVE-2022-41715: Update our regexp library to fix upstream (bsc#1204023) * CVE-2022-41723: Fixed go issue to avoid quadratic complexity in HPACK decoding (bsc#1208298) * Other non-security bugs fixed and changes in this version update to 2.37.6: * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak. * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup. * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired. * [BUGFIX] Properly close file descriptor when logging unfinished queries. * [BUGFIX] TSDB: In the WAL watcher metrics, expose the type="exemplar" label instead of type="unknown" for exemplar records. * [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued. * [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file. * [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures. * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads. * [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled. * [BUGFIX] TSDB: Fix panic if series is not found when deleting series. * [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors. * [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default configuration values. * [BUGFIX] Fix serving of static assets like fonts and favicon. * [BUGFIX] promtool: Add --lint-fatal option. * [BUGFIX] Changing TotalQueryableSamples from int to int64. * [BUGFIX] tsdb/agent: Ignore duplicate exemplars. * [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate. * [BUGFIX] Stop rule manager before TSDB is stopped. * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io. * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly. * [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page. * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false. * [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments. * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue. * [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset. * [BUGFIX] UI: Fix bug that sets the range input to the resolution. * [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled. * [BUGFIX] Parser: Specify type in metadata parser errors. * [BUGFIX] Scrape: Fix label limit changes not applying. * [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch. * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk. * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set. * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set. * [BUGFIX] Remote-write: Fix deadlock when stopping a shard. * [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s. * [BUGFIX] Promtool: Make exit codes more consistent. * [BUGFIX] Promtool: Fix flakiness of rule testing. * [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write irrecoverably fails. * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator. * [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks. * [BUGFIX] TSDB: Fix logging of exemplar storage size. * [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes. * [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets. * [BUGFIX] UI: Fix autocompletion when expression is empty. * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write. * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts. * [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting in a new exit code (3) for linter errors. * [CHANGE] UI: Classic UI removed. * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing. * [CHANGE] PromQL: Promote negative offset and @ modifer to stable features. * [CHANGE] Web: Promote remote-write-receiver to stable. * [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery. * [FEATURE] Add lowercase and uppercase relabel action. * [FEATURE] SD: Add IONOS Cloud integration. * [FEATURE] SD: Add Vultr integration. * [FEATURE] SD: Add Linode SD failure count metric. * [FEATURE] Add prometheus_ready metric. * [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit. Enable with the flag `--enable-feature=auto- gomaxprocs`. * [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query. Additionally, per-step statistics are available with --enable- feature=promql-per-step-stats and using stats=all in the query API. Enable with the flag `--enable-feature=per-step-stats`. * [FEATURE] Config: Add stripPort template function. * [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended. * [FEATURE] SD: Enable target discovery in own K8s namespace. * [FEATURE] SD: Add provider ID label in K8s SD. * [FEATURE] Web: Add limit field to the rules API. * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role. * [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels. * [ENHANCEMENT] TSDB: Memory optimizations. * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL. * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header. * [ENHANCEMENT] Add stripDomain to template function. * [ENHANCEMENT] UI: Enable active search through dropped targets. * [ENHANCEMENT] promtool: support matchers when querying label * [ENHANCEMENT] Add agent mode identifier. * [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup. * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures. * [ENHANCEMENT] Azure SD: Add an optional resource_group configuration. * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1 EndpointSlice (previously only discovery.k8s.io/v1beta1 EndpointSlice was supported). * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods. * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens. * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2. * [ENHANCEMENT] Config: Support overriding minimum TLS version. * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag `--storage.tsdb.head-chunks-write- queue-size`. * [ENHANCEMENT] HTTP SD: Add a failure counter. * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests. * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni. * [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape. * [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1. * [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read. * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar. * [ENHANCEMENT] UI: Improve graph colors that were hard to see. * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels. * [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces. * [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver. * [ENHANCEMENT] Remote-write: Shard up more when backlogged. * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance. * [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap. * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write. * [ENHANCEMENT] TSDB: Improve label matching performance. * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar. * [ENHANCEMENT] UI: Optimize the target page and add a search bar. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2598=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2598=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2598=1 * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-2598=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-2598=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * firewalld-prometheus-config-0.1-150100.4.17.1 * golang-github-prometheus-prometheus-2.37.6-150100.4.17.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * firewalld-prometheus-config-0.1-150100.4.17.1 * golang-github-prometheus-prometheus-2.37.6-150100.4.17.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.37.6-150100.4.17.1 * SUSE Manager Proxy 4.2 Module 4.2 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.37.6-150100.4.17.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-2.37.6-150100.4.17.1 ## References: * https://www.suse.com/security/cve/CVE-2022-41715.html * https://www.suse.com/security/cve/CVE-2022-41723.html * https://www.suse.com/security/cve/CVE-2022-46146.html * https://bugzilla.suse.com/show_bug.cgi?id=1204023 * https://bugzilla.suse.com/show_bug.cgi?id=1208049 * https://bugzilla.suse.com/show_bug.cgi?id=1208298 * https://jira.suse.com/browse/MSQA-665 * https://jira.suse.com/browse/PED-3576 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:38:13 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:38:13 -0000 Subject: SUSE-RU-2023:2595-1: moderate: Maintenance update for SUSE Manager 4.2: Server, Proxy and Retail Branch Server Message-ID: <170903389365.21888.5517673741256362340@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.2: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2023:2595-1 Rating: moderate References: * bsc#1179747 * bsc#1186011 * bsc#1203599 * bsc#1205600 * bsc#1206423 * bsc#1207550 * bsc#1207814 * bsc#1207941 * bsc#1208984 * bsc#1209220 * bsc#1209231 * bsc#1209277 * bsc#1209386 * bsc#1209434 * bsc#1209508 * bsc#1209877 * bsc#1209915 * bsc#1209926 * bsc#1210011 * bsc#1210086 * bsc#1210101 * bsc#1210107 * bsc#1210154 * bsc#1210162 * bsc#1210232 * bsc#1210311 * bsc#1210406 * bsc#1210437 * bsc#1210458 * bsc#1210659 * bsc#1210835 * bsc#1210957 * bsc#1211330 * bsc#1211956 * bsc#1211958 * bsc#1212096 * bsc#1212363 * jsc#MSQA-674 Cross-References: * CVE-2023-22644 CVSS scores: * CVE-2023-22644 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 * SUSE Manager Server 4.2 Module 4.2 An update that solves one vulnerability, contains one feature and has 36 recommended fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.2 ### Description: This update fixes the following issues: spacecmd: * Version 4.2.23-1 * Fix argument parsing of distribution_update (bsc#1210458) spacewalk-backend: * Version 4.2.28-1 * Filter CLM modular packages using release strings (bsc#1207814) * Add package details to reposync error logging spacewalk-certs-tools: * Version 4.2.20-1 * Update translations spacewalk-proxy-installer: * version 4.3.11-1 * Fix squid refresh_pattern for "venv-enabled-*.txt" files to avoid serving outdated version of the file (bsc#1211956) spacewalk-ssl-cert-check: * Version 4.2.3-1 * Update translations spacewalk-web: * Version 4.2.35-1 * Show loading indicator on formula details pages (bsc#1179747) * Increase datetimepicker font sizes (bsc#1210437) * Fix an issue where the datetimepicker shows wrong date (bsc#1209231) susemanager-build-keys: * Version 15.3.9 * add SUSE Liberty v2 key (bsc#1212096) * add Debian 12 (bookworm) GPG keys (bsc#1212363) * add new 4096 bit RSA SUSE Package Hub key * Version 15.3.8 * Fix installation of SUSE Linux Enterprise 15 RSA reserve build key * Add new 4096 bit RSA openSUSE build key gpg-pubkey-29b700a4.asc How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Security update for SUSE Manager Server 4.2 ### Description: This update fixes the following issues: branch-network-formula: * Update to version 0.1.1680167239.23f2fec * Remove unnecessary import of "salt.ext.six" cpu-mitigations-formula: * Update to version 0.5.0: * Mark all SUSE Linux Enterprise 15 SP4 and newer and openSUSE 15.4 and newer as supported (bsc#1210835) hub-xmlrpc-api: * Do not strictly require Go 1.18 on SUSE Linux Enterprise 15 SP3 (bsc#1203599) inter-server-sync: * Version 0.2.8 * Correctly detect product name and product version number * Import image channel data only when related software channel is available (bsc#1211330) perl-Satcon: * Version 4.2.3-1 * Accept keys with dots spacecmd: * Version 4.2.23-1 * Fix argument parsing of distribution_update (bsc#1210458) spacewalk-backend: * Version 4.2.28-1 * Filter CLM modular packages using release strings (bsc#1207814) * Add package details to reposync error logging spacewalk-certs-tools: * Version 4.2.20-1 * Update translations spacewalk-java: * Security fixes in version 4.2.50-1: * CVE-2023-22644: Remove web session swap secrets output in logs (bsc#1210086) * CVE-2023-22644: Do not output URL parameters for tiny urls (bsc#1210101) * CVE-2023-22644: Fix session information leak (bsc#1210107) * CVE-2023-22644: Do not output Cobbler xmlrpc token in debug logs (bsc#1210162) * CVE-2023-22644: Fix credentials and other secrets disclosure when debug log is enabled (bsc#1210154) * CVE-2023-22644: Prevent logging formula data (bsc#1209386, bsc#1209434) * Other non-security issues fixed in version 4.2.50-1: * Fix misleading error message regarding SCC credentials removal (bsc#1207941) * Fix issue with `aclChannelTypeCapable` that prevented errata view in deb arch * Refresh pillars after setting custom values via SSM (bsc#1210659) * Report SSM power management errors in 'rhn_web_ui' (bsc#1210406) * Filter CLM modular packages using release strings (bsc#1207814) * Allow processing big state results (bsc#1210957) * Use glassfish-activation-api instead of gnu-jaf * Fix Intenal Server Error when URI contains invalid sysid (bsc#1186011) * kernel options: only add quotes if there is a space in the value (bsc#1209926) * Fix link to Knowledge Base articles (bsc#1210311) * Remove channels from client after transfer to a different organization (bsc#1209220) * Fix displaying system channels when no base product is installed (bsc#1206423) * Fix broken ifcfg grub option on reinstallation (bsc#1210232) * Fix NPE in Cobbler system sync when server has no creator set * Add listSystemEvents missing API endpoint (bsc#1209877) spacewalk-setup: * Version 4.2.12-1 * Enable netapi clients in master configuration (required for Salt 3006) spacewalk-utils: * Version 4.2.19-1 * spacewalk-hostname-rename remains stuck at refreshing pillars (bsc#1207550) spacewalk-web: * Version 4.2.35-1 * Show loading indicator on formula details pages (bsc#1179747) * Increase datetimepicker font sizes (bsc#1210437) * Fix an issue where the datetimepicker shows wrong date (bsc#1209231) supportutils-plugin-susemanager: * Version 4.2.7-1 * Fix property name to tune for salt events queue processing susemanager: * version 4.3.27-1 * Use newest venv-salt-minion version available to generate the venv- enabled-*.txt file in bootstrap repos (bsc#1211958) * Version 4.2.41-1 * Add bootstrap repository definitions for openSUSE Leap 15.5 * Add bootstrap repository definitions for SUSE Linux Enterprise Server 15 SP5 susemanager-build-keys: * Version 15.3.9 * add SUSE Liberty v2 key (bsc#1212096) * add Debian 12 (bookworm) GPG keys (bsc#1212363) * add new 4096 bit RSA SUSE Package Hub key * Version 15.3.8 * Fix installation of SUSE Linux Enterprise 15 RSA reserve build key * Add new 4096 bit RSA openSUSE build key gpg-pubkey-29b700a4.asc susemanager-sls: * Version 4.2.34-1 * Trust new Liberty Linux v2 key (bsc#1212096) susemanager-doc-indexes: * Salt version changed to 3006.0 * Added note for clarification between self-installed and cloud instances of Ubuntu * Improved pay-as-you-go documentation in the Install and Upgrade Guide (bsc#1208984) * Added comment about activation keys for LTSS clients in Client Configuration Guide (bsc#1210011) * Updated API script examples to Python 3 in Administration Guide and Large Deployment Guide * Change cleanup Salt Client description * Added instruction for Cobbler to use the correct label in Client Configuration Guide distro label (bsc#1205600) * Added updated options for rhn.conf file in the Administration Guide (bsc#1209508) * Fixed calculation of DB max-connections and align it with the supportconfig checking tool in the Tuning Guide susemanager-docs_en: * Salt version changed to 3006.0 * Added note for clarification between self-installed and cloud instances of Ubuntu * Improved Pay-as-you-go documentation in the Install and Upgrade Guide (bsc#1208984) * Added comment about activation keys for LTSS clients in Client Configuration Guide (bsc#1210011) * Updated API script examples to Python 3 in Administration Guide and Large Deployment Guide * Change cleanup Salt Client description * Added instruction for Cobbler to use the correct label in Client Configuration Guide distro label (bsc#1205600) * Added updated options for rhn.conf file in the Administration Guide (bsc#1209508) * Fixed calculation of DB max-connections and align it with the supportconfig checking tool in the Tuning Guide susemanager-schema: * Version 4.2.28-1 * Filter CLM modular packages using release strings (bsc#1207814) * Repeat schema migrations for module metadata storage (bsc#1209915) susemanager-sls: * Version 4.2.33-1 * Include automatic migration from Salt 3000 to Salt bundle in highstate * Disable salt-minion and remove its config file on cleanup (bsc#1209277) * To update everything on a debian system, call dist-upgrade to be able to install and remove packages virtual-host-gatherer: * Version 1.0.26-1 * Fix cpu calculation in the libvirt module and enhance the data structure by os value How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-2595=1 * SUSE Manager Server 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-2595=1 ## Package List: * SUSE Manager Proxy 4.2 Module 4.2 (noarch) * susemanager-build-keys-web-15.3.9-150300.3.14.1 * python3-spacewalk-certs-tools-4.2.20-150300.3.30.4 * spacewalk-base-minimal-config-4.2.35-150300.3.44.4 * susemanager-build-keys-15.3.9-150300.3.14.1 * spacewalk-base-minimal-4.2.35-150300.3.44.4 * spacewalk-certs-tools-4.2.20-150300.3.30.4 * spacewalk-backend-4.2.28-150300.4.41.4 * spacecmd-4.2.23-150300.4.39.4 * spacewalk-proxy-installer-4.2.12-150300.3.17.2 * spacewalk-ssl-cert-check-4.2.3-150300.3.3.2 * SUSE Manager Server 4.2 Module 4.2 (noarch) * spacewalk-backend-iss-4.2.28-150300.4.41.4 * spacewalk-taskomatic-4.2.50-150300.3.66.5 * spacewalk-base-minimal-config-4.2.35-150300.3.44.4 * spacewalk-utils-extras-4.2.19-150300.3.24.2 * susemanager-schema-4.2.28-150300.3.38.4 * spacewalk-backend-applet-4.2.28-150300.4.41.4 * susemanager-docs_en-pdf-4.2-150300.12.45.2 * spacewalk-backend-xml-export-libs-4.2.28-150300.4.41.4 * uyuni-config-modules-4.2.34-150300.3.51.1 * virtual-host-gatherer-Nutanix-1.0.26-150300.3.15.2 * spacewalk-backend-app-4.2.28-150300.4.41.4 * spacewalk-backend-config-files-4.2.28-150300.4.41.4 * spacewalk-backend-package-push-server-4.2.28-150300.4.41.4 * python3-spacewalk-certs-tools-4.2.20-150300.3.30.4 * susemanager-build-keys-15.3.9-150300.3.14.1 * spacewalk-base-minimal-4.2.35-150300.3.44.4 * branch-network-formula-0.1.1680167239.23f2fec-150300.3.6.2 * susemanager-sls-4.2.34-150300.3.51.1 * spacewalk-base-4.2.35-150300.3.44.4 * virtual-host-gatherer-Kubernetes-1.0.26-150300.3.15.2 * spacewalk-html-4.2.35-150300.3.44.4 * spacewalk-backend-iss-export-4.2.28-150300.4.41.4 * spacewalk-backend-sql-postgresql-4.2.28-150300.4.41.4 * spacewalk-backend-xmlrpc-4.2.28-150300.4.41.4 * spacewalk-java-4.2.50-150300.3.66.5 * cpu-mitigations-formula-0.5.0-150300.3.6.2 * spacecmd-4.2.23-150300.4.39.4 * spacewalk-java-postgresql-4.2.50-150300.3.66.5 * susemanager-build-keys-web-15.3.9-150300.3.14.1 * spacewalk-backend-sql-4.2.28-150300.4.41.4 * susemanager-docs_en-4.2-150300.12.45.2 * virtual-host-gatherer-libcloud-1.0.26-150300.3.15.2 * perl-Satcon-4.2.3-150300.3.3.3 * susemanager-doc-indexes-4.2-150300.12.45.4 * spacewalk-backend-tools-4.2.28-150300.4.41.4 * spacewalk-backend-4.2.28-150300.4.41.4 * spacewalk-certs-tools-4.2.20-150300.3.30.4 * spacewalk-backend-config-files-tool-4.2.28-150300.4.41.4 * spacewalk-java-config-4.2.50-150300.3.66.5 * spacewalk-java-lib-4.2.50-150300.3.66.5 * spacewalk-utils-4.2.19-150300.3.24.2 * virtual-host-gatherer-1.0.26-150300.3.15.2 * virtual-host-gatherer-VMware-1.0.26-150300.3.15.2 * spacewalk-setup-4.2.12-150300.3.18.3 * supportutils-plugin-susemanager-4.2.7-150300.3.15.4 * spacewalk-backend-config-files-common-4.2.28-150300.4.41.4 * spacewalk-backend-server-4.2.28-150300.4.41.4 * SUSE Manager Server 4.2 Module 4.2 (ppc64le s390x x86_64) * inter-server-sync-0.2.8-150300.8.31.2 * susemanager-4.2.42-150300.3.54.4 * susemanager-tools-4.2.42-150300.3.54.4 * hub-xmlrpc-api-0.7-150300.3.12.3 * inter-server-sync-debuginfo-0.2.8-150300.8.31.2 ## References: * https://www.suse.com/security/cve/CVE-2023-22644.html * https://bugzilla.suse.com/show_bug.cgi?id=1179747 * https://bugzilla.suse.com/show_bug.cgi?id=1186011 * https://bugzilla.suse.com/show_bug.cgi?id=1203599 * https://bugzilla.suse.com/show_bug.cgi?id=1205600 * https://bugzilla.suse.com/show_bug.cgi?id=1206423 * https://bugzilla.suse.com/show_bug.cgi?id=1207550 * https://bugzilla.suse.com/show_bug.cgi?id=1207814 * https://bugzilla.suse.com/show_bug.cgi?id=1207941 * https://bugzilla.suse.com/show_bug.cgi?id=1208984 * https://bugzilla.suse.com/show_bug.cgi?id=1209220 * https://bugzilla.suse.com/show_bug.cgi?id=1209231 * https://bugzilla.suse.com/show_bug.cgi?id=1209277 * https://bugzilla.suse.com/show_bug.cgi?id=1209386 * https://bugzilla.suse.com/show_bug.cgi?id=1209434 * https://bugzilla.suse.com/show_bug.cgi?id=1209508 * https://bugzilla.suse.com/show_bug.cgi?id=1209877 * https://bugzilla.suse.com/show_bug.cgi?id=1209915 * https://bugzilla.suse.com/show_bug.cgi?id=1209926 * https://bugzilla.suse.com/show_bug.cgi?id=1210011 * https://bugzilla.suse.com/show_bug.cgi?id=1210086 * https://bugzilla.suse.com/show_bug.cgi?id=1210101 * https://bugzilla.suse.com/show_bug.cgi?id=1210107 * https://bugzilla.suse.com/show_bug.cgi?id=1210154 * https://bugzilla.suse.com/show_bug.cgi?id=1210162 * https://bugzilla.suse.com/show_bug.cgi?id=1210232 * https://bugzilla.suse.com/show_bug.cgi?id=1210311 * https://bugzilla.suse.com/show_bug.cgi?id=1210406 * https://bugzilla.suse.com/show_bug.cgi?id=1210437 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://bugzilla.suse.com/show_bug.cgi?id=1210659 * https://bugzilla.suse.com/show_bug.cgi?id=1210835 * https://bugzilla.suse.com/show_bug.cgi?id=1210957 * https://bugzilla.suse.com/show_bug.cgi?id=1211330 * https://bugzilla.suse.com/show_bug.cgi?id=1211956 * https://bugzilla.suse.com/show_bug.cgi?id=1211958 * https://bugzilla.suse.com/show_bug.cgi?id=1212096 * https://bugzilla.suse.com/show_bug.cgi?id=1212363 * https://jira.suse.com/browse/MSQA-674 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:59:48 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:59:48 -0000 Subject: SUSE-SU-2023:2641-1: moderate: Security update for python39 Message-ID: <170903518841.23935.13733039546321611593@smelt2.prg2.suse.org> # Security update for python39 Announcement ID: SUSE-SU-2023:2641-1 Rating: moderate References: * bsc#1203750 * bsc#1211158 Cross-References: * CVE-2007-4559 CVSS scores: * CVE-2007-4559 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Real Time 15 SP3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for python39 fixes the following issues: * CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750). * Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2641=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2641=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2641=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2641=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python39-debugsource-3.9.16-150300.4.27.1 * python39-base-3.9.16-150300.4.27.1 * python39-testsuite-debuginfo-3.9.16-150300.4.27.1 * python39-base-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-debuginfo-3.9.16-150300.4.27.1 * python39-3.9.16-150300.4.27.1 * python39-curses-3.9.16-150300.4.27.1 * python39-core-debugsource-3.9.16-150300.4.27.1 * python39-tk-debuginfo-3.9.16-150300.4.27.1 * python39-doc-3.9.16-150300.4.27.1 * python39-doc-devhelp-3.9.16-150300.4.27.1 * libpython3_9-1_0-3.9.16-150300.4.27.1 * python39-devel-3.9.16-150300.4.27.1 * python39-idle-3.9.16-150300.4.27.1 * python39-curses-debuginfo-3.9.16-150300.4.27.1 * python39-tk-3.9.16-150300.4.27.1 * python39-dbm-debuginfo-3.9.16-150300.4.27.1 * python39-testsuite-3.9.16-150300.4.27.1 * python39-dbm-3.9.16-150300.4.27.1 * python39-tools-3.9.16-150300.4.27.1 * python39-debuginfo-3.9.16-150300.4.27.1 * openSUSE Leap 15.3 (x86_64) * python39-32bit-3.9.16-150300.4.27.1 * python39-base-32bit-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-32bit-3.9.16-150300.4.27.1 * libpython3_9-1_0-32bit-debuginfo-3.9.16-150300.4.27.1 * python39-base-32bit-3.9.16-150300.4.27.1 * python39-32bit-debuginfo-3.9.16-150300.4.27.1 * openSUSE Leap 15.3 (aarch64_ilp32) * python39-base-64bit-debuginfo-3.9.16-150300.4.27.1 * python39-base-64bit-3.9.16-150300.4.27.1 * libpython3_9-1_0-64bit-3.9.16-150300.4.27.1 * python39-64bit-3.9.16-150300.4.27.1 * python39-64bit-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-64bit-debuginfo-3.9.16-150300.4.27.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * python39-debugsource-3.9.16-150300.4.27.1 * python39-base-3.9.16-150300.4.27.1 * python39-testsuite-debuginfo-3.9.16-150300.4.27.1 * python39-base-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-debuginfo-3.9.16-150300.4.27.1 * python39-3.9.16-150300.4.27.1 * python39-curses-3.9.16-150300.4.27.1 * python39-core-debugsource-3.9.16-150300.4.27.1 * python39-doc-3.9.16-150300.4.27.1 * python39-tk-debuginfo-3.9.16-150300.4.27.1 * python39-doc-devhelp-3.9.16-150300.4.27.1 * python39-devel-3.9.16-150300.4.27.1 * libpython3_9-1_0-3.9.16-150300.4.27.1 * python39-idle-3.9.16-150300.4.27.1 * python39-curses-debuginfo-3.9.16-150300.4.27.1 * python39-tk-3.9.16-150300.4.27.1 * python39-dbm-debuginfo-3.9.16-150300.4.27.1 * python39-testsuite-3.9.16-150300.4.27.1 * python39-dbm-3.9.16-150300.4.27.1 * python39-tools-3.9.16-150300.4.27.1 * python39-debuginfo-3.9.16-150300.4.27.1 * openSUSE Leap 15.4 (x86_64) * python39-32bit-3.9.16-150300.4.27.1 * python39-base-32bit-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-32bit-3.9.16-150300.4.27.1 * libpython3_9-1_0-32bit-debuginfo-3.9.16-150300.4.27.1 * python39-base-32bit-3.9.16-150300.4.27.1 * python39-32bit-debuginfo-3.9.16-150300.4.27.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python39-debugsource-3.9.16-150300.4.27.1 * python39-base-3.9.16-150300.4.27.1 * python39-testsuite-debuginfo-3.9.16-150300.4.27.1 * python39-base-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-debuginfo-3.9.16-150300.4.27.1 * python39-3.9.16-150300.4.27.1 * python39-curses-3.9.16-150300.4.27.1 * python39-core-debugsource-3.9.16-150300.4.27.1 * python39-doc-3.9.16-150300.4.27.1 * python39-tk-debuginfo-3.9.16-150300.4.27.1 * python39-doc-devhelp-3.9.16-150300.4.27.1 * python39-devel-3.9.16-150300.4.27.1 * libpython3_9-1_0-3.9.16-150300.4.27.1 * python39-idle-3.9.16-150300.4.27.1 * python39-curses-debuginfo-3.9.16-150300.4.27.1 * python39-tk-3.9.16-150300.4.27.1 * python39-dbm-debuginfo-3.9.16-150300.4.27.1 * python39-testsuite-3.9.16-150300.4.27.1 * python39-dbm-3.9.16-150300.4.27.1 * python39-tools-3.9.16-150300.4.27.1 * python39-debuginfo-3.9.16-150300.4.27.1 * openSUSE Leap 15.5 (x86_64) * python39-32bit-3.9.16-150300.4.27.1 * python39-base-32bit-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-32bit-3.9.16-150300.4.27.1 * libpython3_9-1_0-32bit-debuginfo-3.9.16-150300.4.27.1 * python39-base-32bit-3.9.16-150300.4.27.1 * python39-32bit-debuginfo-3.9.16-150300.4.27.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * python39-debugsource-3.9.16-150300.4.27.1 * python39-dbm-debuginfo-3.9.16-150300.4.27.1 * python39-base-3.9.16-150300.4.27.1 * python39-curses-3.9.16-150300.4.27.1 * python39-dbm-3.9.16-150300.4.27.1 * python39-tools-3.9.16-150300.4.27.1 * python39-base-debuginfo-3.9.16-150300.4.27.1 * python39-core-debugsource-3.9.16-150300.4.27.1 * python39-idle-3.9.16-150300.4.27.1 * python39-tk-debuginfo-3.9.16-150300.4.27.1 * python39-curses-debuginfo-3.9.16-150300.4.27.1 * libpython3_9-1_0-debuginfo-3.9.16-150300.4.27.1 * python39-3.9.16-150300.4.27.1 * python39-debuginfo-3.9.16-150300.4.27.1 * python39-devel-3.9.16-150300.4.27.1 * libpython3_9-1_0-3.9.16-150300.4.27.1 * python39-tk-3.9.16-150300.4.27.1 ## References: * https://www.suse.com/security/cve/CVE-2007-4559.html * https://bugzilla.suse.com/show_bug.cgi?id=1203750 * https://bugzilla.suse.com/show_bug.cgi?id=1211158 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 11:59:56 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 11:59:56 -0000 Subject: SUSE-SU-2023:2612-1: important: Security update for MozillaThunderbird Message-ID: <170903519642.23976.14902173999721191484@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2023:2612-1 Rating: important References: * bsc#1211922 Cross-References: * CVE-2023-34414 * CVE-2023-34416 CVSS scores: * CVE-2023-34414 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-34414 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-34416 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-34416 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP4 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: Mozilla Thunderbird 102.12 MFSA 2023-21 (bsc#1211922): * CVE-2023-34414: Click-jacking certificate exceptions through rendering lag * CVE-2023-34416: Memory safety bugs fixed in Thunderbird 102.12 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2612=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2612=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-2612=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-2612=1 * SUSE Linux Enterprise Workstation Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-WE-15-SP4-2023-2612=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2023-2612=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debugsource-102.12.0-150200.8.121.1 * MozillaThunderbird-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 * MozillaThunderbird-debuginfo-102.12.0-150200.8.121.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debugsource-102.12.0-150200.8.121.1 * MozillaThunderbird-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 * MozillaThunderbird-debuginfo-102.12.0-150200.8.121.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x) * MozillaThunderbird-debugsource-102.12.0-150200.8.121.1 * MozillaThunderbird-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 * MozillaThunderbird-debuginfo-102.12.0-150200.8.121.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * MozillaThunderbird-debugsource-102.12.0-150200.8.121.1 * MozillaThunderbird-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 * MozillaThunderbird-debuginfo-102.12.0-150200.8.121.1 * SUSE Linux Enterprise Workstation Extension 15 SP4 (x86_64) * MozillaThunderbird-debugsource-102.12.0-150200.8.121.1 * MozillaThunderbird-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 * MozillaThunderbird-debuginfo-102.12.0-150200.8.121.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * MozillaThunderbird-debugsource-102.12.0-150200.8.121.1 * MozillaThunderbird-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 * MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 * MozillaThunderbird-debuginfo-102.12.0-150200.8.121.1 ## References: * https://www.suse.com/security/cve/CVE-2023-34414.html * https://www.suse.com/security/cve/CVE-2023-34416.html * https://bugzilla.suse.com/show_bug.cgi?id=1211922 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:00:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:00:10 -0000 Subject: SUSE-SU-2023:2594-1: important: Security update for SUSE Manager Server 4.2 Message-ID: <170903521082.24048.1424622611486776279@smelt2.prg2.suse.org> # Security update for SUSE Manager Server 4.2 Announcement ID: SUSE-SU-2023:2594-1 Rating: important References: * bsc#1179747 * bsc#1186011 * bsc#1203599 * bsc#1205600 * bsc#1206423 * bsc#1207550 * bsc#1207814 * bsc#1207941 * bsc#1208046 * bsc#1208984 * bsc#1209220 * bsc#1209231 * bsc#1209277 * bsc#1209386 * bsc#1209434 * bsc#1209508 * bsc#1209877 * bsc#1209915 * bsc#1209926 * bsc#1210011 * bsc#1210086 * bsc#1210101 * bsc#1210107 * bsc#1210154 * bsc#1210162 * bsc#1210232 * bsc#1210311 * bsc#1210406 * bsc#1210437 * bsc#1210458 * bsc#1210659 * bsc#1210835 * bsc#1210957 * bsc#1211330 * bsc#1212096 * bsc#1212363 * bsc#1212517 * jsc#MSQA-674 Cross-References: * CVE-2022-46146 * CVE-2023-22644 CVSS scores: * CVE-2022-46146 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-46146 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-22644 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves two vulnerabilities, contains one feature and has 35 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.2 ### Description: This update fixes the following issues: release-notes-susemanager-proxy: * Update to 4.2.13 * Bugs mentioned: bsc#1179747, bsc#1207814, bsc#1209231, bsc#1210437, bsc#1210458 ## Security update for SUSE Manager Server 4.2 ### Description: This update fixes the following issues: release-notes-susemanager: * Update to 4.2.13 * Salt has been upgraded to 3006.0 * SUSE Linux Enterprise Server 15 SP5 Family support has been added * openSUSE Leap 15.5 support has been added * Automatic migration from Salt 3000 to Salt bundle * Grafana upgraded to 9.5.1 * Node exporter upgraded to 1.5.0 * Prometheus upgraded to 2.37.6 * Postgres exporter upgraded to 0.10.1 * CVEs fixed: CVE-2023-22644, CVE-2022-46146 * Bugs mentioned: bsc#1179747, bsc#1186011, bsc#1203599, bsc#1205600, bsc#1206423 bsc#1207550, bsc#1207814, bsc#1207941, bsc#1208984, bsc#1209220 bsc#1209231, bsc#1209277, bsc#1209386, bsc#1209434, bsc#1209508 bsc#1209877, bsc#1209915, bsc#1209926, bsc#1210011, bsc#1210086 bsc#1210101, bsc#1210107, bsc#1210154, bsc#1210162, bsc#1210232 bsc#1210311, bsc#1210406, bsc#1210437, bsc#1210458, bsc#1210659 bsc#1210835, bsc#1210957, bsc#1211330, bsc#1208046, bsc#1212517 bsc#1212096 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2594=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2594=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2594=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2594=1 ## Package List: * SUSE Manager Retail Branch Server 4.2 (noarch) * release-notes-susemanager-proxy-4.2.13-150300.3.64.2 * SUSE Manager Server 4.2 (noarch) * release-notes-susemanager-4.2.13-150300.3.81.1 * openSUSE Leap 15.3 (noarch) * release-notes-susemanager-4.2.13-150300.3.81.1 * release-notes-susemanager-proxy-4.2.13-150300.3.64.2 * SUSE Manager Proxy 4.2 (noarch) * release-notes-susemanager-proxy-4.2.13-150300.3.64.2 ## References: * https://www.suse.com/security/cve/CVE-2022-46146.html * https://www.suse.com/security/cve/CVE-2023-22644.html * https://bugzilla.suse.com/show_bug.cgi?id=1179747 * https://bugzilla.suse.com/show_bug.cgi?id=1186011 * https://bugzilla.suse.com/show_bug.cgi?id=1203599 * https://bugzilla.suse.com/show_bug.cgi?id=1205600 * https://bugzilla.suse.com/show_bug.cgi?id=1206423 * https://bugzilla.suse.com/show_bug.cgi?id=1207550 * https://bugzilla.suse.com/show_bug.cgi?id=1207814 * https://bugzilla.suse.com/show_bug.cgi?id=1207941 * https://bugzilla.suse.com/show_bug.cgi?id=1208046 * https://bugzilla.suse.com/show_bug.cgi?id=1208984 * https://bugzilla.suse.com/show_bug.cgi?id=1209220 * https://bugzilla.suse.com/show_bug.cgi?id=1209231 * https://bugzilla.suse.com/show_bug.cgi?id=1209277 * https://bugzilla.suse.com/show_bug.cgi?id=1209386 * https://bugzilla.suse.com/show_bug.cgi?id=1209434 * https://bugzilla.suse.com/show_bug.cgi?id=1209508 * https://bugzilla.suse.com/show_bug.cgi?id=1209877 * https://bugzilla.suse.com/show_bug.cgi?id=1209915 * https://bugzilla.suse.com/show_bug.cgi?id=1209926 * https://bugzilla.suse.com/show_bug.cgi?id=1210011 * https://bugzilla.suse.com/show_bug.cgi?id=1210086 * https://bugzilla.suse.com/show_bug.cgi?id=1210101 * https://bugzilla.suse.com/show_bug.cgi?id=1210107 * https://bugzilla.suse.com/show_bug.cgi?id=1210154 * https://bugzilla.suse.com/show_bug.cgi?id=1210162 * https://bugzilla.suse.com/show_bug.cgi?id=1210232 * https://bugzilla.suse.com/show_bug.cgi?id=1210311 * https://bugzilla.suse.com/show_bug.cgi?id=1210406 * https://bugzilla.suse.com/show_bug.cgi?id=1210437 * https://bugzilla.suse.com/show_bug.cgi?id=1210458 * https://bugzilla.suse.com/show_bug.cgi?id=1210659 * https://bugzilla.suse.com/show_bug.cgi?id=1210835 * https://bugzilla.suse.com/show_bug.cgi?id=1210957 * https://bugzilla.suse.com/show_bug.cgi?id=1211330 * https://bugzilla.suse.com/show_bug.cgi?id=1212096 * https://bugzilla.suse.com/show_bug.cgi?id=1212363 * https://bugzilla.suse.com/show_bug.cgi?id=1212517 * https://jira.suse.com/browse/MSQA-674 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:01:37 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:01:37 -0000 Subject: SUSE-SU-2023:2646-1: important: Security update for the Linux Kernel Message-ID: <170903529703.24996.5093595184576600120@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2023:2646-1 Rating: important References: * bsc#1065729 * bsc#1109158 * bsc#1142685 * bsc#1152472 * bsc#1152489 * bsc#1155798 * bsc#1160435 * bsc#1166486 * bsc#1172073 * bsc#1174777 * bsc#1177529 * bsc#1186449 * bsc#1189998 * bsc#1189999 * bsc#1191731 * bsc#1193629 * bsc#1194869 * bsc#1195175 * bsc#1195655 * bsc#1195921 * bsc#1196058 * bsc#1197534 * bsc#1197617 * bsc#1198101 * bsc#1198438 * bsc#1198835 * bsc#1199304 * bsc#1200054 * bsc#1202353 * bsc#1202633 * bsc#1203039 * bsc#1203200 * bsc#1203325 * bsc#1203331 * bsc#1203332 * bsc#1203693 * bsc#1203906 * bsc#1204356 * bsc#1204662 * bsc#1204993 * bsc#1205191 * bsc#1205205 * bsc#1205544 * bsc#1205650 * bsc#1205756 * bsc#1205758 * bsc#1205760 * bsc#1205762 * bsc#1205803 * bsc#1205846 * bsc#1206024 * bsc#1206036 * bsc#1206056 * bsc#1206057 * bsc#1206103 * bsc#1206224 * bsc#1206232 * bsc#1206340 * bsc#1206459 * bsc#1206492 * bsc#1206493 * bsc#1206552 * bsc#1206578 * bsc#1206640 * bsc#1206649 * bsc#1206677 * bsc#1206824 * bsc#1206843 * bsc#1206876 * bsc#1206877 * bsc#1206878 * bsc#1206880 * bsc#1206881 * bsc#1206882 * bsc#1206883 * bsc#1206884 * bsc#1206885 * bsc#1206886 * bsc#1206887 * bsc#1206888 * bsc#1206889 * bsc#1206890 * bsc#1206891 * bsc#1206893 * bsc#1206894 * bsc#1206935 * bsc#1206992 * bsc#1207034 * bsc#1207050 * bsc#1207088 * bsc#1207149 * bsc#1207158 * bsc#1207168 * bsc#1207185 * bsc#1207270 * bsc#1207315 * bsc#1207328 * bsc#1207497 * bsc#1207500 * bsc#1207501 * bsc#1207506 * bsc#1207507 * bsc#1207521 * bsc#1207553 * bsc#1207560 * bsc#1207574 * bsc#1207588 * bsc#1207589 * bsc#1207590 * bsc#1207591 * bsc#1207592 * bsc#1207593 * bsc#1207594 * bsc#1207602 * bsc#1207603 * bsc#1207605 * bsc#1207606 * bsc#1207607 * bsc#1207608 * bsc#1207609 * bsc#1207610 * bsc#1207611 * bsc#1207612 * bsc#1207613 * bsc#1207614 * bsc#1207615 * bsc#1207616 * bsc#1207617 * bsc#1207618 * bsc#1207619 * bsc#1207620 * bsc#1207621 * bsc#1207622 * bsc#1207623 * bsc#1207624 * bsc#1207625 * bsc#1207626 * bsc#1207627 * bsc#1207628 * bsc#1207629 * bsc#1207630 * bsc#1207631 * bsc#1207632 * bsc#1207633 * bsc#1207634 * bsc#1207635 * bsc#1207636 * bsc#1207637 * bsc#1207638 * bsc#1207639 * bsc#1207640 * bsc#1207641 * bsc#1207642 * bsc#1207643 * bsc#1207644 * bsc#1207645 * bsc#1207646 * bsc#1207647 * bsc#1207648 * bsc#1207649 * bsc#1207650 * bsc#1207651 * bsc#1207652 * bsc#1207653 * bsc#1207734 * bsc#1207768 * bsc#1207769 * bsc#1207770 * bsc#1207771 * bsc#1207773 * bsc#1207795 * bsc#1207827 * bsc#1207842 * bsc#1207845 * bsc#1207875 * bsc#1207878 * bsc#1207935 * bsc#1207948 * bsc#1208050 * bsc#1208076 * bsc#1208081 * bsc#1208105 * bsc#1208107 * bsc#1208128 * bsc#1208130 * bsc#1208149 * bsc#1208153 * bsc#1208183 * bsc#1208212 * bsc#1208219 * bsc#1208290 * bsc#1208368 * bsc#1208420 * bsc#1208428 * bsc#1208429 * bsc#1208449 * bsc#1208534 * bsc#1208541 * bsc#1208542 * bsc#1208570 * bsc#1208588 * bsc#1208598 * bsc#1208599 * bsc#1208600 * bsc#1208602 * bsc#1208604 * bsc#1208605 * bsc#1208607 * bsc#1208619 * bsc#1208628 * bsc#1208700 * bsc#1208758 * bsc#1208759 * bsc#1208776 * bsc#1208777 * bsc#1208784 * bsc#1208787 * bsc#1208815 * bsc#1208816 * bsc#1208829 * bsc#1208837 * bsc#1208843 * bsc#1208845 * bsc#1208848 * bsc#1208864 * bsc#1208902 * bsc#1208948 * bsc#1208976 * bsc#1209008 * bsc#1209052 * bsc#1209092 * bsc#1209159 * bsc#1209256 * bsc#1209258 * bsc#1209262 * bsc#1209287 * bsc#1209288 * bsc#1209290 * bsc#1209292 * bsc#1209367 * bsc#1209457 * bsc#1209504 * bsc#1209532 * bsc#1209556 * bsc#1209600 * bsc#1209635 * bsc#1209636 * bsc#1209637 * bsc#1209684 * bsc#1209687 * bsc#1209693 * bsc#1209739 * bsc#1209779 * bsc#1209788 * bsc#1209798 * bsc#1209799 * bsc#1209804 * bsc#1209805 * bsc#1209856 * bsc#1209871 * bsc#1209927 * bsc#1209980 * bsc#1209982 * bsc#1209999 * bsc#1210034 * bsc#1210050 * bsc#1210158 * bsc#1210165 * bsc#1210202 * bsc#1210203 * bsc#1210206 * bsc#1210216 * bsc#1210230 * bsc#1210294 * bsc#1210301 * bsc#1210329 * bsc#1210336 * bsc#1210409 * bsc#1210439 * bsc#1210449 * bsc#1210450 * bsc#1210469 * bsc#1210498 * bsc#1210506 * bsc#1210533 * bsc#1210551 * bsc#1210629 * bsc#1210644 * bsc#1210647 * bsc#1210725 * bsc#1210741 * bsc#1210762 * bsc#1210763 * bsc#1210764 * bsc#1210765 * bsc#1210766 * bsc#1210767 * bsc#1210768 * bsc#1210769 * bsc#1210770 * bsc#1210771 * bsc#1210775 * bsc#1210783 * bsc#1210791 * bsc#1210793 * bsc#1210806 * bsc#1210816 * bsc#1210817 * bsc#1210827 * bsc#1210940 * bsc#1210943 * bsc#1210947 * bsc#1210953 * bsc#1210986 * bsc#1211025 * bsc#1211037 * bsc#1211043 * bsc#1211044 * bsc#1211089 * bsc#1211105 * bsc#1211113 * bsc#1211131 * bsc#1211140 * bsc#1211205 * bsc#1211263 * bsc#1211280 * bsc#1211281 * bsc#1211299 * bsc#1211387 * bsc#1211414 * bsc#1211449 * bsc#1211465 * bsc#1211519 * bsc#1211564 * bsc#1211590 * bsc#1211592 * bsc#1211593 * bsc#1211595 * bsc#1211654 * bsc#1211686 * bsc#1211687 * bsc#1211688 * bsc#1211689 * bsc#1211690 * bsc#1211691 * bsc#1211692 * bsc#1211693 * bsc#1211714 * bsc#1211796 * bsc#1211804 * bsc#1211807 * bsc#1211808 * bsc#1211820 * bsc#1211836 * bsc#1211847 * bsc#1211855 * bsc#1211960 * bsc#1212129 * bsc#1212154 * bsc#1212155 * bsc#1212158 * jsc#PED-3210 * jsc#PED-3259 * jsc#PED-3692 * jsc#PED-3750 * jsc#PED-3759 * jsc#PED-4022 Cross-References: * CVE-2022-2196 * CVE-2022-36280 * CVE-2022-38096 * CVE-2022-4269 * CVE-2022-45884 * CVE-2022-45885 * CVE-2022-45886 * CVE-2022-45887 * CVE-2022-45919 * CVE-2022-4744 * CVE-2023-0045 * CVE-2023-0122 * CVE-2023-0179 * CVE-2023-0394 * CVE-2023-0461 * CVE-2023-0469 * CVE-2023-0590 * CVE-2023-0597 * CVE-2023-1075 * CVE-2023-1076 * CVE-2023-1077 * CVE-2023-1079 * CVE-2023-1095 * CVE-2023-1118 * CVE-2023-1380 * CVE-2023-1382 * CVE-2023-1513 * CVE-2023-1582 * CVE-2023-1583 * CVE-2023-1611 * CVE-2023-1637 * CVE-2023-1652 * CVE-2023-1670 * CVE-2023-1838 * CVE-2023-1855 * CVE-2023-1989 * CVE-2023-1998 * CVE-2023-2002 * CVE-2023-21102 * CVE-2023-21106 * CVE-2023-2124 * CVE-2023-2156 * CVE-2023-2162 * CVE-2023-2176 * CVE-2023-2235 * CVE-2023-2269 * CVE-2023-22998 * CVE-2023-23000 * CVE-2023-23001 * CVE-2023-23004 * CVE-2023-23006 * CVE-2023-2483 * CVE-2023-25012 * CVE-2023-2513 * CVE-2023-26545 * CVE-2023-28327 * CVE-2023-28410 * CVE-2023-28464 * CVE-2023-3006 * CVE-2023-30456 * CVE-2023-30772 * CVE-2023-31084 * CVE-2023-3141 * CVE-2023-31436 * CVE-2023-3161 * CVE-2023-32233 * CVE-2023-33288 * CVE-2023-33951 * CVE-2023-33952 CVSS scores: * CVE-2022-2196 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-2196 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-38096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4269 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45884 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45884 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-45885 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45885 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-45886 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45886 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-45887 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45887 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-45919 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-45919 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4744 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4744 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0045 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0045 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0122 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0122 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0394 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0394 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0461 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0461 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0469 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0590 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0590 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1075 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1076 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-1077 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1077 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1079 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1079 ( NVD ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1095 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1118 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1382 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1382 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1513 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-1513 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1582 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1582 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1583 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1611 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1611 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1637 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-1637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1670 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-1670 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1838 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1855 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1989 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1989 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1998 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-1998 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2023-2002 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2002 ( NVD ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-21102 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-21102 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-21106 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-21106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2124 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2156 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2156 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2235 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2235 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2269 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-22998 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23000 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-23000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23001 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-23001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23004 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2023-23004 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23006 ( SUSE ): 5.5 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-23006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2483 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-25012 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-25012 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2513 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2513 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-26545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-26545 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28410 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28410 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-28464 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28464 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3006 ( SUSE ): 4.8 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-30456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2023-30456 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2023-30772 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-30772 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3141 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-3141 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-31436 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31436 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-32233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-32233 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-33288 ( SUSE ): 4.8 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-33288 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-33951 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L * CVE-2023-33951 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2023-33952 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-33952 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 69 vulnerabilities, contains six features and has 292 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 AZURE kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154). * CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155). * CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129). * CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600). * CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263). * CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131). * CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288). * CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593). * CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595). * CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855). * CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm- ioctl.c (bsc#1210806). * CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604). * CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647). * CVE-2023-21106: Fixed possible memory corruption due to double free in adreno_set_param of adreno_gpu.c (bsc#1211654). * CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590). * CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760). * CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758). * CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762). * CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803). * CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756). * CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb- core/dvb_frontend.c (bsc#1210783). * CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533). * CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940). * CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294). * CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024). * CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043). * CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287). * CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105). * CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037). * CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498). * CVE-2023-2235: Fixed a use-after-free vulnerability in the Performance Events system that could have been exploited to achieve local privilege escalation (bsc#1210986). * CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992). * CVE-2023-23006: Fixed NULL vs IS_ERR checking in dr_domain_init_resources (bsc#1208845). * CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871). * CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629). * CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506). * CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202). * CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329). * CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336). * CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687). * CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203). * CVE-2023-0394: Fixed a null pointer dereference in the network subcomponent. This flaw could cause system crashes (bsc#1207168). * CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532). * CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052). * CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779). * CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788). * CVE-2023-1583: Fixed a NULL pointer dereference in io_file_bitmap_get in io_uring/filetable.c (bsc#1209637). * CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635). * CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636). * CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290). * CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829). * CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598). * CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599). * CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777). * CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560). * CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843). * CVE-2023-22998: Fixed NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776). * CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816). * CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837). * CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787). * CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700). * CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845). * CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331). * CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332). * CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773). * CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795). * CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bsc#1207050). * CVE-2023-0469: Fixed a use-after-free flaw in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent (bsc#1207521). * CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header bits (bsc#1207034). The following non-security bugs were fixed: * 3c589_cs: Fix an error handling path in tc589_probe() (git-fixes). * ACPI / x86: Add support for LPS0 callback handler (git-fixes). * ACPI: CPPC: Disable FIE if registers in PCC regions (bsc#1210953). * ACPI: Do not build ACPICA with '-Os' (git-fixes). * ACPI: EC: Fix EC address space handler unregistration (bsc#1207149). * ACPI: EC: Fix ECDT probe ordering issues (bsc#1207149). * ACPI: EC: Fix oops when removing custom query handlers (git-fixes). * ACPI: NFIT: fix a potential deadlock during NFIT teardown (git-fixes). * ACPI: PM: Do not turn of unused power resources on the Toshiba Click Mini (git-fixes). * ACPI: PM: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224). * ACPI: PM: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224). * ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent (git-fixes). * ACPI: VIOT: Initialize the correct IOMMU fwspec (git-fixes). * ACPI: battery: Fix missing NUL-termination with large strings (git-fixes). * ACPI: bus: Ensure that notify handlers are not running after removal (git- fixes). * ACPI: processor: Fix evaluating _PDC method when running as Xen dom0 (git- fixes). * ACPI: resource: Add IRQ override quirk for LG UltraPC 17U70P (git-fixes). * ACPI: resource: Add IRQ overrides for MAINGEAR Vector Pro 2 models (git- fixes). * ACPI: resource: Add Medion S17413 to IRQ override quirk (git-fixes). * ACPI: resource: Add helper function acpi_dev_get_memory_resources() (git- fixes). * ACPI: resource: Do IRQ override on all TongFang GMxRGxx (git-fixes). * ACPI: tables: Add support for NBFT (bsc#1195921). * ACPI: tables: Add support for NBFT (bsc#1206340). * ACPI: video: Add acpi_video_backlight_use_native() helper (bsc#1206843). * ACPI: video: Allow GPU drivers to report no panels (bsc#1206843). * ACPI: video: Fix Lenovo Ideapad Z570 DMI match (git-fixes). * ACPI: video: Fix missing native backlight on Chromebooks (bsc#1206843). * ACPI: video: Refactor acpi_video_get_backlight_type() a bit (bsc#1203693). * ACPI: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224). * ACPI: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224). * ACPI: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224). * ACPI: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224). * ACPI: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224). * ACPI: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224). * ACPI: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224). * ACPI: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224). * ACPI: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224). * ACPI: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224). * ACPI: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224). * ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git- fixes). * ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects (git-fixes). * ACPICA: Allow address_space_handler Install and _REG execution as 2 separate steps (bsc#1207149). * ACPICA: Avoid undefined behavior: applying zero offset to null pointer (git- fixes). * ACPICA: Drop port I/O validation for some regions (git-fixes). * ACPICA: include/acpi/acpixf.h: Fix indentation (bsc#1207149). * ACPICA: nsrepair: handle cases without a return value correctly (git-fixes). * ALSA: asihpi: check pao in control_message() (git-fixes). * ALSA: caiaq: input: Add error handling for unsupported input methods in `snd_usb_caiaq_input_init` (git-fixes). * ALSA: cs46xx: mark snd_cs46xx_download_image as static (git-fixes). * ALSA: emu10k1: do not create old pass-through playback device on Audigy (git-fixes). * ALSA: emu10k1: fix capture interrupt handler unlinking (git-fixes). * ALSA: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes). * ALSA: firewire-digi00x: prevent potential use after free (git-fixes). * ALSA: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes). * ALSA: hda/ca0132: add quirk for EVGA X299 DARK (git-fixes). * ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes). * ALSA: hda/ca0132: minor fix for allocation size (git-fixes). * ALSA: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git- fixes). * ALSA: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes). * ALSA: hda/conexant: add a new hda codec SN6180 (git-fixes). * ALSA: hda/hdmi: Preserve the previous PCM device upon re-enablement (git- fixes). * ALSA: hda/hdmi: disable KAE for Intel DG2 (git-fixes). * ALSA: hda/realtek - fixed wrong gpio assigned (git-fixes). * ALSA: hda/realtek: Add Acer Predator PH315-54 (git-fixes). * ALSA: hda/realtek: Add Lenovo P3 Tower platform (git-fixes). * ALSA: hda/realtek: Add Positivo N14KP6-TG (git-fixes). * ALSA: hda/realtek: Add a quirk for HP EliteDesk 805 (git-fixes). * ALSA: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes). * ALSA: hda/realtek: Add quirk for 2nd ASUS GU603 (git-fixes). * ALSA: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes). * ALSA: hda/realtek: Add quirk for ASUS UM3402YAR using CS35L41 (git-fixes). * ALSA: hda/realtek: Add quirk for Clevo L140AU (git-fixes). * ALSA: hda/realtek: Add quirk for Clevo NS50AU (git-fixes). * ALSA: hda/realtek: Add quirk for Clevo X370SNW (git-fixes). * ALSA: hda/realtek: Add quirk for HP EliteBook G10 laptops (git-fixes). * ALSA: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC (git-fixes). * ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes). * ALSA: hda/realtek: Add quirk for ThinkPad P1 Gen 6 (git-fixes). * ALSA: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git- fixes). * ALSA: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes). * ALSA: hda/realtek: Add quirks for some Clevo laptops (git-fixes). * ALSA: hda/realtek: Apply HP B&O top speaker profile to Pavilion 15 (git- fixes). * ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git- fixes). * ALSA: hda/realtek: Enable headset onLenovo M70/M90 (git-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git- fixes). * ALSA: hda/realtek: Fix mute and micmute LEDs for an HP laptop (git-fixes). * ALSA: hda/realtek: Fix mute and micmute LEDs for yet another HP laptop (git- fixes). * ALSA: hda/realtek: Fix support for Dell Precision 3260 (git-fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes). * ALSA: hda/realtek: Remove specific patch for Dell Precision 3260 (git- fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git- fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git- fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs, speaker do not work for a HP platform (git-fixes). * ALSA: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes). * ALSA: hda/realtek: support HP Pavilion Aero 13-be0xxx Mute LED (git-fixes). * ALSA: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git- fixes). * ALSA: hda/sigmatel: fix S/PDIF out on Intel D _45_ motherboards (git-fixes). * ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() (git-fixes). * ALSA: hda: Add NVIDIA codec IDs a3 through a7 to patch table (git-fixes). * ALSA: hda: Do not unset preset when cleaning up codec (git-fixes). * ALSA: hda: Fix Oops by 9.1 surround channel names (git-fixes). * ALSA: hda: Fix unhandled register update during auto-suspend period (git- fixes). * ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git- fixes). * ALSA: hda: Match only Intel devices with CONTROLLER_IN_GPU() (git-fixes). * ALSA: hda: cs35l41: Enable Amp High Pass Filter (git-fixes). * ALSA: hda: intel-dsp-config: add MTL PCI id (git-fixes). * ALSA: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes). * ALSA: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes). * ALSA: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes). * ALSA: ice1712: Do not left ice->gpio_mutex locked in aureon_add_controls() (git-fixes). * ALSA: memalloc: Workaround for Xen PV (git-fixes). * ALSA: oss: avoid missing-prototype warnings (git-fixes). * ALSA: pci: lx6464es: fix a debug loop (git-fixes). * ALSA: usb-audio: Add a sample rate workaround for Line6 Pod Go (git-fixes). * ALSA: usb-audio: Add quirk for Pioneer DDJ-800 (git-fixes). * ALSA: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes). * ALSA: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes). * ALSA: ymfpci: Fix BUG_ON in probe function (git-fixes). * ARM64: dts: Add DTS files for bcmbca SoC BCM6858 (git-fixes). * ARM: 9290/1: uaccess: Fix KASAN false-positives (git-fixes). * ARM: 9296/1: HP Jornada 7XX: fix kernel-doc warnings (git-fixes). * ARM: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes). * ARM: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes). * ARM: bcm2835_defconfig: Enable the framebuffer (git-fixes). * ARM: defconfig: drop CONFIG_DRM_RCAR_LVDS (git-fixes). * ARM: dts: am5748: keep usb4_tm disabled (git-fixes) * ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (git- fixes). * ARM: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes). * ARM: dts: exynos: correct TMU phandle in Exynos4 (git-fixes). * ARM: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes). * ARM: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes). * ARM: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes). * ARM: dts: exynos: correct TMU phandle in Odroid XU (git-fixes). * ARM: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes). * ARM: dts: exynos: correct wr-active property in Exynos3250 Rinato (git- fixes). * ARM: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes). * ARM: dts: gta04: fix excess dma channel usage (git-fixes). * ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes). * ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes). * ARM: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes) * ARM: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes). * ARM: dts: imx: Fix pca9547 i2c-mux node name (git-fixes). * ARM: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes). * ARM: dts: qcom: ipq8064: Fix the PCI I/O port range (git-fixes). * ARM: dts: qcom: ipq8064: reduce pci IO size to 64K (git-fixes). * ARM: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes) * ARM: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes). * ARM: dts: rockchip: add power-domains property to dp node on rk3288 (git- fixes). * ARM: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes). * ARM: dts: s5pv210: correct MIPI CSIS clock name (git-fixes). * ARM: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes). * ARM: dts: stm32: add missing usbh clock and fix clk order on (git-fixes) * ARM: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes) * ARM: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes). * ARM: dts: vf610: Fix pca9548 i2c-mux node names (git-fixes). * ARM: imx: Call ida_simple_remove() for ida_simple_get (git-fixes). * ARM: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes) * ARM: omap: remove debug-leds driver (git-fixes) * ARM: remove some dead code (git-fixes) * ARM: renumber bits related to _TIF_WORK_MASK (git-fixes) * ARM: s3c: fix s3c64xx_set_timer_source prototype (git-fixes). * ARM: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes) * ARM: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes). * ASN.1: Fix check for strdup() success (git-fixes). * ASOC: Intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15 (git- fixes). * ASoC: Intel: Skylake: Fix declaration of enum skl_ch_cfg (git-fixes). * ASoC: Intel: Skylake: Fix driver hang during shutdown (git-fixes). * ASoC: Intel: avs: Access path components under lock (git-fixes). * ASoC: Intel: avs: Fix declaration of enum avs_channel_config (git-fixes). * ASoC: Intel: avs: Implement PCI shutdown (git-fixes). * ASoC: Intel: avs: Use min_t instead of min with cast (git-fixes). * ASoC: Intel: boards: fix spelling in comments (git-fixes). * ASoC: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: bytcht_es8316: move comment to the right place (git-fixes). * ASoC: Intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750 (git- fixes). * ASoC: Intel: bytcr_rt5640: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: bytcr_rt5651: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: bytcr_wm5102: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: soc-acpi-byt: Fix "WM510205" match no longer working (git- fixes). * ASoC: Intel: soc-acpi: fix copy-paste issue in topology names (git-fixes). * ASoC: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git- fixes). * ASoC: Intel: sof_es8336: Drop reference count of ACPI device after use (git- fixes). * ASoC: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes). * ASoC: SOF: Intel: MTL: Fix the device description (git-fixes). * ASoC: SOF: ipc4-topology: set dmic dai index from copier (git-fixes). * ASoC: SOF: ipc4: Ensure DSP is in D0I0 during sof_ipc4_set_get_data() (git- fixes). * ASoC: adau7118: do not disable regulators on device unbind (git-fixes). * ASoC: amd: acp-es8336: Drop reference count of ACPI device after use (git- fixes). * ASoC: codecs: Change bulk clock voting to optional voting in digital codecs (git-fixes). * ASoC: codecs: lpass: fix incorrect mclk rate (git-fixes). * ASoC: codecs: rx-macro: move clk provider to managed variants (git-fixes). * ASoC: codecs: rx-macro: move to individual clks from bulk (git-fixes). * ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes). * ASoC: codecs: tx-macro: move clk provider to managed variants (git-fixes). * ASoC: codecs: tx-macro: move to individual clks from bulk (git-fixes). * ASoC: codecs: wsa881x: do not set can_multi_write flag (git-fixes). * ASoC: cs35l41: Only disable internal boost (git-fixes). * ASoC: cs42l56: fix DT probe (git-fixes). * ASoC: dt-bindings: meson: fix gx-card codec node regex (git-fixes). * ASoC: dwc: limit the number of overrun messages (git-fixes). * ASoC: es8316: Handle optional IRQ assignment (git-fixes). * ASoC: fsl-asoc-card: Fix naming of AC'97 CODEC widgets (git-fixes). * ASoC: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes). * ASoC: fsl_micfil: Correct the number of steps on SX controls (git-fixes). * ASoC: fsl_micfil: Fix error handler with pm_runtime_enable (git-fixes). * ASoC: fsl_mqs: move of_node_put() to the correct location (git-fixes). * ASoC: fsl_sai: Update to modern clocking terminology (git-fixes). * ASoC: fsl_ssi: Rename AC'97 streams to avoid collisions with AC'97 CODEC (git-fixes). * ASoC: hdac_hdmi: use set_stream() instead of set_tdm_slots() (git-fixes). * ASoC: kirkwood: Iterate over array indexes instead of using pointer math (git-fixes). * ASoC: lpass: Fix for KASAN use_after_free out of bounds (git-fixes). * ASoC: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes). * ASoC: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes). * ASoC: mchp-spdifrx: fix controls which rely on rsr register (git-fixes). * ASoC: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes). * ASoC: rsnd: fixup #endif position (git-fixes). * ASoC: rt1308-sdw: add the default value of some registers (git-fixes). * ASoC: rt5682: Disable jack detection interrupt during suspend (git-fixes). * ASoC: rt715-sdca: fix clock stop prepare timeout issue (git-fixes). * ASoC: soc-compress.c: fixup private_data on snd_soc_new_compress() (git- fixes). * ASoC: soc-compress: Inherit atomicity from DAI link for Compress FE (git- fixes). * ASoC: soc-compress: Reposition and add pcm_mutex (git-fixes). * ASoC: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git- fixes). * ASoC: soc-pcm: fix hw->formats cleared by soc_pcm_hw_init() for dpcm (git- fixes). * ASoC: ssm2602: Add workaround for playback distortions (git-fixes). * ASoC: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes). * ASoC: topology: Properly access value coming from topology file (git-fixes). * ASoC: topology: Return -ENOMEM on memory allocation failure (git-fixes). * ASoC: zl38060 add gpiolib dependency (git-fixes). * ASoC: zl38060: Remove spurious gpiolib select (git-fixes). * Add 42a11bf5c543 cgroup/cpuset: Make cpuset_fork() handle CLONE_INTO_CGROUP properly * Bluetooth: Fix crash when replugging CSR fake controllers (git-fixes). * Bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes). * Bluetooth: Fix race condition in hci_cmd_sync_clear (git-fixes). * Bluetooth: Fix race condition in hidp_session_thread (git-fixes). * Bluetooth: Fix support for Read Local Supported Codecs V2 (git-fixes). * Bluetooth: HCI: Fix global-out-of-bounds (git-fixes). * Bluetooth: ISO: Avoid circular locking dependency (git-fixes). * Bluetooth: ISO: Fix possible circular locking dependency (git-fixes). * Bluetooth: ISO: Fix possible circular locking dependency (git-fixes). * Bluetooth: ISO: do not try to remove CIG if there are bound CIS left (git- fixes). * Bluetooth: ISO: fix timestamped HCI ISO data packet parsing (git-fixes). * Bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes). * Bluetooth: L2CAP: Fix potential user-after-free (git-fixes). * Bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes). * Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git- fixes). * Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp (git- fixes). * Bluetooth: Remove codec id field in vendor codec definition (git-fixes). * Bluetooth: SCO: Fix possible circular locking dependency sco_sock_getsockopt (git-fixes). * Bluetooth: Set ISO Data Path on broadcast sink (git-fixes). * Bluetooth: btintel: Add LE States quirk support (git-fixes). * Bluetooth: btqcomsmd: Fix command timeout after setting BD address (git- fixes). * Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes). * Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes). * Bluetooth: btusb: Remove detection of ISO packets over bulk (git-fixes). * Bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set (git- fixes). * Bluetooth: hci_conn: Fix memory leaks (git-fixes). * Bluetooth: hci_conn: Fix not cleaning up on LE Connection failure (git- fixes). * Bluetooth: hci_conn: Refactor hci_bind_bis() since it always succeeds (git- fixes). * Bluetooth: hci_conn: use HCI dst_type values also for BIS (git-fixes). * Bluetooth: hci_core: Detect if an ACL packet is in fact an ISO packet (git- fixes). * Bluetooth: hci_core: fix error handling in hci_register_dev() (git-fixes). * Bluetooth: hci_event: Fix Invalid wait context (git-fixes). * Bluetooth: hci_qca: Fix the teardown problem for real (git-fixes). * Bluetooth: hci_qca: fix debugfs registration (git-fixes). * Bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes). * Bluetooth: hci_sock: purge socket queues in the destruct() callback (git- fixes). * Bluetooth: hci_sync: Fix not indicating power state (git-fixes). * Bluetooth: hci_sync: Fix use HCI_OP_LE_READ_BUFFER_SIZE_V2 (git-fixes). * Bluetooth: hci_sync: cancel cmd_timer if hci_open failed (git-fixes). * Documentation/filesystems: ramfs-rootfs-initramfs: use :Author: (git-fixes). * Documentation/filesystems: sharedsubtree: add section headings (git-fixes). * Documentation/hw-vuln: Document the interaction between IBRS and STIBP (git- fixes). * Documentation: simplify and clarify DCO contribution example language (git- fixes). * Drivers: vmbus: Check for channel allocation before looking up relids (git- fixes). * EDAC/i10nm: Add Intel Emerald Rapids server support (PED-4400). * HID: Add Mapping for System Microphone Mute (git-fixes). * HID: asus: use spinlock to protect concurrent accesses (git-fixes). * HID: asus: use spinlock to safely schedule workers (git-fixes). * HID: bigben: use spinlock to protect concurrent accesses (git-fixes). * HID: bigben: use spinlock to safely schedule workers (git-fixes). * HID: bigben_worker() remove unneeded check on report_field (git-fixes). * HID: core: Fix deadloop in hid_apply_multiplier (git-fixes). * HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git- fixes). * HID: elecom: add support for TrackBall 056E:011C (git-fixes). * HID: google: add jewel USB id (git-fixes). * HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (git- fixes). * HID: logitech-hidpp: Do not restart communication if not necessary (git- fixes). * HID: logitech-hidpp: Do not use the USB serial for USB devices (git-fixes). * HID: logitech-hidpp: Reconcile USB and Unifying serials (git-fixes). * HID: microsoft: Add rumble support to latest xbox controllers (bsc#1211280). * HID: multitouch: Add quirks for flipped axes (git-fixes). * HID: playstation: sanity check DualSense calibration data (git-fixes). * HID: retain initial quirks set up when creating HID devices (git-fixes). * HID: wacom: Add new Intuos Pro Small (PTH-460) device IDs (git-fixes). * HID: wacom: Force pen out of prox if no events have been received in a while (git-fixes). * HID: wacom: Set a default resolution for older tablets (git-fixes). * HID: wacom: add three styli to wacom_intuos_get_tool_type (git-fixes). * HID: wacom: avoid integer overflow in wacom_intuos_inout() (git-fixes). * HID: wacom: generic: Set battery quirk only when we see battery data (git- fixes). * HV: hv_balloon: fix memory leak with using debugfs_lookup() (git-fixes). * IB/IPoIB: Fix legacy IPoIB due to wrong number of queues (git-fixes) * IB/hfi1: Assign npages earlier (git-fixes) * IB/hfi1: Fix SDMA mmu_rb_node not being evicted in LRU order (git-fixes) * IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests (git-fixes) * IB/hfi1: Fix expected receive setup error exit issues (git-fixes) * IB/hfi1: Fix math bugs in hfi1_can_pin_pages() (git-fixes) * IB/hfi1: Fix sdma.h tx->num_descs off-by-one errors (git-fixes) * IB/hfi1: Immediately remove invalid memory from hardware (git-fixes) * IB/hfi1: Reject a zero-length user expected buffer (git-fixes) * IB/hfi1: Remove user expected buffer invalidate race (git-fixes) * IB/hfi1: Reserve user expected TIDs (git-fixes) * IB/hfi1: Restore allocated resources on failed copyout (git-fixes) * IB/hfi1: Update RMT size calculation (git-fixes) * IB/hifi1: add a null check of kzalloc_node in hfi1_ipoib_txreq_init (git- fixes) * IB/mad: Do not call to function that might sleep while in atomic context (git-fixes). * IB/mlx5: Add support for 400G_8X lane speed (git-fixes) * IB/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes) * Input: ads7846 - always set last command to PWRDOWN (git-fixes). * Input: ads7846 - do not check penirq immediately for 7845 (git-fixes). * Input: ads7846 - do not report pressure for ads7845 (git-fixes). * Input: alps - fix compatibility with -funsigned-char (bsc#1209805). * Input: exc3000 - properly stop timer on shutdown (git-fixes). * Input: fix open count when closing inhibited device (git-fixes). * Input: focaltech - use explicitly signed char type (git-fixes). * Input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes). * Input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes). * Input: iqs269a - configure device with a single block write (git-fixes). * Input: iqs269a - drop unused device node references (git-fixes). * Input: iqs269a - increase interrupt handler return delay (git-fixes). * Input: iqs626a - drop unused device node references (git-fixes). * Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes). * Input: xpad - add constants for GIP interface numbers (git-fixes). * KABI FIX FOR NFSv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes). * KABI FIX FOR: NFS: Further optimisations for 'ls -l' (git-fixes). * KABI FIX FOR: NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes). * KABI FIX FOR: NFSv4.1 query for fs_location attr on a new file system (Never, kabi). * KABI FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi). * KABI fix for: NFSv3: handle out-of-order write replies (bsc#1205544). * KEYS: Add missing function documentation (git-fixes). * KEYS: Create static version of public_key_verify_signature (git-fixes). * KEYS: asymmetric: Copy sig and digest in public_key_verify_signature() (git- fixes). * KEYS: asymmetric: Fix ECDSA use via keyctl uapi (git-fixes). * KMP: Remove obsolete KMP obsoletes (bsc#1210469). * KVM: Destroy target device if coalesced MMIO unregistration fails (git- fixes) * KVM: Disallow user memslot with size that exceeds "unsigned long" (git- fixes) * KVM: Do not create VM debugfs files outside of the VM directory (git-fixes) * KVM: Do not set Accessed/Dirty bits for ZERO_PAGE (git-fixes) * KVM: LAPIC: Enable timer posted-interrupt only when mwait/hlt is advertised (git-fixes). * KVM: Prevent module exit until all VMs are freed (git-fixes) * KVM: SVM: Do not rewrite guest ICR on AVIC IPI virtualization failure (git- fixes). * KVM: SVM: Fix benign "bool vs. int" comparison in svm_set_cr0() (git-fixes). * KVM: SVM: Fix potential overflow in SEV's send|receive_update_data() (git- fixes). * KVM: SVM: Require logical ID to be power-of-2 for AVIC entry (git-fixes). * KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid (git- fixes). * KVM: SVM: hyper-v: placate modpost section mismatch error (git-fixes). * KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper (git-fixes). * KVM: VMX: Resume guest immediately when injecting #GP on ECREATE (git- fixes). * KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow (git- fixes). * KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler (git- fixes). * KVM: X86: Fix tlb flush for tdp in kvm_invalidate_pcid() (git-fixes). * KVM: arm64: Do not arm a hrtimer for an already pending timer (git-fixes) * KVM: arm64: Do not return from void function (git-fixes) * KVM: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. (git-fixes) * KVM: arm64: Fix S1PTW handling on RO memslots (git-fixes) * KVM: arm64: Fix bad dereference on MTE-enabled systems (git-fixes) * KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() (git-fixes) * KVM: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. (git-fixes) * KVM: arm64: Free hypervisor allocations if vector slot init fails (git- fixes) * KVM: arm64: GICv4.1: Fix race with doorbell on VPE (git-fixes) * KVM: arm64: Limit length in kvm_vm_ioctl_mte_copy_tags() to INT_MAX (git- fixes) * KVM: arm64: PMU: Restore the guest's EL0 event counting after (git-fixes) * KVM: arm64: Reject 32bit user PSTATE on asymmetric systems (git-fixes) * KVM: arm64: Stop handle_exit() from handling HVC twice when an SError (git- fixes) * KVM: arm64: Treat PMCR_EL1.LC as RES1 on asymmetric systems (git-fixes) * KVM: arm64: nvhe: Eliminate kernel-doc warnings (git-fixes) * KVM: arm64: vgic: Fix exit condition in scan_its_table() (git-fixes) * KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS (git- fixes). * KVM: nVMX: Do not use Enlightened MSR Bitmap for L3 (git-fixes). * KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate (git-fixes). * KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted (git- fixes). * KVM: nVMX: Inject #GP, not #UD, if "generic" VMXON CR0/CR4 check fails (git- fixes). * KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag (git-fixes). * KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1 (git-fixes). * KVM: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like (git-fixes). * KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER (git-fixes). * KVM: s390: selftest: memop: Fix integer literal (git-fixes). * KVM: x86/emulator: Emulate RDPID only if it is enabled in guest (git-fixes). * KVM: x86/mmu: avoid NULL-pointer dereference on page freeing bugs (git- fixes). * KVM: x86/pmu: Ignore pmu->global_ctrl check if vPMU does not support global_ctrl (git-fixes). * KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user() (git- fixes). * KVM: x86/vmx: Do not skip segment attributes if unusable bit is set (git- fixes). * KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (git-fixes). * KVM: x86: Copy filter arg outside kvm_vm_ioctl_set_msr_filter() (git-fixes). * KVM: x86: Do not change ICR on write to APIC_SELF_IPI (git-fixes). * KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception (git-fixes). * KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI (git- fixes). * KVM: x86: Mask off reserved bits in CPUID.8000001FH (git-fixes). * KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES (git-fixes). * KVM: x86: Protect the unused bits in MSR exiting flags (git-fixes). * KVM: x86: Remove a redundant guest cpuid check in kvm_set_cr4() (git-fixes). * KVM: x86: Report deprecated x87 features in supported CPUID (git-fixes). * KVM: x86: do not set st->preempted when going back to user space (git- fixes). * KVM: x86: fix sending PV IPI (git-fixes). * KVM: x86: fix sending PV IPI (git-fixes). * KVM: x86: fix typo in __try_cmpxchg_user causing non-atomicness (git-fixes). * KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race (git-fixes). * Makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200). * NFS: Always initialise fattr->label in nfs_fattr_alloc() (git-fixes). * NFS: Avoid writeback threads getting stuck in mempool_alloc() (git-fixes). * NFS: Cleanup unused rpc_clnt variable (git-fixes). * NFS: Create a new nfs_alloc_fattr_with_label() function (git-fixes). * NFS: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git- fixes). * NFS: Fix an Oops in nfs_d_automount() (git-fixes). * NFS: Fix careless typo (bsc#1209457) * NFS: Further optimisations for 'ls -l' (git-fixes). * NFS: Pass i_size to fscache_unuse_cookie() when a file is released (git- fixes). * NFS: fix NFS Null pointer (bsc#1210725). * NFS: fix disabling of swap (git-fixes). * NFS: nfsiod should not block forever in mempool_alloc() (git-fixes). * NFS: nfsiod should not block forever in mempool_alloc() (git-fixes). * NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL (git-fixes). * NFSD: COMMIT operations must not return NFS?ERR_INVAL (git-fixes). * NFSD: De-duplicate net_generic(nf->nf_net, nfsd_net_id) (git-fixes). * NFSD: Finish converting the NFSv2 GETACL result encoder (git-fixes). * NFSD: Finish converting the NFSv3 GETACL result encoder (git-fixes). * NFSD: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes). * NFSD: Fix nfsd_breaker_owns_lease() return values (git-fixes). * NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git- fixes). * NFSD: Protect against filesystem freezing (git-fixes). * NFSD: Return nfserr_serverfault if splice_ok but buf->pages have data (git- fixes). * NFSD: callback request does not use correct credential for AUTH_SYS (git- fixes). * NFSD: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes). * NFSD: fix problems with cleanup on errors in nfsd4_copy (git-fixes). * NFSD: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes). * NFSD: fix use-after-free on source server when doing inter-server copy (git- fixes). * NFSD: pass range end to vfs_fsync_range() instead of count (git-fixes). * NFSv3: handle out-of-order write replies (bsc#1205544). * NFSv4 expose nfs_parse_server_name function (git-fixes). * NFSv4 handle port presence in fs_location server string (git-fixes). * NFSv4 only print the label when its queried (git-fixes). * NFSv4 remove zero number of fs_locations entries error check (git-fixes). * NFSv4 store server support for fs_location attribute (git-fixes). * NFSv4.1 provide mount option to toggle trunking discovery (git-fixes). * NFSv4.1 query for fs_location attr on a new file system (git-fixes). * NFSv4.1: Fix uninitialised variable in devicenotify (git-fixes). * NFSv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes). * NFSv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes). * NFSv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes). * NFSv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes). * NFSv4.2: Fix initialisation of struct nfs4_label (git-fixes). * NFSv4.2: Fixup CLONE dest file size for zero-length count (git-fixes). * NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes). * NFSv4.x: Fail client initialisation if state manager thread can't run (git- fixes). * NFSv4/pNFS: Always return layout stats on layout return for flexfiles (git- fixes). * NFSv4/pnfs: Fix a use-after-free bug in open (git-fixes). * NFSv4: Add an fattr allocation to _nfs4_discover_trunking() (git-fixes). * NFSv4: Do not hold the layoutget locks across multiple RPC calls (git- fixes). * NFSv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes). * NFSv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes). * NFSv4: Fix a potential state reclaim deadlock (git-fixes). * NFSv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes). * NFSv4: Fix hangs when recovering open state after a server reboot (git- fixes). * NFSv4: Protect the state recovery thread against direct reclaim (git-fixes). * NFSv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes). * NFSv4: keep state manager thread active if swap is enabled (git-fixes). * PCI/ASPM: Remove pcie_aspm_pm_state_change() (git-fixes). * PCI/DPC: Await readiness of secondary bus after reset (git-fixes). * PCI/EDR: Clear Device Status after EDR error recovery (git-fixes). * PCI/IOV: Enlarge virtfn sysfs name buffer (git-fixes). * PCI/PM: Always disable PTM for all devices during suspend (git-fixes). * PCI/PM: Avoid putting Elo i2 PCIe Ports in D3cold (git-fixes). * PCI/PM: Fix bridge_d3_blacklist Elo i2 overwrite of Gigabyte X299 (git- fixes). * PCI/PM: Observe reset delay irrespective of bridge_d3 (git-fixes). * PCI/PTM: Add pci_suspend_ptm() and pci_resume_ptm() (git-fixes). * PCI: Add ACS quirk for Wangxun NICs (git-fixes). * PCI: Add SolidRun vendor ID (git-fixes). * PCI: Align extra resources for hotplug bridges properly (git-fixes). * PCI: Avoid FLR for AMD FCH AHCI adapters (git-fixes). * PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git- fixes). * PCI: Fix dropping valid root bus resources with .end = zero (git-fixes). * PCI: Reduce warnings on possible RW1C corruption (git-fixes). * PCI: Take other bus devices into account when distributing resources (git- fixes). * PCI: Unify delay handling for reset and resume (git-fixes). * PCI: aardvark: Check return value of generic_handle_domain_irq() when processing INTx IRQ (git-fixes). * PCI: aardvark: Fix link training (git-fixes). * PCI: dwc: Add dw_pcie_ops.host_deinit() callback (git-fixes). * PCI: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes). * PCI: hotplug: Allow marking devices as disconnected during bind/unbind (git- fixes). * PCI: hv: Add a per-bus mutex state_lock (bsc#1207185). * PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185). * PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185). * PCI: hv: Use async probing to reduce boot time (bsc#1207185). * PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185). * PCI: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes). * PCI: imx6: Install the fault handler only on compatible match (git-fixes). * PCI: loongson: Add more devices that need MRRS quirk (git-fixes). * PCI: loongson: Prevent LS7A MRRS increases (git-fixes). * PCI: mediatek-gen3: Assert resets to ensure expected init state (git-fixes). * PCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains() (git- fixes). * PCI: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git- fixes). * PCI: qcom: Fix host-init error handling (git-fixes). * PCI: qcom: Fix pipe clock imbalance (git-fixes). * PCI: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes). * PCI: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes). * PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes). * PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes). * PCI: xgene: Revert "PCI: xgene: Use inbound resources for setup" (git- fixes). * PM: hibernate: Do not get block device exclusively in test_resume mode (git- fixes). * PM: hibernate: Turn snapshot_test into global variable (git-fixes). * PM: hibernate: fix load_image_and_restore() error path (git-fixes). * RDMA/bnxt_re: Fix a possible memory leak (git-fixes) * RDMA/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx (git-fixes) * RDMA/bnxt_re: Fix the page_size used during the MR creation (git-fixes) * RDMA/cm: Trace icm_send_rej event before the cm state is reset (git-fixes) * RDMA/cma: Allow UD qp_type to join multicast only (git-fixes) * RDMA/core: Fix GID entry ref leak when create_ah fails (git-fixes) * RDMA/core: Fix ib block iterator counter overflow (bsc#1207878). * RDMA/core: Fix ib block iterator counter overflow (git-fixes) * RDMA/core: Fix multiple -Warray-bounds warnings (git-fixes) * RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish() (git-fixes) * RDMA/cxgb4: add null-ptr-check after ip_dev_find() (git-fixes) * RDMA/cxgb4: remove unnecessary NULL check in __c4iw_poll_cq_one() (git- fixes) * RDMA/efa: Fix unsupported page sizes in device (git-fixes) * RDMA/hns: Fix base address table allocation (git-fixes) * RDMA/hns: Fix timeout attr in query qp for HIP08 (git-fixes) * RDMA/hns: Modify the value of long message loopback slice (git-fixes) * RDMA/irdma: Add SW mechanism to generate completions on error (jsc#SLE-18383). * RDMA/irdma: Add ipv4 check to irdma_find_listener() (git-fixes) * RDMA/irdma: Cap MSIX used to online CPUs + 1 (git-fixes) * RDMA/irdma: Do not generate SW completions for NOPs (git-fixes) * RDMA/irdma: Do not generate SW completions for NOPs (jsc#SLE-18383). * RDMA/irdma: Fix Local Invalidate fencing (git-fixes) * RDMA/irdma: Fix RQ completion opcode (jsc#SLE-18383). * RDMA/irdma: Fix drain SQ hang with no completion (jsc#SLE-18383). * RDMA/irdma: Fix inline for multiple SGE's (jsc#SLE-18383). * RDMA/irdma: Fix memory leak of PBLE objects (git-fixes) * RDMA/irdma: Fix potential NULL-ptr-dereference (git-fixes) * RDMA/irdma: Increase iWARP CM default rexmit count (git-fixes) * RDMA/irdma: Prevent QP use after free (git-fixes) * RDMA/irdma: Remove enum irdma_status_code (jsc#SLE-18383). * RDMA/irdma: Remove excess error variables (jsc#SLE-18383). * RDMA/mana: Remove redefinition of basic u64 type (bsc#1210741 jsc#PED-4022). * RDMA/mana: hide new rdma_driver_ids (bsc#1210741 jsc#PED-4022). * RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter (bsc#1210741 jsc#PED-4022). * RDMA/mana_ib: Fix a bug when the PF indicates more entries for registering memory on first packet (bsc#1210741 jsc#PED-4022). * RDMA/mana_ib: Prevent array underflow in mana_ib_create_qp_raw() (bsc#1210741 jsc#PED-4022). * RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (jsc#SLE-19255). * RDMA/mlx5: Fix flow counter query via DEVX (git-fixes) * RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device (git-fixes) * RDMA/mlx5: Fix validation of max_rd_atomic caps for DC (git-fixes) * RDMA/mlx5: Use correct device num_ports when modify DC (git-fixes) * RDMA/mlx5: Use rdma_umem_for_each_dma_block() (git-fixes) * RDMA/rdmavt: Delete unnecessary NULL check (git-fixes) * RDMA/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes) * RDMA/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git- fixes) * RDMA/rxe: Fix inaccurate constants in rxe_type_info (git-fixes) * RDMA/rxe: Fix missing memory barriers in rxe_queue.h (git-fixes) * RDMA/rxe: Fix mr->map double free (git-fixes) * RDMA/rxe: Fix oops with zero length reads (git-fixes) * RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task" (git-fixes) * RDMA/rxe: Make responder handle RDMA Read failures (git-fixes) * RDMA/rxe: Prevent faulty rkey generation (git-fixes) * RDMA/rxe: Remove tasklet call from rxe_cq.c (git-fixes) * RDMA/siw: Fix potential page_array out of range access (git-fixes) * RDMA/siw: Fix user page pinning accounting (git-fixes) * RDMA/siw: Remove namespace check from siw_netdev_event() (git-fixes) * RDMA/srp: Move large values to a new enum for gcc13 (git-fixes) * RDMA/srpt: Add a check for valid 'mad_agent' pointer (git-fixes) * RDMA/usnic: use iommu_map_atomic() under spin_lock() (git-fixes) * RDMA: Handle the return code from dma_resv_wait_timeout() properly (git- fixes) * SMB3.1.1: add new tree connect ShareFlags (bsc#1193629). * SMB3: Add missing locks to protect deferred close file list (git-fixes). * SMB3: Close all deferred handles of inode in case of handle lease break (bsc#1193629). * SMB3: Close deferred file handles in case of handle lease break (bsc#1193629). * SMB3: drop reference to cfile before sending oplock break (bsc#1193629). * SMB3: force unmount was failing to close deferred close files (bsc#1193629). * SUNRPC allow for unspecified transport time in rpc_clnt_add_xprt (git- fixes). * SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes). * SUNRPC: Do not leak netobj memory when gss_read_proxy_verf() fails (git- fixes). * SUNRPC: Fix a server shutdown leak (git-fixes). * SUNRPC: Fix missing release socket in rpc_sockname() (git-fixes). * SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed (git-fixes). * SUNRPC: Fix socket waits for write buffer space (git-fixes). * SUNRPC: Return true/false (not 1/0) from bool functions (git-fixes). * SUNRPC: Update trace flags (git-fixes). * SUNRPC: Use BIT() macro in rpc_show_xprt_state() (git-fixes). * SUNRPC: ensure the matching upcall is in-flight upon downcall (git-fixes). * SUNRPC: fix breakage caused by introduction of rq_xprt_ctxt (bsc#1210775). * Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes). * USB / dwc3: Fix a checkpatch warning in core.c (git-fixes). * USB: UHCI: adjust zhaoxin UHCI controllers OverCurrent bit value (git- fixes). * USB: chipidea: fix memory leak with using debugfs_lookup() (git-fixes). * USB: core: Add routines for endpoint checks in old drivers (git-fixes). * USB: core: Do not hold device lock while reading the "descriptors" sysfs file (git-fixes). * USB: dwc3: fix memory leak with using debugfs_lookup() (git-fixes). * USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes). * USB: dwc3: fix runtime pm imbalance on unbind (git-fixes). * USB: ene_usb6250: Allocate enough memory for full object (git-fixes). * USB: fix memory leak with using debugfs_lookup() (git-fixes). * USB: fotg210: fix memory leak with using debugfs_lookup() (git-fixes). * USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git- fixes). * USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git- fixes). * USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git- fixes). * USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git- fixes). * USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git- fixes). * USB: isp116x: fix memory leak with using debugfs_lookup() (git-fixes). * USB: isp1362: fix memory leak with using debugfs_lookup() (git-fixes). * USB: serial: cp210x: add SCALANCE LPE-9000 device id (git-fixes). * USB: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes). * USB: serial: option: add Quectel EC200U modem (git-fixes). * USB: serial: option: add Quectel EM05-G (CS) modem (git-fixes). * USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes). * USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes). * USB: serial: option: add Quectel EM05CN (SG) modem (git-fixes). * USB: serial: option: add Quectel EM05CN modem (git-fixes). * USB: serial: option: add Quectel RM500U-CN modem (git-fixes). * USB: serial: option: add Telit FE990 compositions (git-fixes). * USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes). * USB: serial: option: add support for VW/Skoda "Carstick LTE" (git-fixes). * USB: sisusbvga: Add endpoint checks (git-fixes). * USB: sl811: fix memory leak with using debugfs_lookup() (git-fixes). * USB: uhci: fix memory leak with using debugfs_lookup() (git-fixes). * USB: usbtmc: Fix direction for 0-length ioctl control messages (git-fixes). * VFS: filename_create(): fix incorrect intent (bsc#1197534). * VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes). * affs: initialize fsdata in affs_truncate() (git-fixes). * alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes) * amdgpu/nv.c: Corrected typo in the video capabilities resolution (git- fixes). * amdgpu: disable powerpc support for the newer display engine (bsc#1194869). * amdgpu: fix build on non-DCN platforms (git-fixes). * apparmor: add a kernel label to use on kernel objects (bsc#1211113). * applicom: Fix PCI device refcount leak in applicom_init() (git-fixes). * arch: fix broken BuildID for arm64 and riscv (bsc#1209798). * arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes) * arm64: Treat ESR_ELx as a 64-bit register (git-fixes) * arm64: atomics: remove LL/SC trampolines (git-fixes) * arm64: cacheinfo: Fix incorrect assignment of signed error value to (git- fixes) * arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes) * arm64: dts: Add DTS files for bcmbca SoC BCM4912 (git-fixes). * arm64: dts: Add DTS files for bcmbca SoC BCM63158 (git-fixes). * arm64: dts: Add base DTS file for bcmbca device Asus GT-AX6000 (git-fixes). * arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name (git-fixes). * arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name (git- fixes). * arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible (git- fixes). * arm64: dts: amlogic: meson-gx: add missing unit address to rng node name (git-fixes). * arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name (git-fixes). * arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name (git-fixes). * arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name (git- fixes). * arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property (git-fixes). * arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name (git-fixes). * arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names (git- fixes). * arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git- fixes). * arm64: dts: arm: drop unused interrupt-names in MHU (git-fixes) * arm64: dts: broadcom: bcm4908: add DT for Netgear RAXE500 (git-fixes). * arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes) * arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes). * arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes). * arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes). * arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes). * arm64: dts: imx8mm: Fix pad control for UART1_DTE_RX (git-fixes). * arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes). * arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes). * arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes) * arm64: dts: imx8mp: correct usb clocks (git-fixes) * arm64: dts: imx8mq-thor96: fix no-mmc property for SDHCI (git-fixes). * arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes) * arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes) * arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git- fixes). * arm64: dts: juno: Add missing MHU secure-irq (git-fixes) * arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes). * arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git- fixes). * arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes). * arm64: dts: meson-g12-common: Make mmc host controller interrupts level- sensitive (git-fixes). * arm64: dts: meson-g12-common: specify full DMC range (git-fixes). * arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes). * arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes). * arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git- fixes). * arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes). * arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git- fixes). * arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes). * arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes). * arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes (git-fixes). * arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git- fixes). * arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes). * arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes). * arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names (git- fixes). * arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git- fixes). * arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY (git-fixes). * arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY (git-fixes). * arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes). * arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size (git-fixes). * arm64: dts: qcom: msm8992-libra: Add CPU regulators (git-fixes). * arm64: dts: qcom: msm8992-libra: Fix the memory map (git-fixes). * arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes). * arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes). * arm64: dts: qcom: msm8996: Add missing DWC3 quirks (git-fixes). * arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes). * arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes). * arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes). * arm64: dts: qcom: pmk8350: Specify PBS register for PON (git-fixes). * arm64: dts: qcom: pmk8350: Use the correct PON compatible (git-fixes). * arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes). * arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes). * arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes). * arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes). * arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes). * arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git- fixes). * arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes). * arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes). * arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes). * arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes). * arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git- fixes). * arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git- fixes). * arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git- fixes). * arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git- fixes). * arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes). * arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes). * arm64: efi: Execute runtime services from a dedicated stack (git-fixes). * arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes). * arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly (git- fixes). * arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes) * arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes). * arm64: make is_ttbrX_addr() noinstr-safe (git-fixes) * arm64: mm: kfence: only handle translation faults (git-fixes) * asm-generic/io.h: suppress endianness warnings for readq() and writeq() (git-fixes). * ata: libata-scsi: Use correct device no in ata_find_dev() (git-fixes). * ata: libata: Fix sata_down_spd_limit() when no link speed is reported (git- fixes). * ata: libata: Set __ATA_BASE_SHT max_sectors (git-fixes). * ata: libata: fix NCQ autosense logic (git-fixes). * ata: pata_macio: Fix compilation warning (git-fixes). * ata: pata_octeon_cf: drop kernel-doc notation (git-fixes). * ata: pata_octeon_cf: fix call to trace_ata_bmdma_stop() (git-fixes). * ath11k: Fix unexpected return buffer manager error for QCA6390 (git-fixes). * ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes). * ath9k: hif_usb: simplify if-if to if-else (git-fixes). * ath9k: htc: clean up statistics macros (git-fixes). * atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes). * audit: update the mailing list in MAINTAINERS (git-fixes). * auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git- fixes). * backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes). * batman-adv: Broken sync while rescheduling delayed work (git-fixes). * bcache: Revert "bcache: use bvec_virt" (git-fixes). * bcache: fix set_at_max_writeback_rate() for multiple attached devices (git- fixes). * bcache: fix wrong bdev parameter when calling bio_alloc_clone() in do_bio_hook() (git-fixes). * bcache: put bch_bio_map() back to correct location in journal_write_unlocked() (git-fixes). * bfq: fix use-after-free in bfq_dispatch_request (git-fixes). * bfq: fix waker_bfqq inconsistency crash (git-fixes). * blacklist.conf: s390/boot: allocate amode31 section in decompressor * blacklist.conf: the commit might cause regression (bsc#1210947) * blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes). * blk-cgroup: properly pin the parent in blkcg_css_online (bsc#1208105). * blk-lib: fix blkdev_issue_secure_erase (git-fixes). * blk-mq: Fix kmemleak in blk_mq_init_allocated_queue (git-fixes). * blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (git- fixes). * blk-mq: fix possible memleak when register 'hctx' failed (git-fixes). * blk-mq: run queue no matter whether the request is the last request (git- fixes). * blk-throttle: fix that io throttle can only work for single bio (git-fixes). * blk-throttle: prevent overflow while calculating wait time (git-fixes). * blk-wbt: fix that 'rwb->wc' is always set to 1 in wbt_init() (git-fixes). * blktrace: Fix output non-blktrace event when blk_classic option enabled (git-fixes). * block, bfq: do not move oom_bfqq (git-fixes). * block, bfq: fix null pointer dereference in bfq_bio_bfqg() (git-fixes). * block, bfq: fix possible uaf for 'bfqq->bic' (git-fixes). * block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq (git-fixes). * block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes). * block, bfq: protect 'bfqd->queued' by 'bfqd->lock' (git-fixes). * block/bfq-iosched.c: use "false" rather than "BLK_RW_ASYNC" (git-fixes). * block/bfq_wf2q: correct weight to ioprio (git-fixes). * block/bio: remove duplicate append pages code (git-fixes). * block: Fix possible memory leak for rq_wb on add_disk failure (git-fixes). * block: add a bdev_max_zone_append_sectors helper (git-fixes). * block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541). * block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541). * block: check minor range in device_add_disk() (git-fixes). * block: clear ->slave_dir when dropping the main slave_dir reference (git- fixes). * block: do not allow splitting of a REQ_NOWAIT bio (git-fixes). * block: do not allow the same type rq_qos add more than once (git-fixes). * block: do not reverse request order when flushing plug list (bsc#1208588 bsc#1208128). * block: ensure iov_iter advances for added pages (git-fixes). * block: fix and cleanup bio_check_ro (git-fixes). * block: fix default IO priority handling again (git-fixes). * block: fix infinite loop for invalid zone append (git-fixes). * block: fix leaking minors of hidden disks (git-fixes). * block: fix memory leak for elevator on add_disk failure (git-fixes). * block: fix missing blkcg_bio_issue_init (bsc#1208107). * block: loop:use kstatfs.f_bsize of backing file to set discard granularity (git-fixes). * block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes). * block: mq-deadline: Fix dd_finish_request() for zoned devices (git-fixes). * block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes). * block: null_blk: Fix null_zone_write() (git-fixes). * block: pop cached rq before potentially blocking rq_qos_throttle() (git- fixes). * block: use bdev_get_queue() in bio.c (git-fixes). * bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() (git- fixes). * bluetooth: Perform careful capability checks in hci_sock_ioctl() (git- fixes). * bnxt: Do not read past the end of test names (jsc#SLE-18978). * bnxt: prevent skb UAF after handing over to PTP worker (jsc#SLE-18978). * bnxt_en: Add missing 200G link speed reporting (jsc#SLE-18978). * bnxt_en: Avoid order-5 memory allocation for TPA data (jsc#SLE-18978). * bnxt_en: Do not initialize PTP on older P3/P4 chips (jsc#SLE-18978). * bnxt_en: Fix mqprio and XDP ring checking logic (jsc#SLE-18978). * bnxt_en: Fix reporting of test result in ethtool selftest (jsc#SLE-18978). * bnxt_en: Fix typo in PCI id to device description string mapping (jsc#SLE-18978). * bnxt_en: fix NQ resource accounting during vf creation on 57500 chips (jsc#SLE-18978). * bnxt_en: set missing reload flag in devlink features (jsc#SLE-18978). * bpf, perf: Use subprog name when reporting subprog ksymbol (git fixes). * bpf, x64: Factor out emission of REX byte in more cases (git-fixes). * bpf: Fix a possible task gone issue with bpf_send_signal_thread helpers (git-fixes). * bpf: Fix extable address check (git-fixes). * bpf: Fix extable fixup offset (git-fixes). * bpf: Skip task with pid=1 in send_signal_common() (git-fixes). * btrfs: backport recent fixes for send/receive into SLE15 SP4/SP5 (bsc#1206036 bsc#1206057 bsc#1206056 bsc#1207500 bsc#1207506 bsc#1207507). * btrfs: fix race between quota enable and quota rescan ioctl (bsc#1207158). * btrfs: fix race between quota rescan and disable leading to NULL pointer deref (bsc#1207158). * btrfs: fix trace event name typo for FLUSH_DELAYED_REFS (git-fixes). * btrfs: move QUOTA_ENABLED check to rescan_should_stop from btrfs_qgroup_rescan_worker (bsc#1207158). * btrfs: qgroup: remove duplicated check in adding qgroup relations (bsc#1207158). * btrfs: qgroup: remove outdated TODO comments (bsc#1207158). * bus: mhi: host: Fix race between channel preparation and M0 event (git- fixes). * bus: mhi: host: Range check CHDBOFF and ERDBOFF (git-fixes). * bus: mhi: host: Remove duplicate ee check for syserr (git-fixes). * bus: mhi: host: Use mhi_tryset_pm_state() for setting fw error state (git- fixes). * bus: sunxi-rsb: Fix error handling in sunxi_rsb_init() (git-fixes). * ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git- fixes). * ca8210: fix mac_len negative array access (git-fixes). * can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes). * can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git- fixes). * can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes). * can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes). * can: j1939: change j1939_netdev_lock type to mutex (git-fixes). * can: j1939: do not wait 250 ms if the same addr was already claimed (git- fixes). * can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate (git-fixes). * can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes). * can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git- fixes). * can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes). * can: kvaser_pciefd: Call request_irq() before enabling interrupts (git- fixes). * can: kvaser_pciefd: Clear listen-only bit if not explicitly requested (git- fixes). * can: kvaser_pciefd: Disable interrupts in probe error path (git-fixes). * can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt (git-fixes). * can: kvaser_pciefd: Empty SRB buffer in probe (git-fixes). * can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() (git- fixes). * can: kvaser_usb: Add struct kvaser_usb_busparams (git-fixes). * can: kvaser_usb: kvaser_usb_leaf: Get capabilities from device (git-fixes). * can: kvaser_usb: kvaser_usb_leaf: Handle CMD_ERROR_EVENT (git-fixes). * can: kvaser_usb: kvaser_usb_leaf: Rename {leaf,usbcan}_cmd_error_event to {leaf,usbcan}_cmd_can_error_event (git-fixes). * can: kvaser_usb_leaf: Fix overread with an invalid command (git-fixes). * cassini: Fix a memory leak in the error handling path of cas_init_one() (git-fixes). * ceph: avoid use-after-free in ceph_fl_release_lock() (jsc#SES-1880). * ceph: blocklist the kclient when receiving corrupted snap trace (jsc#SES-1880). * ceph: flush cap releases when the session is flushed (bsc#1208428). * ceph: flush cap releases when the session is flushed (jsc#SES-1880). * ceph: force updating the msg pointer in non-split case (bsc#1211804). * ceph: move mount state enum to super.h (jsc#SES-1880). * ceph: remove useless session parameter for check_caps() (jsc#SES-1880). * ceph: switch to vfs_inode_has_locks() to fix file lock bug (jsc#SES-1880). * ceph: try to check caps immediately after async creating finishes (jsc#SES-1880). * ceph: update the time stamps and try to drop the suid/sgid (bsc#1209504). * ceph: use locks_inode_context helper (jsc#SES-1880). * cfg80211: allow continuous radar monitoring on offchannel chain (bsc#1209980). * cfg80211: fix possible NULL pointer dereference in cfg80211_stop_offchan_radar_detection (bsc#1209980). * cfg80211: implement APIs for dedicated radar detection HW (bsc#1209980). * cfg80211: move offchan_cac_event to a dedicated work (bsc#1209980). * cfg80211: rename offchannel_chain structs to background_chain to avoid confusion with ETSI standard (bsc#1209980). * cfg80211: schedule offchan_cac_abort_wk in cfg80211_radar_event (bsc#1209980). * cgroup.c: add helper __cset_cgroup_from_root to cleanup duplicated codes (bsc#1203906). * cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827). * cgroup: Homogenize cgroup_get_from_id() return value (bsc#1205650). * cgroup: Honor caller's cgroup NS when resolving path (bsc#1205650). * cgroup: Make cgroup_get_from_id() prettier (bsc#1205650). * cgroup: Reorganize css_set_lock and kernfs path processing (bsc#1205650). * cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup id (bsc#1205650). * cgroup: reduce dependency on cgroup_mutex (bsc#1205650). * cifs: Avoid a cast in add_lease_context() (bsc#1193629). * cifs: Check the lease context if we actually got a lease (bsc#1193629). * cifs: Convert struct fealist away from 1-element array (bsc#1193629). * cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes). * cifs: Fix oops due to uncleared server->smbd_conn in reconnect (git-fixes). * cifs: Fix smb2_set_path_size() (git-fixes). * cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629). * cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629). * cifs: Fix use-after-free in rdata->read_into_pages() (git-fixes). * cifs: Fix warning and UAF when destroy the MR list (git-fixes). * cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629). * cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes). * cifs: Replace remaining 1-element arrays (bsc#1193629). * cifs: Replace zero-length arrays with flexible-array members (bsc#1193629). * cifs: Simplify SMB2_open_init() (bsc#1193629). * cifs: Simplify SMB2_open_init() (bsc#1193629). * cifs: Simplify SMB2_open_init() (bsc#1193629). * cifs: Use kstrtobool() instead of strtobool() (bsc#1193629). * cifs: append path to open_enter trace event (bsc#1193629). * cifs: avoid dup prefix path in dfs_get_automount_devname() (git-fixes). * cifs: avoid potential races when handling multiple dfs tcons (bsc#1208758). * cifs: avoid race conditions with parallel reconnects (bsc#1193629). * cifs: avoid races in parallel reconnects in smb1 (bsc#1193629). * cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629). * cifs: check only tcon status on tcon related functions (bsc#1193629). * cifs: do not include page data when checking signature (git-fixes). * cifs: do not poll server interfaces too regularly (bsc#1193629). * cifs: do not take exclusive lock for updating target hints (bsc#1193629). * cifs: do not try to use rdma offload on encrypted connections (bsc#1193629). * cifs: double lock in cifs_reconnect_tcon() (git-fixes). * cifs: dump pending mids for all channels in DebugData (bsc#1193629). * cifs: empty interface list when server does not support query interfaces (bsc#1193629). * cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629). * cifs: fix dentry lookups in directory handle cache (bsc#1193629). * cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629). * cifs: fix mount on old smb servers (boo#1206935). * cifs: fix negotiate context parsing (bsc#1210301). * cifs: fix pcchunk length type in smb2_copychunk_range (bsc#1193629). * cifs: fix potential deadlock in cache_refresh_path() (git-fixes). * cifs: fix potential race when tree connecting ipc (bsc#1208758). * cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1208758). * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1193629). * cifs: fix sharing of DFS connections (bsc#1208758). * cifs: fix smb1 mount regression (bsc#1193629). * cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629). * cifs: generate signkey for the channel that's reconnecting (bsc#1193629). * cifs: get rid of dead check in smb2_reconnect() (bsc#1193629). * cifs: get rid of dns resolve worker (bsc#1193629). * cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629). * cifs: handle cache lookup errors different than -ENOENT (bsc#1193629). * cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git- fixes). * cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629). * cifs: lock chan_lock outside match_session (bsc#1193629). * cifs: mapchars mount option ignored (bsc#1193629). * cifs: match even the scope id for ipv6 addresses (bsc#1193629). * cifs: missing lock when updating session status (bsc#1193629). * cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629). * cifs: prevent data race in smb2_reconnect() (bsc#1193629). * cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629). * cifs: print last update time for interface list (bsc#1193629). * cifs: print session id while listing open files (bsc#1193629). * cifs: print smb3_fs_context::source when mounting (bsc#1193629). * cifs: protect access of TCP_Server_Info::{origin,leaf}_fullpath (bsc#1208758). * cifs: protect session status check in smb2_reconnect() (bsc#1208758). * cifs: release leases for deferred close handles when freezing (bsc#1193629). * cifs: remove duplicate code in __refresh_tcon() (bsc#1193629). * cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629). * cifs: remove unused function (bsc#1193629). * cifs: return DFS root session id in DebugData (bsc#1193629). * cifs: return a single-use cfid if we did not get a lease (bsc#1193629). * cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629). * cifs: sanitize paths in cifs_update_super_prepath (git-fixes). * cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629). * cifs: split out smb3_use_rdma_offload() helper (bsc#1193629). * cifs: update internal module version number for cifs.ko (bsc#1193629). * cifs: update ip_addr for ses only for primary chan setup (bsc#1193629). * cifs: use DFS root session instead of tcon ses (bsc#1193629). * cifs: use tcon allocation functions even for dummy tcon (git-fixes). * cifs: use the least loaded channel for sending requests (bsc#1193629). * clk: HI655X: select REGMAP instead of depending on it (git-fixes). * clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes). * clk: add missing of_node_put() in "assigned-clocks" property parsing (git- fixes). * clk: at91: clk-sam9x60-pll: fix return value check (git-fixes). * clk: imx: avoid memory leak (git-fixes). * clk: ingenic: jz4760: Update M/N/OD calculation algorithm (git-fixes). * clk: mxl: Add option to override gate clks (git-fixes). * clk: mxl: Fix a clk entry by adding relevant flags (git-fixes). * clk: mxl: Remove redundant spinlocks (git-fixes). * clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git- fixes). * clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes). * clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes). * clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git- fixes). * clk: qcom: gcc-sm8350: fix PCIe PIPE clocks handling (git-fixes). * clk: qcom: regmap: add PHY clock source implementation (git-fixes). * clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes). * clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes). * clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes). * clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes). * clk: sprd: set max_register according to mapping range (git-fixes). * clk: tegra20: fix gcc-7 constant overflow warning (git-fixes). * clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes). * clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes). * clocksource: Suspend the watchdog temporarily when high read latency detected (git-fixes). * comedi: use menuconfig for main Comedi menu (git-fixes). * configfs: fix possible memory leak in configfs_create_dir() (git-fixes). * cpufreq: Add Tegra234 to cpufreq-dt-platdev blocklist (git-fixes). * cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953). * cpufreq: CPPC: Fix performance/frequency conversion (git-fixes). * cpufreq: armada-37xx: stop using 0 as NULL pointer (git-fixes). * cpumask: fix incorrect cpumask scanning result checks (bsc#1210943). * cpumask: fix incorrect cpumask scanning result checks (bsc#1210943). * crypto: acomp - define max size for destination (jsc#PED-3692) * crypto: arm64 - Fix unused variable compilation warnings of (git-fixes) * crypto: caam - Clear some memory in instantiate_rng (git-fixes). * crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git- fixes). * crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes). * crypto: crypto4xx - Call dma_unmap_page when done (git-fixes). * crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes). * crypto: drivers - move from strlcpy with unused retval to (jsc#PED-3692) * crypto: essiv - Handle EBUSY correctly (git-fixes). * crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set() (git-fixes). * crypto: qat - Fix unsigned function returning negative (jsc#PED-3692) * crypto: qat - Removes the x86 dependency on the QAT drivers (jsc#PED-3692) * crypto: qat - abstract PFVF messages with struct pfvf_message (jsc#PED-3692) * crypto: qat - abstract PFVF receive logic (jsc#PED-3692) * crypto: qat - abstract PFVF send function (jsc#PED-3692) * crypto: qat - add PFVF support to enable the reset of ring (jsc#PED-3692) * crypto: qat - add PFVF support to the GEN4 host driver (jsc#PED-3692) * crypto: qat - add VF and PF wrappers to common send function (jsc#PED-3692) * crypto: qat - add backlog mechanism (jsc#PED-3692) * crypto: qat - add check for invalid PFVF protocol version 0 (jsc#PED-3692) * crypto: qat - add check to validate firmware images (jsc#PED-3692) * crypto: qat - add limit to linked list parsing (jsc#PED-3692) * crypto: qat - add misc workqueue (jsc#PED-3692) * crypto: qat - add missing restarting event notification in (jsc#PED-3692) * crypto: qat - add param check for DH (jsc#PED-3692) * crypto: qat - add param check for RSA (jsc#PED-3692) * crypto: qat - add pfvf_ops (jsc#PED-3692) * crypto: qat - add resubmit logic for decompression (jsc#PED-3692) * crypto: qat - add support for 401xx devices (jsc#PED-3692) * crypto: qat - add support for compression for 4xxx (jsc#PED-3692) * crypto: qat - add the adf_get_pmisc_base() helper function (jsc#PED-3692) * crypto: qat - allow detection of dc capabilities for 4xxx (jsc#PED-3692) * crypto: qat - change PFVF ACK behaviour (jsc#PED-3692) * crypto: qat - change behaviour of (jsc#PED-3692) * crypto: qat - change bufferlist logic interface (jsc#PED-3692) * crypto: qat - config VFs based on ring-to-svc mapping (jsc#PED-3692) * crypto: qat - differentiate between pf2vf and vf2pf offset (jsc#PED-3692) * crypto: qat - disable AER if an error occurs in probe (jsc#PED-3692) * crypto: qat - do not handle PFVF sources for qat_4xxx (jsc#PED-3692) * crypto: qat - do not rely on min version (jsc#PED-3692) * crypto: qat - enable deflate for QAT GEN4 (jsc#PED-3692) * crypto: qat - enable power management for QAT GEN4 (jsc#PED-3692) * crypto: qat - exchange device capabilities over PFVF (jsc#PED-3692) * crypto: qat - exchange ring-to-service mappings over PFVF (jsc#PED-3692) * crypto: qat - expose deflate through acomp api for QAT GEN2 (jsc#PED-3692) * crypto: qat - expose device config through sysfs for 4xxx (jsc#PED-3692) * crypto: qat - expose device state through sysfs for 4xxx (jsc#PED-3692) * crypto: qat - extend buffer list interface (jsc#PED-3692) * crypto: qat - extend crypto capability detection for 4xxx (jsc#PED-3692) * crypto: qat - extract send and wait from (jsc#PED-3692) * crypto: qat - fix DMA transfer direction (jsc#PED-3692) * crypto: qat - fix ETR sources enabled by default on GEN2 (jsc#PED-3692) * crypto: qat - fix VF IDs in PFVF log messages (jsc#PED-3692) * crypto: qat - fix a signedness bug in get_service_enabled() (jsc#PED-3692) * crypto: qat - fix a typo in a comment (jsc#PED-3692) * crypto: qat - fix access to PFVF interrupt registers for GEN4 (jsc#PED-3692) * crypto: qat - fix definition of ring reset results (jsc#PED-3692) * crypto: qat - fix error return code in adf_probe (git-fixes). * crypto: qat - fix error return code in adf_probe (jsc#PED-3692) * crypto: qat - fix handling of VF to PF interrupts (jsc#PED-3692) * crypto: qat - fix initialization of pfvf cap_msg structures (jsc#PED-3692) * crypto: qat - fix initialization of pfvf rts_map_msg (jsc#PED-3692) * crypto: qat - fix off-by-one error in PFVF debug print (jsc#PED-3692) * crypto: qat - fix out-of-bounds read (git-fixes). * crypto: qat - fix wording and formatting in code comment (jsc#PED-3692) * crypto: qat - flush vf workqueue at driver removal (jsc#PED-3692) * crypto: qat - free irq in case of failure (jsc#PED-3692) * crypto: qat - free irqs only if allocated (jsc#PED-3692) * crypto: qat - generalize crypto request buffers (jsc#PED-3692) * crypto: qat - get compression extended capabilities (jsc#PED-3692) * crypto: qat - handle retries due to collisions in (jsc#PED-3692) * crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag (jsc#PED-3692) * crypto: qat - improve logging of PFVF messages (jsc#PED-3692) * crypto: qat - improve the ACK timings in PFVF send (jsc#PED-3692) * crypto: qat - introduce support for PFVF block messages (jsc#PED-3692) * crypto: qat - leverage bitfield.h utils for PFVF messages (jsc#PED-3692) * crypto: qat - leverage read_poll_timeout in PFVF send (jsc#PED-3692) * crypto: qat - leverage the GEN2 VF mask definiton (jsc#PED-3692) * crypto: qat - make PFVF message construction direction (jsc#PED-3692) * crypto: qat - make PFVF send and receive direction agnostic (jsc#PED-3692) * crypto: qat - move VF message handler to adf_vf2pf_msg.c (jsc#PED-3692) * crypto: qat - move and rename GEN4 error register definitions (jsc#PED-3692) * crypto: qat - move interrupt code out of the PFVF handler (jsc#PED-3692) * crypto: qat - move pfvf collision detection values (jsc#PED-3692) * crypto: qat - move vf2pf interrupt helpers (jsc#PED-3692) * crypto: qat - pass the PF2VF responses back to the callers (jsc#PED-3692) * crypto: qat - prevent spurious MSI interrupt in VF (jsc#PED-3692) * crypto: qat - re-enable interrupts for legacy PFVF messages (jsc#PED-3692) * crypto: qat - re-enable registration of algorithms (jsc#PED-3692) * crypto: qat - refactor PF top half for PFVF (jsc#PED-3692) * crypto: qat - refactor pfvf version request messages (jsc#PED-3692) * crypto: qat - refactor submission logic (jsc#PED-3692) * crypto: qat - relocate PFVF PF related logic (jsc#PED-3692) * crypto: qat - relocate PFVF VF related logic (jsc#PED-3692) * crypto: qat - relocate PFVF disabled function (jsc#PED-3692) * crypto: qat - relocate and rename adf_sriov_prepare_restart() (jsc#PED-3692) * crypto: qat - relocate backlog related structures (jsc#PED-3692) * crypto: qat - relocate bufferlist logic (jsc#PED-3692) * crypto: qat - relocate qat_algs_alloc_flags() (jsc#PED-3692) * crypto: qat - remove duplicated logic across GEN2 drivers (jsc#PED-3692) * crypto: qat - remove empty sriov_configure() (jsc#PED-3692) * crypto: qat - remove line wrapping for pfvf_ops functions (jsc#PED-3692) * crypto: qat - remove the unnecessary get_vintmsk_offset() (jsc#PED-3692) * crypto: qat - remove unmatched CPU affinity to cluster IRQ (jsc#PED-3692) * crypto: qat - remove unnecessary tests to detect PFVF support (jsc#PED-3692) * crypto: qat - remove unneeded assignment (jsc#PED-3692) * crypto: qat - remove unneeded braces (jsc#PED-3692) * crypto: qat - remove unneeded packed attribute (jsc#PED-3692) * crypto: qat - remove unused PFVF stubs (jsc#PED-3692) * crypto: qat - rename and relocate GEN2 config function (jsc#PED-3692) * crypto: qat - rename bufferlist functions (jsc#PED-3692) * crypto: qat - rename pfvf collision constants (jsc#PED-3692) * crypto: qat - reorganize PFVF code (jsc#PED-3692) * crypto: qat - reorganize PFVF protocol definitions (jsc#PED-3692) * crypto: qat - replace deprecated MSI API (jsc#PED-3692) * crypto: qat - replace disable_vf2pf_interrupts() (jsc#PED-3692) * crypto: qat - replace get_current_node() with numa_node_id() (jsc#PED-3692) * crypto: qat - rework the VF2PF interrupt handling logic (jsc#PED-3692) * crypto: qat - set CIPHER capability for QAT GEN2 (jsc#PED-3692) * crypto: qat - set COMPRESSION capability for DH895XCC (jsc#PED-3692) * crypto: qat - set COMPRESSION capability for QAT GEN2 (jsc#PED-3692) * crypto: qat - set DMA mask to 48 bits for Gen2 (jsc#PED-3692) * crypto: qat - set PFVF_MSGORIGIN just before sending (jsc#PED-3692) * crypto: qat - share adf_enable_pf2vf_comms() from (jsc#PED-3692) * crypto: qat - simplify adf_enable_aer() (jsc#PED-3692) * crypto: qat - simplify code and axe the use of a deprecated (jsc#PED-3692) * crypto: qat - split PFVF message decoding from handling (jsc#PED-3692) * crypto: qat - stop using iommu_present() (jsc#PED-3692) * crypto: qat - store the PFVF protocol version of the (jsc#PED-3692) * crypto: qat - store the ring-to-service mapping (jsc#PED-3692) * crypto: qat - support fast ACKs in the PFVF protocol (jsc#PED-3692) * crypto: qat - support the reset of ring pairs on PF (jsc#PED-3692) * crypto: qat - test PFVF registers for spurious interrupts on (jsc#PED-3692) * crypto: qat - use enums for PFVF protocol codes (jsc#PED-3692) * crypto: qat - use hweight for bit counting (jsc#PED-3692) * crypto: qat - use pre-allocated buffers in datapath (jsc#PED-3692) * crypto: qat - use reference to structure in dma_map_single() (jsc#PED-3692) * crypto: qat - use u32 variables in all GEN4 pfvf_ops (jsc#PED-3692) * crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes). * crypto: sa2ul - Select CRYPTO_DES (git-fixes). * crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes). * crypto: seqiv - Handle EBUSY correctly (git-fixes). * crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs() (git-fixes). * crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes). * crypto: xts - Handle EBUSY correctly (git-fixes). * cxgb4: fix missing unlock on ETHOFLD desc collect fail path (jsc#SLE-18992). * debugfs: add debugfs_lookup_and_remove() (git-fixes). * debugfs: add debugfs_lookup_and_remove() (git-fixes). * debugfs: fix error when writing negative value to atomic_t debugfs file (git-fixes). * devlink: hold region lock when flushing snapshots (git-fixes). * dm btree: add a defensive bounds check to insert_at() (git-fixes). * dm cache: Fix ABBA deadlock between shrink_slab and dm_cache_metadata_abort (git-fixes). * dm cache: Fix UAF in destroy() (git-fixes). * dm cache: set needs_check flag after aborting metadata (git-fixes). * dm clone: Fix UAF in clone_dtr() (git-fixes). * dm integrity: Fix UAF in dm_integrity_dtr() (git-fixes). * dm integrity: clear the journal on suspend (git-fixes). * dm integrity: flush the journal on suspend (git-fixes). * dm ioctl: fix misbehavior if list_versions races with module loading (git- fixes). * dm ioctl: prevent potential spectre v1 gadget (git-fixes). * dm raid: fix address sanitizer warning in raid_resume (git-fixes). * dm raid: fix address sanitizer warning in raid_status (git-fixes). * dm space map common: add bounds check to sm_ll_lookup_bitmap() (git-fixes). * dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata (git-fixes). * dm thin: Fix UAF in run_timer_softirq() (git-fixes). * dm thin: Use last transaction's pmd->root when commit failed (git-fixes). * dm thin: resume even if in FAIL mode (git-fixes). * dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes). * dm: fix alloc_dax error handling in alloc_dev (git-fixes). * dm: requeue IO if mapping table not yet available (git-fixes). * dma-buf: Use dma_fence_unwrap_for_each when importing fences (git-fixes). * dma-buf: cleanup kerneldoc of removed component (git-fixes). * dma-direct: use is_swiotlb_active in dma_direct_map_page (PED-3259). * dma-mapping: reformat comment to suppress htmldoc warning (git-fixes). * dma: gpi: remove spurious unlock in gpi_ch_init (git-fixes). * dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git- fixes). * dmaengine: at_xdmac: do not enable all cyclic channels (git-fixes). * dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git- fixes). * dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes). * dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes). * dmaengine: dw-edma: Drop chancnt initialization (git-fixes). * dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes). * dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git- fixes). * dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes). * dmaengine: dw-edma: Fix to change for continuous transfer (git-fixes). * dmaengine: dw-edma: Fix to enable to issue dma request on DMA processing (git-fixes). * dmaengine: idxd: Do not enable user type Work Queue without Shared Virtual Addressing (git-fixes). * dmaengine: idxd: Only call idxd_enable_system_pasid() if succeeded in enabling SVA feature (git-fixes). * dmaengine: idxd: Separate user and kernel pasid enabling (git-fixes). * dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes). * dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init (git- fixes). * dmaengine: mv_xor_v2: Fix an error code (git-fixes). * dmaengine: pl330: rename _start to prevent build error (git-fixes). * dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git- fixes). * dmaengine: sf-pdma: pdma_desc memory leak fix (git-fixes). * dmaengine: tegra: Fix memory leak in terminate_all() (git-fixes). * do not reuse connection if share marked as isolated (bsc#1193629). * docs/scripts/gdb: add necessary make scripts_gdb step (git-fixes). * docs: Correct missing "d_" prefix for dentry_operations member d_weak_revalidate (git-fixes). * docs: driver-api: firmware_loader: fix missing argument in usage example (git-fixes). * docs: ftrace: fix a issue with duplicated subtitle number (git-fixes). * docs: gdbmacros: print newest record (git-fixes). * docs: networking: fix x25-iface.rst heading & index order (git-fixes). * driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes). * driver core: fix potential null-ptr-deref in device_add() (git-fixes). * driver core: fix resource leak in device_add() (git-fixes). * driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git- fixes). * drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815). * drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815). * drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes). * drivers: base: component: fix memory leak with using debugfs_lookup() (git- fixes). * drivers: base: dd: fix memory leak with using debugfs_lookup() (git-fixes). * drivers: base: transport_class: fix possible memory leak (git-fixes). * drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes). * drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes). * drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git- fixes). * drivers:md:fix a potential use-after-free bug (git-fixes). * drm/amd/amdgpu: fix warning during suspend (bsc#1206843). * drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes). * drm/amd/display: Add DCN314 display SG Support (bsc#1206843). * drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes). * drm/amd/display: Add NULL plane_state check for cursor disable logic (git- fixes). * drm/amd/display: Add check for DET fetch latency hiding for dcn32 (bsc#1206843). * drm/amd/display: Add missing brackets in calculation (bsc#1206843). * drm/amd/display: Adjust downscaling limits for dcn314 (bsc#1206843). * drm/amd/display: Allow subvp on vactive pipes that are 2560x1440 at 60 (bsc#1206843). * drm/amd/display: Clear MST topology if it fails to resume (git-fixes). * drm/amd/display: Conversion to bool not necessary (git-fixes). * drm/amd/display: Defer DIG FIFO disable after VID stream enable (bsc#1206843). * drm/amd/display: Disable DRR actions during state commit (bsc#1206843). * drm/amd/display: Disable HUBP/DPP PG on DCN314 for now (bsc#1206843). * drm/amd/display: Do not clear GPINT register when releasing DMUB from reset (git-fixes). * drm/amd/display: Do not commit pipe when updating DRR (bsc#1206843). * drm/amd/display: Do not set DRR on pipe Commit (bsc#1206843). * drm/amd/display: Enable P-state validation checks for DCN314 (bsc#1206843). * drm/amd/display: Fail atomic_check early on normalize_zpos error (git- fixes). * drm/amd/display: Fix DP MST sinks removal issue (git-fixes). * drm/amd/display: Fix DTBCLK disable requests and SRC_SEL programming (bsc#1206843). * drm/amd/display: Fix display corruption w/ VSR enable (bsc#1206843). * drm/amd/display: Fix hang when skipping modeset (git-fixes). * drm/amd/display: Fix potential null dereference (git-fixes). * drm/amd/display: Fix potential null-deref in dm_resume (git-fixes). * drm/amd/display: Fix race condition in DPIA AUX transfer (bsc#1206843). * drm/amd/display: Fix set scaling doesn's work (git-fixes). * drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes). * drm/amd/display: Fixes for dcn32_clk_mgr implementation (git-fixes). * drm/amd/display: Include virtual signal to set k1 and k2 values (bsc#1206843). * drm/amd/display: Move DCN314 DOMAIN power control to DMCUB (bsc#1206843). * drm/amd/display: Pass the right info to drm_dp_remove_payload (bsc#1206843). * drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes). * drm/amd/display: Properly reuse completion structure (bsc#1206843). * drm/amd/display: Reduce expected sdp bandwidth for dcn321 (bsc#1206843). * drm/amd/display: Remove OTG DIV register write for Virtual signals (bsc#1206843). * drm/amd/display: Report to ACPI video if no panels were found (bsc#1206843). * drm/amd/display: Reset DMUB mailbox SW state after HW reset (bsc#1206843). * drm/amd/display: Reset OUTBOX0 r/w pointer on DMUB reset (git-fixes). * drm/amd/display: Return error code on DSC atomic check failure (git-fixes). * drm/amd/display: Revert Reduce delay when sink device not able to ACK 00340h write (git-fixes). * drm/amd/display: Set dcn32 caps.seamless_odm (bsc#1206843). * drm/amd/display: Set hvm_enabled flag for S/G mode (bsc#1206843). * drm/amd/display: Simplify same effect if/else blocks (git-fixes). * drm/amd/display: Take FEC Overhead into Timeslot Calculation (bsc#1206843). * drm/amd/display: Take emulated dc_sink into account for HDCP (bsc#1207734). * drm/amd/display: Unassign does_plane_fit_in_mall function from dcn3.2 (bsc#1206843). * drm/amd/display: Uninitialized variables causing 4k60 UCLK to stay at DPM1 and not DPM0 (bsc#1206843). * drm/amd/display: Update bounding box values for DCN321 (git-fixes). * drm/amd/display: Update clock table to include highest clock setting (bsc#1206843). * drm/amd/display: Use DC_LOG_DC in the trasform pixel function (git-fixes). * drm/amd/display: Use min transition for SubVP into MPO (bsc#1206843). * drm/amd/display: Workaround to increase phantom pipe vactive in pipesplit (bsc#1206843). * drm/amd/display: adjust MALL size available for DCN32 and DCN321 (bsc#1206843). * drm/amd/display: disable S/G display on DCN 3.1.4 (bsc#1206843). * drm/amd/display: disable S/G display on DCN 3.1.5 (bsc#1206843). * drm/amd/display: disconnect MPCC only on OTG change (bsc#1206843). * drm/amd/display: do not call dc_interrupt_set() for disabled crtcs (git- fixes). * drm/amd/display: fix FCLK pstate change underflow (bsc#1206843). * drm/amd/display: fix cursor offset on rotation 180 (git-fixes). * drm/amd/display: fix duplicate assignments (git-fixes). * drm/amd/display: fix flickering caused by S/G mode (git-fixes). * drm/amd/display: fix issues with driver unload (git-fixes). * drm/amd/display: fix k1 k2 divider programming for phantom streams (bsc#1206843). * drm/amd/display: fix mapping to non-allocated address (bsc#1206843). * drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git- fixes). * drm/amd/display: fix wrong index used in dccg32_set_dpstreamclk (bsc#1206843). * drm/amd/display: move remaining FPU code to dml folder (bsc#1206843). * drm/amd/display: properly handling AGP aperture in vm setup (bsc#1206843). * drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git- fixes). * drm/amd/display: revert Disable DRR actions during state commit (bsc#1206843). * drm/amd/display: skip commit minimal transition state (bsc#1206843). * drm/amd/display: wait for vblank during pipe programming (git-fixes). * drm/amd/pm/smu13: BACO is supported when it's in BACO state (bsc#1206843). * drm/amd/pm: Enable bad memory page/channel recording support for smu v13_0_0 (bsc#1206843). * drm/amd/pm: Fix output of pp_od_clk_voltage (git-fixes). * drm/amd/pm: Fix sienna cichlid incorrect OD volage after resume (bsc#1206843). * drm/amd/pm: add SMU 13.0.7 missing GetPptLimit message mapping (bsc#1206843). * drm/amd/pm: add missing AllowIHInterrupt message mapping for SMU13.0.0 (bsc#1206843). * drm/amd/pm: add missing SMU13.0.0 mm_dpm feature mapping (bsc#1206843). * drm/amd/pm: add missing SMU13.0.7 mm_dpm feature mapping (bsc#1206843). * drm/amd/pm: add the missing mapping for PPT feature on SMU13.0.0 and 13.0.7 (bsc#1206843). * drm/amd/pm: bump SMU 13.0.0 driver_if header version (bsc#1206843). * drm/amd/pm: bump SMU 13.0.4 driver_if header version (bsc#1206843). * drm/amd/pm: bump SMU 13.0.7 driver_if header version (bsc#1206843). * drm/amd/pm: bump SMU13.0.0 driver_if header to version 0x34 (bsc#1206843). * drm/amd/pm: correct SMU13.0.0 pstate profiling clock settings (bsc#1206843). * drm/amd/pm: correct SMU13.0.7 max shader clock reporting (bsc#1206843). * drm/amd/pm: correct SMU13.0.7 pstate profiling clock settings (bsc#1206843). * drm/amd/pm: correct the fan speed retrieving in PWM for some SMU13 asics (bsc#1206843). * drm/amd/pm: correct the pcie link state check for SMU13 (bsc#1206843). * drm/amd/pm: correct the reference clock for fan speed(rpm) calculation (bsc#1206843). * drm/amd/pm: drop unneeded dpm features disablement for SMU 13.0.4/11 (bsc#1206843). * drm/amd/pm: enable GPO dynamic control support for SMU13.0.0 (bsc#1206843). * drm/amd/pm: enable GPO dynamic control support for SMU13.0.7 (bsc#1206843). * drm/amd/pm: enable mode1 reset on smu_v13_0_10 (bsc#1206843). * drm/amd/pm: parse pp_handle under appropriate conditions (git-fixes). * drm/amd/pm: remove unused num_of_active_display variable (git-fixes). * drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes). * drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes). * drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes). * drm/amd/pm: update SMU13.0.0 reported maximum shader clock (bsc#1206843). * drm/amd: Avoid ASSERT for some message failures (bsc#1206843). * drm/amd: Avoid BUG() for case of SRIOV missing IP version (bsc#1206843). * drm/amd: Delay removal of the firmware framebuffer (git-fixes). * drm/amd: Fix an out of bounds error in BIOS parser (git-fixes). * drm/amd: Fix initialization for nbio 4.3.0 (bsc#1206843). * drm/amd: Fix initialization for nbio 7.5.1 (bsc#1206843). * drm/amd: Fix initialization mistake for NBIO 7.3.0 (bsc#1206843). * drm/amdgpu/discovery: add PSP IP v13.0.11 support (bsc#1206843). * drm/amdgpu/discovery: enable gfx v11 for GC 11.0.4 (bsc#1206843). * drm/amdgpu/discovery: enable gmc v11 for GC 11.0.4 (bsc#1206843). * drm/amdgpu/discovery: enable mes support for GC v11.0.4 (bsc#1206843). * drm/amdgpu/discovery: enable nbio support for NBIO v7.7.1 (bsc#1206843). * drm/amdgpu/discovery: enable soc21 common for GC 11.0.4 (bsc#1206843). * drm/amdgpu/discovery: set the APU flag for GC 11.0.4 (bsc#1206843). * drm/amdgpu/display/mst: Fix mst_state->pbn_div and slot count assignments (bsc#1206843). * drm/amdgpu/display/mst: adjust the naming of mst_port and port of aconnector (bsc#1206843). * drm/amdgpu/display/mst: limit payload to be updated one by one (bsc#1206843). * drm/amdgpu/display/mst: update mst_mgr relevant variable when long HPD (bsc#1206843). * drm/amdgpu/dm/dp_mst: Do not grab mst_mgr->lock when computing DSC state (bsc#1206843). * drm/amdgpu/dm/mst: Fix uninitialized var in pre_compute_mst_dsc_configs_for_state() (bsc#1206843). * drm/amdgpu/dm/mst: Use the correct topology mgr pointer in amdgpu_dm_connector (bsc#1206843). * drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git- fixes). * drm/amdgpu/gfx10: Disable gfxoff before disabling powergating (git-fixes). * drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras (git-fixes). * drm/amdgpu/mst: Stop ignoring error codes and deadlocking (bsc#1206843). * drm/amdgpu/nv: Apply ASPM quirk on Intel ADL + AMD Navi (bsc#1206843). * drm/amdgpu/pm: add GFXOFF control IP version check for SMU IP v13.0.11 (bsc#1206843). * drm/amdgpu/pm: enable swsmu for SMU IP v13.0.11 (bsc#1206843). * drm/amdgpu/pm: use the specific mailbox registers only for SMU IP v13.0.4 (bsc#1206843). * drm/amdgpu/smu: skip pptable init under sriov (bsc#1206843). * drm/amdgpu/soc21: Add video cap query support for VCN_4_0_4 (bsc#1206843). * drm/amdgpu/soc21: add mode2 asic reset for SMU IP v13.0.11 (bsc#1206843). * drm/amdgpu/soc21: do not expose AV1 if VCN0 is harvested (bsc#1206843). * drm/amdgpu: Add unique_id support for GC 11.0.1/2 (bsc#1206843). * drm/amdgpu: Correct the power calcultion for Renior/Cezanne (git-fixes). * drm/amdgpu: Do not register backlight when another backlight should be used (v3) (bsc#1206843). * drm/amdgpu: Do not resume IOMMU after incomplete init (bsc#1206843). * drm/amdgpu: Enable pg/cg flags on GC11_0_4 for VCN (bsc#1206843). * drm/amdgpu: Enable vclk dclk node for gc11.0.3 (bsc#1206843). * drm/amdgpu: Fix call trace warning and hang when removing amdgpu device (bsc#1206843). * drm/amdgpu: Fix potential NULL dereference (bsc#1206843). * drm/amdgpu: Fix potential double free and null pointer dereference (bsc#1206843). * drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1206843). * drm/amdgpu: Fix vram recover does not work after whole GPU reset (v2) (git- fixes). * drm/amdgpu: Fixed bug on error when unloading amdgpu (bsc#1206843). * drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869). * drm/amdgpu: Register ACPI video backlight when skipping amdgpu backlight registration (bsc#1206843). * drm/amdgpu: Use the TGID for trace_amdgpu_vm_update_ptes (bsc#1206843). * drm/amdgpu: Use the default reset when loading or reloading the driver (git- fixes). * drm/amdgpu: Use the sched from entity for amdgpu_cs trace (git-fixes). * drm/amdgpu: add a missing lock for AMDGPU_SCHED (git-fixes). * drm/amdgpu: add gfx support for GC 11.0.4 (bsc#1206843). * drm/amdgpu: add gmc v11 support for GC 11.0.4 (bsc#1206843). * drm/amdgpu: add smu 13 support for smu 13.0.11 (bsc#1206843). * drm/amdgpu: add soc21 common ip block support for GC 11.0.4 (bsc#1206843). * drm/amdgpu: add tmz support for GC 11.0.1 (bsc#1206843). * drm/amdgpu: add tmz support for GC IP v11.0.4 (bsc#1206843). * drm/amdgpu: allow more APUs to do mode2 reset when go to S4 (bsc#1206843). * drm/amdgpu: allow multipipe policy on ASICs with one MEC (bsc#1206843). * drm/amdgpu: change gfx 11.0.4 external_id range (git-fixes). * drm/amdgpu: complete gfxoff allow signal during suspend without delay (git- fixes). * drm/amdgpu: correct MEC number for gfx11 APUs (bsc#1206843). * drm/amdgpu: disable runtime pm on several sienna cichlid cards(v2) (git- fixes). * drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend (git-fixes). * drm/amdgpu: drop experimental flag on aldebaran (git-fixes). * drm/amdgpu: enable GFX Clock Gating control for GC IP v11.0.4 (bsc#1206843). * drm/amdgpu: enable GFX IP v11.0.4 CG support (bsc#1206843). * drm/amdgpu: enable GFX Power Gating for GC IP v11.0.4 (bsc#1206843). * drm/amdgpu: enable HDP SD for gfx 11.0.3 (bsc#1206843). * drm/amdgpu: enable PSP IP v13.0.11 support (bsc#1206843). * drm/amdgpu: enable VCN DPG for GC IP v11.0.4 (bsc#1206843). * drm/amdgpu: fix Null pointer dereference error in amdgpu_device_recover_vram (git-fixes). * drm/amdgpu: fix amdgpu_job_free_resources v2 (bsc#1206843). * drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes). * drm/amdgpu: fix error checking in amdgpu_read_mm_registers for nv (bsc#1206843). * drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 (git- fixes). * drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc21 (bsc#1206843). * drm/amdgpu: fix mmhub register base coding error (git-fixes). * drm/amdgpu: fix return value check in kfd (git-fixes). * drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini (bsc#1206843). * drm/amdgpu: for S0ix, skip SDMA 5.x+ suspend/resume (git-fixes). * drm/amdgpu: release gpu full access after "amdgpu_device_ip_late_init" (git- fixes). * drm/amdgpu: reposition the gpu reset checking for reuse (bsc#1206843). * drm/amdgpu: set GC 11.0.4 family (bsc#1206843). * drm/amdgpu: skip ASIC reset for APUs when go to S4 (bsc#1206843). * drm/amdgpu: skip MES for S0ix as well since it's part of GFX (bsc#1206843). * drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes). * drm/amdgpu: skip mes self test after s0i3 resume for MES IP v11.0 (bsc#1206843). * drm/amdgpu: skip psp suspend for IMU enabled ASICs mode2 reset (git-fixes). * drm/amdgpu: update drm_display_info correctly when the edid is read (git- fixes). * drm/amdgpu: update wave data type to 3 for gfx11 (bsc#1206843). * drm/amdkfd: Add sync after creating vram bo (bsc#1206843). * drm/amdkfd: Fix BO offset for multi-VMA page migration (git-fixes). * drm/amdkfd: Fix NULL pointer error for GC 11.0.1 on mGPU (bsc#1206843). * drm/amdkfd: Fix an illegal memory access (git-fixes). * drm/amdkfd: Fix double release compute pasid (bsc#1206843). * drm/amdkfd: Fix kfd_process_device_init_vm error handling (bsc#1206843). * drm/amdkfd: Fix the memory overrun (bsc#1206843). * drm/amdkfd: Fix the warning of array-index-out-of-bounds (bsc#1206843). * drm/amdkfd: Fixed kfd_process cleanup on module exit (git-fixes). * drm/amdkfd: Get prange->offset after svm_range_vram_node_new (git-fixes). * drm/amdkfd: Page aligned memory reserve size (bsc#1206843). * drm/amdkfd: add GC 11.0.4 KFD support (bsc#1206843). * drm/amdkfd: fix a potential double free in pqm_create_queue (git-fixes). * drm/amdkfd: fix potential kgd_mem UAFs (git-fixes). * drm/amdkfd: introduce dummy cache info for property asic (bsc#1206843). * drm/armada: Fix a potential double free in an error handling path (git- fixes). * drm/ast: Fix ARM compatibility (git-fixes). * drm/bochs: fix blanking (git-fixes). * drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc (git-fixes). * drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git- fixes). * drm/bridge: it6505: Fix return value check for pm_runtime_get_sync (git- fixes). * drm/bridge: lt8912b: Add hot plug detection (git-fixes). * drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes). * drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes). * drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes). * drm/bridge: lt9611: fix HPD reenablement (git-fixes). * drm/bridge: lt9611: fix clock calculation (git-fixes). * drm/bridge: lt9611: fix polarity programming (git-fixes). * drm/bridge: lt9611: fix programming of video modes (git-fixes). * drm/bridge: lt9611: fix sleep mode setup (git-fixes). * drm/bridge: lt9611: pass a pointer to the of node (git-fixes). * drm/bridge: megachips: Fix error handling in i2c_register_driver() (git- fixes). * drm/bridge: ti-sn65dsi83: Fix delay after reset deassert to match spec (git- fixes). * drm/cirrus: NULL-check pipe->plane.state->fb in cirrus_pipe_update() (git- fixes). * drm/connector: print max_requested_bpc in state debugfs (git-fixes). * drm/display/dp_mst: Add drm_atomic_get_old_mst_topology_state() (bsc#1206843). * drm/display/dp_mst: Add helper for finding payloads in atomic MST state (bsc#1206843). * drm/display/dp_mst: Add helpers for serializing SST <-> MST transitions (bsc#1206843). * drm/display/dp_mst: Add nonblocking helpers for DP MST (bsc#1206843). * drm/display/dp_mst: Call them time slots, not VCPI slots (bsc#1206843). * drm/display/dp_mst: Correct the kref of port (bsc#1206843). * drm/display/dp_mst: Do not open code modeset checks for releasing time slots (bsc#1206843). * drm/display/dp_mst: Drop all ports from topology on CSNs before queueing link address work (bsc#1206843). * drm/display/dp_mst: Fix confusing docs for drm_dp_atomic_release_time_slots() (bsc#1206843). * drm/display/dp_mst: Fix down message handling after a packet reception error (git-fixes). * drm/display/dp_mst: Fix down/up message handling after sink disconnect (git- fixes). * drm/display/dp_mst: Fix drm_dp_mst_add_affected_dsc_crtcs() return code (git-fixes). * drm/display/dp_mst: Fix modeset tracking in drm_dp_atomic_release_vcpi_slots() (bsc#1206843). * drm/display/dp_mst: Handle old/new payload states in drm_dp_remove_payload() (bsc#1206843). * drm/display/dp_mst: Maintain time slot allocations when deleting payloads (bsc#1206843). * drm/display/dp_mst: Move all payload info into the atomic state (bsc#1206843). * drm/display/dp_mst: Rename drm_dp_mst_vcpi_allocation (bsc#1206843). * drm/display: Do not assume dual mode adaptors support i2c sub-addressing (git-fixes). * drm/displayid: add displayid_get_header() and check bounds better (git- fixes). * drm/dp: Do not rewrite link config when setting phy test pattern (git- fixes). * drm/dp_mst: Avoid deleting payloads for connectors staying enabled (bsc#1206843). * drm/dp_mst: fix drm_dp_dpcd_read return value checks (git-fixes). * drm/edid: fix AVI infoframe aspect ratio handling (git-fixes). * drm/edid: fix parsing of 3D modes from HDMI VSDB (git-fixes). * drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes). * drm/exynos: fix g2d_open/close helper function definitions (git-fixes). * drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes). * drm/fbdev-generic: prohibit potential out-of-bounds access (git-fixes). * drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes). * drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes). * drm/hyperv: Add a bug reference to two existing changes (bsc#1211281). * drm/hyperv: Add error message for fb size greater than allocated (git- fixes). * drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes). * drm/i915/active: Fix missing debug object activation (git-fixes). * drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git- fixes). * drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git- fixes). * drm/i915/adlp: Fix typo for reference clock (git-fixes). * drm/i915/color: Fix typo for Plane CSC indexes (git-fixes). * drm/i915/dg2: Add HDMI pixel clock frequencies 267.30 and 319.89 MHz (git- fixes). * drm/i915/dg2: Add additional HDMI pixel clock frequencies (git-fixes). * drm/i915/dg2: Drop one PCI ID (git-fixes). * drm/i915/dg2: Support 4k at 30 on HDMI (git-fixes). * drm/i915/dgfx: Keep PCI autosuspend control 'on' by default on all dGPU (git-fixes). * drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes). * drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes). * drm/i915/display: Check source height is > 0 (git-fixes). * drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes). * drm/i915/display: clean up comments (git-fixes). * drm/i915/dmc: Update DG2 DMC version to v2.08 (git-fixes). * drm/i915/dp: prevent potential div-by-zero (git-fixes). * drm/i915/dp_mst: Fix mst_mgr lookup during atomic check (bsc#1206843). * drm/i915/dp_mst: Fix payload removal during output disabling (bsc#1206843). * drm/i915/dpt: Treat the DPT BO as a framebuffer (git-fixes). * drm/i915/dsi: Use unconditional msleep() instead of intel_dsi_msleep() (git- fixes). * drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes). * drm/i915/gem: Flush lmem contents after construction (git-fixes). * drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes). * drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git- fixes). * drm/i915/gt: Use the correct error value when kernel_context() fails (git- fixes). * drm/i915/gt: perform uc late init after probe error injection (git-fixes). * drm/i915/guc: Do not capture Gen8 regs on Xe devices (git-fixes). * drm/i915/huc: always init the delayed load fence (git-fixes). * drm/i915/huc: bump timeout for delayed load and reduce print verbosity (git- fixes). * drm/i915/huc: fix leak of debug object in huc load fence on driver unload (git-fixes). * drm/i915/migrate: Account for the reserved_space (git-fixes). * drm/i915/migrate: fix corner case in CCS aux copying (git-fixes). * drm/i915/psr: Fix PSR_IMR/IIR field handling (git-fixes). * drm/i915/psr: Use calculated io and fast wake lines (git-fixes). * drm/i915/psr: Use calculated io and fast wake lines (git-fixes). * drm/i915/pxp: use <> instead of "" for headers in include/ (git-fixes). * drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv (git-fixes). * drm/i915/selftest: fix intel_selftest_modify_policy argument types (git- fixes). * drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes). * drm/i915: Allow switching away via vga-switcheroo if uninitialized (git- fixes). * drm/i915: Avoid potential vm use-after-free (git-fixes). * drm/i915: Disable DC states for all commits (git-fixes). * drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes). * drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes). * drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes). * drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes). * drm/i915: Fix NULL ptr deref by checking new_crtc_state (git-fixes). * drm/i915: Fix VBT DSI DVO port handling (git-fixes). * drm/i915: Fix context runtime accounting (git-fixes). * drm/i915: Fix fast wake AUX sync len (git-fixes). * drm/i915: Fix potential bit_17 double-free (git-fixes). * drm/i915: Fix potential context UAFs (git-fixes). * drm/i915: Fix request ref counting during error capture & debugfs dump (git- fixes). * drm/i915: Fix up locking around dumping requests lists (git-fixes). * drm/i915: Initialize the obj flags for shmem objects (git-fixes). * drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes). * drm/i915: Move CSC load back into .color_commit_arm() when PSR is enabled on skl/glk (git-fixes). * drm/i915: Move fd_install after last use of fence (git-fixes). * drm/i915: Preserve crtc_state->inherited during state clearing (git-fixes). * drm/i915: Remove __maybe_unused from mtl_info (git-fixes). * drm/i915: Remove unused bits of i915_vma/active api (git-fixes). * drm/i915: Remove unused variable (git-fixes). * drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes). * drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes). * drm/i915: move a Kconfig symbol to unbreak the menu presentation (git- fixes). * drm/i915: stop abusing swiotlb_max_segment (git-fixes). * drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes). * drm/mediatek: Clean dangling pointer on bind error path (git-fixes). * drm/mediatek: Drop unbalanced obj unref (git-fixes). * drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes). * drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git- fixes). * drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes). * drm/meson: fix 1px pink line on GXM when scaling video overlay (git-fixes). * drm/meson: fix missing component unbind on bind errors (git-fixes). * drm/meson: reorder driver deinit sequence to fix use-after-free bug (git- fixes). * drm/mgag200: Fix gamma lut not initialized (git-fixes). * drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes). * drm/mipi-dsi: Set the fwnode for mipi_dsi_device (git-fixes). * drm/msm/a5xx: fix context faults during ring switch (git-fixes). * drm/msm/a5xx: fix highest bank bit for a530 (git-fixes). * drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register (git- fixes). * drm/msm/a5xx: fix the emptyness check in the preempt code (git-fixes). * drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage (git-fixes). * drm/msm/a6xx: Fix speed-bin detection vs probe-defer (git-fixes). * drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes). * drm/msm/adreno: adreno_gpu: Use suspend() instead of idle() on load error (git-fixes). * drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes). * drm/msm/adreno: fix runtime PM imbalance at gpu load (git-fixes). * drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes). * drm/msm/disp/dpu: fix sc7280_pp base offset (git-fixes). * drm/msm/dp: Clean up handling of DP AUX interrupts (git-fixes). * drm/msm/dp: cleared DP_DOWNSPREAD_CTRL register before start link training (git-fixes). * drm/msm/dp: unregister audio driver during unbind (git-fixes). * drm/msm/dpu: Add INTF_5 interrupts (git-fixes). * drm/msm/dpu: Add check for cstate (git-fixes). * drm/msm/dpu: Add check for pstates (git-fixes). * drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes). * drm/msm/dpu: Move non-MDP_TOP INTF_INTR offsets out of hwio header (git- fixes). * drm/msm/dpu: Reject topologies for which no DSC blocks are available (git- fixes). * drm/msm/dpu: Remove duplicate register defines from INTF (git-fixes). * drm/msm/dpu: Remove num_enc from topology struct in favour of num_dsc (git- fixes). * drm/msm/dpu: Wire up DSC mask for active CTL configuration (git-fixes). * drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() (git-fixes). * drm/msm/dpu: clear DSPP reservations in rm release (git-fixes). * drm/msm/dpu: disable features unsupported by QCM2290 (git-fixes). * drm/msm/dpu: drop DPU_DIM_LAYER from MIXER_MSM8998_MASK (git-fixes). * drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes). * drm/msm/dpu: fix clocks settings for msm8998 SSPP blocks (git-fixes). * drm/msm/dpu: fix len of sc7180 ctl blocks (git-fixes). * drm/msm/dpu: sc7180: add missing WB2 clock control (git-fixes). * drm/msm/dpu: set pdpu->is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes). * drm/msm/dsi: Add missing check for alloc_ordered_workqueue (git-fixes). * drm/msm/dsi: Allow 2 CTRLs on v2.5.0 (git-fixes). * drm/msm/gem: Add check for kmalloc (git-fixes). * drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes). * drm/msm/mdp5: Add check for kzalloc (git-fixes). * drm/msm/mdp5: fix reading hw revision on db410c platform (git-fixes). * drm/msm: Be more shouty if per-process pgtables are not working (git-fixes). * drm/msm: Fix potential invalid ptr free (git-fixes). * drm/msm: Set max segment size earlier (git-fixes). * drm/msm: clean event_thread->worker in case of an error (git-fixes). * drm/msm: fix NULL-deref on irq uninstall (git-fixes). * drm/msm: fix NULL-deref on snapshot tear down (git-fixes). * drm/msm: fix drm device leak on bind errors (git-fixes). * drm/msm: fix missing wq allocation error handling (git-fixes). * drm/msm: fix vram leak on bind errors (git-fixes). * drm/msm: fix workqueue leak on bind errors (git-fixes). * drm/msm: use strscpy instead of strncpy (git-fixes). * drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git- fixes). * drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes). * drm/nouveau/kms/nv50-: remove unused functions (git-fixes). * drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype (git-fixes). * drm/nouveau/kms: Cache DP encoders in nouveau_connector (bsc#1206843). * drm/nouveau/kms: Pull mst state in for all modesets (bsc#1206843). * drm/omap: dsi: Fix excessive stack usage (git-fixes). * drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes). * drm/panel: novatek-nt35950: Improve error handling (git-fixes). * drm/panel: novatek-nt35950: Only unregister DSI1 if it exists (git-fixes). * drm/panel: otm8009a: Set backlight parent to panel device (git-fixes). * drm/panfrost: Do not sync rpm suspension after mmu flushing (git-fixes). * drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes). * drm/probe-helper: Cancel previous job before starting new one (git-fixes). * drm/radeon: Drop legacy MST support (bsc#1206843). * drm/radeon: Fix eDP for single-display iMac11,2 (git-fixes). * drm/radeon: free iio for atombios when driver shutdown (git-fixes). * drm/radeon: reintroduce radeon_dp_work_func content (git-fixes). * drm/rockchip: Drop unbalanced obj unref (git-fixes). * drm/sched: Remove redundant check (git-fixes). * drm/shmem-helper: Fix locking for drm_gem_shmem_get_pages_sgt() (git-fixes). * drm/shmem-helper: Remove another errant put in error path (git-fixes). * drm/shmem-helper: Revert accidental non-GPL export (git-fixes). * drm/sun4i: fix missing component unbind on bind errors (git-fixes). * drm/tegra: Avoid potential 32-bit integer overflow (git-fixes). * drm/tegra: firewall: Check for is_addr_reg existence in IMM check (git- fixes). * drm/tiny: ili9486: Do not assume 8-bit only SPI controllers (git-fixes). * drm/ttm/pool: Fix ttm_pool_alloc error path (git-fixes). * drm/ttm: Fix a NULL pointer dereference (git-fixes). * drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED (git-fixes). * drm/ttm: optimize pool allocations a bit v2 (git-fixes). * drm/vc4: crtc: Increase setup cost in core clock calculation to handle extreme reduced blanking (git-fixes). * drm/vc4: dpi: Add option for inverting pixel clock and output enable (git- fixes). * drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes). * drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes). * drm/vc4: drv: Call component_unbind_all() (git-fixes). * drm/vc4: hdmi: Correct interlaced timings again (git-fixes). * drm/vc4: hdmi: make CEC adapter name unique (git-fixes). * drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes). * drm/vc4: hvs: SCALER_DISPBKGND_AUTOHS is only valid on HVS4 (git-fixes). * drm/vc4: hvs: Set AXI panic modes (git-fixes). * drm/vc4: kms: Sort the CRTCs by output before assigning them (git-fixes). * drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes). * drm/vgem: add missing mutex_destroy (git-fixes). * drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes). * drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes). * drm/virtio: exbuf->fence_fd unmodified on interrupted wait (git-fixes). * drm/vkms: Fix memory leak in vkms_init() (git-fixes). * drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes). * drm/vmwgfx: Do not drop the reference to the handle too soon (git-fixes). * drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl() (git-fixes). * drm/vmwgfx: Fix race issue calling pin_user_pages (git-fixes). * drm/vmwgfx: Stop accessing buffer objects which failed init (git-fixes). * drm: Add orientation quirk for Lenovo ideapad D330-10IGL (git-fixes). * drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git- fixes). * drm: amd: display: Fix memory leakage (git-fixes). * drm: bridge: adv7511: unregister cec i2c device after cec adapter (git- fixes). * drm: exynos: dsi: Fix MIPI_DSI _ _NO__ mode flags (git-fixes). * drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes). * drm: mxsfb: DRM_IMX_LCDIF should depend on ARCH_MXC (git-fixes). * drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes). * drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 (git-fixes). * drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git- fixes). * drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes). * drm: tidss: Fix pixel format definition (git-fixes). * dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type (git-fixes). * dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes). * dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes). * dt-bindings: ata: ahci-ceva: Cover all 4 iommus entries (git-fixes). * dt-bindings: ata: ahci-ceva: convert to yaml (git-fixes). * dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes). * dt-bindings: iio: adc: renesas,rcar-gyroadc: Fix adi,ad7476 compatible value (git-fixes). * dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes). * dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes). * dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 'if' match (git- fixes). * dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git- fixes). * dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git- fixes). * dt-bindings: nvmem: qcom,spmi-sdam: fix example 'reg' property (git-fixes). * dt-bindings: power: renesas,apmu: Fix cpus property limits (git-fixes). * dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes). * dt-bindings: remoteproc: st,stm32-rproc: Fix phandle-array parameters description (git-fixes). * dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes). * dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes). * dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git- fixes). * dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes). * dt-bindings: usb: snps,dwc3: Fix "snps,hsphy_interface" type (git-fixes). * e1000e: Disable TSO on i219-LM card to increase speed (git-fixes). * eeprom: at24: also select REGMAP (git-fixes). * eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes). * efi/x86: libstub: Fix typo in __efi64_argmap* name (git-fixes). * efi: Accept version 2 of memory attributes table (git-fixes). * efi: efivars: Fix variable writes with unsupported query_variable_store() (git-fixes). * efi: efivars: Fix variable writes without query_variable_store() (git- fixes). * efi: fix potential NULL deref in efi_mem_reserve_persistent (git-fixes). * efi: rt-wrapper: Add missing include (git-fixes). * efi: ssdt: Do not free memory if ACPI table was loaded successfully (git- fixes). * efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes). * efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes). * elevator: update the document of elevator_switch (git-fixes). * ethernet: 3com/typhoon: do not write directly to netdev->dev_addr (git- fixes). * ethernet: 8390/etherh: do not write directly to netdev->dev_addr (git- fixes). * ethernet: i825xx: do not write directly to netdev->dev_addr (git-fixes). * ethernet: ice: avoid gcc-9 integer overflow warning (jsc#PED-376). * ethernet: seeq/ether3: do not write directly to netdev->dev_addr (git- fixes). * ethernet: tundra: do not write directly to netdev->dev_addr (git-fixes). * exit: Add and use make_task_dead (bsc#1207328). * exit: Allow oops_limit to be disabled (bsc#1207328). * exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328). * exit: Move force_uaccess back into do_exit (bsc#1207328). * exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328). * exit: Put an upper limit on how often we can oops (bsc#1207328). * exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328). * exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328). * ext4,f2fs: fix readahead of verity data (bsc#1207648). * ext4: Fix deadlock during directory rename (bsc#1210763). * ext4: Fix possible corruption when moving a directory (bsc#1210763). * ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619). * ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878). * ext4: add helper to check quota inums (bsc#1207618). * ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617). * ext4: add missing validation of fast-commit record lengths (bsc#1207626). * ext4: allocate extended attribute value in vmalloc area (bsc#1207635). * ext4: avoid crash when inline data creation follows DIO write (bsc#1206883). * ext4: avoid resizing to a partial cluster size (bsc#1206880). * ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634). * ext4: continue to expand file system when the target size does not reach (bsc#1206882). * ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592). * ext4: correct max_inline_xattr_value_size computing (bsc#1206878). * ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878). * ext4: disable fast-commit of encrypted dir operations (bsc#1207623). * ext4: do not allow journal inode to have encrypt flag (bsc#1207621). * ext4: do not increase iversion counter for ea_inodes (bsc#1207605). * ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603). * ext4: do not set up encryption key during jbd2 transaction (bsc#1207624). * ext4: drop ineligible txn start stop APIs (bsc#1207588). * ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606). * ext4: factor out ext4_fc_get_tl() (bsc#1207615). * ext4: fast commit may miss file actions (bsc#1207591). * ext4: fast commit may not fallback for ineligible commit (bsc#1207590). * ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886). * ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766). * ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767). * ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076). * ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 (bsc#1206881). * ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620). * ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594). * ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765). * ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891). * ext4: fix deadlock due to mbcache entry corruption (bsc#1207653). * ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631). * ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608). * ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630). * ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593). * ext4: fix extent status tree race in writeback error recovery path (bsc#1206877). * ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764). * ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636). * ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894). * ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625). * ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609). * ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884). * ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628). * ext4: fix possible double unlock when moving a directory (bsc#1210763). * ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611). * ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612). * ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616). * ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637). * ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627). * ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890). * ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893). * ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888). * ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622). * ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878). * ext4: fix warning in 'ext4_da_release_space' (bsc#1206887). * ext4: goto right label 'failed_mount3a' (bsc#1207610). * ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629). * ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633). * ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614). * ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602). * ext4: make ext4_lazyinit_thread freezable (bsc#1206885). * ext4: place buffer head allocation before handle start (bsc#1207607). * ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889). * ext4: simplify updating of fast commit stats (bsc#1207589). * ext4: unconditionally enable the i_version counter (bsc#1211299). * ext4: update 'state->fc_regions_size' after successful memory allocation (bsc#1207613). * ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876). * ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793). * extcon: usbc-tusb320: fix kernel-doc warning (git-fixes). * f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes). * fbcon: Check font dimension limits (git-fixes). * fbcon: Fix error paths in set_con2fb_map (git-fixes). * fbcon: Fix null-ptr-deref in soft_cursor (git-fixes). * fbcon: set_con2fb_map needs to set con2fb_map! (git-fixes). * fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472). * fbdev: arcfb: Fix error handling in arcfb_probe() (git-fixes). * fbdev: au1200fb: Fix potential divide by zero (git-fixes). * fbdev: ep93xx-fb: Add missing clk_disable_unprepare in ep93xxfb_probe() (git-fixes). * fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489) * fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387). * fbdev: intelfb: Fix potential divide by zero (git-fixes). * fbdev: lxfb: Fix potential divide by zero (git-fixes). * fbdev: mmp: Fix deferred clk handling in mmphw_probe() (git-fixes). * fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes). * fbdev: nvidia: Fix potential divide by zero (git-fixes). * fbdev: omapfb: avoid stack overflow warning (git-fixes). * fbdev: omapfb: cleanup inconsistent indentation (git-fixes). * fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes). * fbdev: stifb: Fall back to cfb_fillrect() on 32-bit HCRX cards (git-fixes). * fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes). * fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git- fixes). * fbdev: tgafb: Fix potential divide by zero (git-fixes). * fbdev: udlfb: Fix endpoint check (git-fixes). * fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes). * filelock: new helper: vfs_inode_has_locks (jsc#SES-1880). * firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region (git-fixes). * firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (git-fixes). * firmware: arm_ffa: Check if ffa_driver remove is present before executing (git-fixes). * firmware: arm_ffa: Set handle field to zero in memory descriptor (git- fixes). * firmware: arm_ffa: Set reserved/MBZ fields to zero in the memory descriptors (git-fixes). * firmware: arm_scmi: Fix device node validation for mailbox transport (git- fixes). * firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes). * firmware: coreboot: framebuffer: Ignore reserved pixel color bits (git- fixes). * firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git- fixes). * firmware: qcom_scm: Clear download bit during reboot (git-fixes). * firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes). * firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes). * firmware: xilinx: do not make a sleepable memory allocation from an atomic context (git-fixes). * flow_dissector: Do not count vlan tags inside tunnel payload (git-fixes). * fork: allow CLONE_NEWTIME in clone3 flags (bsc#1209258). * fotg210-udc: Add missing completion handler (git-fixes). * fpga: bridge: fix kernel-doc parameter description (git-fixes). * fpga: bridge: properly initialize bridge device before populating children (git-fixes). * fpga: m10bmc-sec: Fix probe rollback (git-fixes). * fpga: stratix10-soc: Fix return value check in s10_ops_write_init() (git- fixes). * fprobe: Check rethook_alloc() return in rethook initialization (git-fixes). * fprobe: Fix smatch type mismatch warning (git-fixes). * fprobe: add recursion detection in fprobe_exit_handler (git-fixes). * fprobe: make fprobe_kprobe_handler recursion free (git-fixes). * fs/jfs: fix shift exponent db_agl2size negative (git-fixes). * fs: account for filesystem mappings (bsc#1205191). * fs: account for group membership (bsc#1205191). * fs: add i_user_ns() helper (bsc#1205191). * fs: dlm: do not call kernel_getpeername() in error_report() (bsc#1208130). * fs: dlm: use sk->sk_socket instead of con->sock (bsc#1208130). * fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632). * fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes). * fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes). * fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes). * fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes). * fs: move mapping helpers (bsc#1205191). Refresh patches.suse/nfs-set-acl- perm.patch. * fs: remove __sync_filesystem (git-fixes). * fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes). * fs: tweak fsuidgid_has_mapping() (bsc#1205191). * fscache: Use wait_on_bit() to wait for the freeing of relinquished volume (bsc#1210409). * fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429). * ftrace/x86: Add back ftrace_expected for ftrace bug reports (git-fixes). * ftrace: Clean comments related to FTRACE_OPS_FL_PER_CPU (git-fixes). * ftrace: Fix invalid address access in lookup_rec() when index is 0 (git- fixes). * ftrace: Fix issue that 'direct->addr' not restored in modify_ftrace_direct() (git-fixes). * ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes). * fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759). * fuse: always revalidate rename target dentry (bsc#1211808). * fuse: fix attr version comparison in fuse_read_update_size() (bsc#1211807). * futex: Resend potentially swallowed owner death notification (git-fixes). * genirq: Provide new interfaces for affinity hints (bsc#1208153). * git-sort: Add io_uring 6.3 fixes remote * google/gve:fix repeated words in comments (bsc#1211519). * gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes). * gpio: davinci: Add irq chip flag to skip set wake (git-fixes). * gpio: mockup: Fix mode of debugfs files (git-fixes). * gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes). * gpio: vf610: connect GPIO label to dev name (git-fixes). * gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes). * gpu: host1x: Fix mask for syncpoint increment register (git-fixes). * gpu: host1x: Fix potential double free if IOMMU is disabled (git-fixes). * gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes). * gve: Adding a new AdminQ command to verify driver (bsc#1211519). * gve: Cache link_speed value from device (git-fixes). * gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519). * gve: Fix spelling mistake "droping" -> "dropping" (bsc#1211519). * gve: Handle alternate miss completions (bsc#1211519). * gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519). * gve: Remove the code of clearing PBA bit (git-fixes). * gve: Secure enough bytes in the first TX desc for all TCP pkts (git-fixes). * gve: enhance no queue page list detection (bsc#1211519). * hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes). * hfs/hfsplus: use WARN_ON for sanity check (git-fixes). * hfs: Fix OOB Write in hfs_asc2mac (git-fixes). * hfs: fix OOB Read in __hfs_brec_find (git-fixes). * hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes). * hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes). * hid: bigben_probe(): validate report count (git-fixes). * hv: fix comment typo in vmbus_channel/low_latency (git-fixes). * hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes). * hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes). * hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap() (git-fixes). * hwmon: (adm1266) Set `can_sleep` flag for GPIO chip (git-fixes). * hwmon: (adt7475) Display smoothing attributes in correct order (git-fixes). * hwmon: (adt7475) Fix masking of hysteresis registers (git-fixes). * hwmon: (adt7475) Use device_property APIs when configuring polarity (git- fixes). * hwmon: (coretemp) Simplify platform device handling (git-fixes). * hwmon: (ftsteutates) Fix scaling of measurements (git-fixes). * hwmon: (ina3221) return prober error code (git-fixes). * hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes). * hwmon: (k10temp): Add support for new family 17h and 19h models (bsc#1208848). * hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes). * hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip (git-fixes). * hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes). * hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git- fixes). * hwmon: (ucd90320) Add minimum delay between bus accesses (git-fixes). * hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition (git-fixes). * hwmon: fix potential sensor registration fail if of_node is missing (git- fixes). * hwmon: tmp512: drop of_match_ptr for ID table (git-fixes). * i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes). * i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes). * i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes). * i2c: hisi: Avoid redundant interrupts (git-fixes). * i2c: hisi: Only use the completion interrupt to finish the transfer (git- fixes). * i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes). * i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes). * i2c: mv64xxx: Add atomic_xfer method to driver (git-fixes). * i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes). * i2c: mv64xxx: Remove shutdown method from driver (git-fixes). * i2c: mxs: suppress probe-deferral error message (git-fixes). * i2c: ocores: generate stop condition after timeout in polling mode (git- fixes). * i2c: omap: Fix standard mode false ACK readings (git-fixes). * i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes). * i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes). * i2c: tegra: Fix PEC support for SMBUS block read (git-fixes). * i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git- fixes). * i40e: Add checking for null for nlmsg_find_attr() (jsc#SLE-18378). * i40e: Fix ADQ rate limiting for PF (jsc#SLE-18378). * i40e: Fix DMA mappings leak (jsc#SLE-18378). * i40e: Fix VF hang when reset is triggered on another VF (jsc#SLE-18378). * i40e: Fix VF set max MTU size (jsc#SLE-18378). * i40e: Fix VF's MAC Address change on VM (jsc#SLE-18378). * i40e: Fix adding ADQ filter to TC0 (jsc#SLE-18378). * i40e: Fix calculating the number of queue pairs (jsc#SLE-18378). * i40e: Fix erroneous adapter reinitialization during recovery process (jsc#SLE-18378). * i40e: Fix ethtool rx-flow-hash setting for X722 (jsc#SLE-18378). * i40e: Fix flow-type by setting GL_HASH_INSET registers (jsc#SLE-18378). * i40e: Fix for VF MAC address 0 (jsc#SLE-18378). * i40e: Fix incorrect address type for IPv6 flow rules (jsc#SLE-18378). * i40e: Fix interface init with MSI interrupts (no MSI-X) (jsc#SLE-18378). * i40e: Fix kernel crash during module removal (jsc#SLE-18378). * i40e: Fix kernel crash during reboot when adapter is in recovery mode (jsc#SLE-18378). * i40e: Fix set max_tx_rate when it is lower than 1 Mbps (jsc#SLE-18378). * i40e: Fix the inability to attach XDP program on downed interface (jsc#SLE-18378). * i40e: Refactor tc mqprio checks (jsc#SLE-18378). * i40e: add double of VLAN header when computing the max MTU (jsc#SLE-18378). * i40e: fix accessing vsi->active_filters without holding lock (jsc#SLE-18378). * i40e: fix flow director packet filter programming (jsc#SLE-18378). * i40e: fix i40e_setup_misc_vector() error handling (jsc#SLE-18378). * i40e: fix registers dump after run ethtool adapter self test (jsc#SLE-18378). * i825xx: sni_82596: use eth_hw_addr_set() (git-fixes). * i915 kABI workaround (git-fixes). * i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes). * iavf/iavf_main: actually log ->src mask when talking about it (jsc#SLE-18385). * iavf: Detach device during reset task (jsc#SLE-18385). * iavf: Disallow changing rx/tx-frames and rx/tx-frames-irq (jsc#SLE-18385). * iavf: Do not restart Tx queues after reset task failure (jsc#SLE-18385). * iavf: Fix 'tc qdisc show' listing too many queues (jsc#SLE-18385). * iavf: Fix a crash during reset task (jsc#SLE-18385). * iavf: Fix bad page state (jsc#SLE-18385). * iavf: Fix cached head and tail value for iavf_get_tx_pending (jsc#SLE-18385). * iavf: Fix error handling in iavf_init_module() (jsc#SLE-18385). * iavf: Fix max_rate limiting (jsc#SLE-18385). * iavf: Fix race condition between iavf_shutdown and iavf_remove (jsc#SLE-18385). * iavf: Fix set max MTU size with port VLAN and jumbo frames (jsc#SLE-18385). * iavf: do not track VLAN 0 filters (jsc#PED-835). * iavf: fix hang on reboot with ice (jsc#SLE-18385). * iavf: fix inverted Rx hash condition leading to disabled hash (jsc#SLE-18385). * iavf: fix non-tunneled IPv6 UDP packet type and hashing (jsc#SLE-18385). * iavf: fix temporary deadlock and failure to set MAC address (jsc#PED-835). * iavf: refactor VLAN filter states (jsc#PED-835). * iavf: remove active_cvlans and active_svlans bitmaps (jsc#PED-835). * iavf: schedule watchdog immediately when changing primary MAC (jsc#PED-835). * ice: Add check for kzalloc (jsc#PED-376). * ice: Call Trace after rmmod ice (bsc#1208628). * ice: Fix disabling Rx VLAN filtering with port VLAN enabled (jsc#PED-376). * ice: Fix interrupt moderation settings getting cleared (jsc#SLE-18375). * ice: Fix potential memory leak in ice_gnss_tty_write() (jsc#PED-376). * ice: Set txq_teid to ICE_INVAL_TEID on ring creation (jsc#SLE-18375). * ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158). * ice: move devlink port creation/deletion (jsc#PED-376). * ice: xsk: Fix cleaning of XDP_TX frames (jsc#PED-376). * ice: xsk: do not use xdp_return_frame() on tx_buf->raw_buf (jsc#PED-376). * ieee80211: add TWT element definitions (bsc#1209980). * igb: Add lock to avoid data race (jsc#SLE-18379). * igb: Enable SR-IOV after reinit (jsc#SLE-18379). * igb: Fix PPS input and output using 3rd and 4th SDP (jsc#PED-370). * igb: Initialize mailbox message for VF reset (jsc#SLE-18379). * igb: conditionalize I2C bit banging on external thermal sensor support (jsc#SLE-18379). * igb: revert rtnl_lock() that causes deadlock (jsc#SLE-18379). * igbvf: Regard vf reset nack as success (jsc#SLE-18379). * igc: Add checking for basetime less than zero (jsc#SLE-18377). * igc: Add ndo_tx_timeout support (jsc#SLE-18377). * igc: Enhance Qbv scheduling by using first flag bit (jsc#SLE-18377). * igc: Fix PPS delta between two synchronized end-points (jsc#SLE-18377). * igc: Lift TAPRIO schedule restriction (jsc#SLE-18377). * igc: Reinstate IGC_REMOVED logic and implement it properly (jsc#SLE-18377). * igc: Set Qbv start_time and end_time to end_time if not being configured in GCL (jsc#SLE-18377). * igc: Use strict cycles for Qbv scheduling (jsc#SLE-18377). * igc: allow BaseTime 0 enrollment for Qbv (jsc#SLE-18377). * igc: fix the validation logic for taprio's gate list (jsc#SLE-18377). * igc: read before write to SRRCTL register (jsc#SLE-18377). * igc: recalculate Qbv end_time by considering cycle time (jsc#SLE-18377). * igc: return an error if the mac type is unknown in igc_ptp_systim_to_hwtstamp() (jsc#SLE-18377). * iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() (git-fixes). * iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() (git-fixes). * iio: accel: st_accel: Fix invalid mount_matrix on devices without ACPI _ONT method (git-fixes). * iio: adc: ad7192: Change "shorted" channels to differential (git-fixes). * iio: adc: ad7791: fix IRQ flags (git-fixes). * iio: adc: ad_sigma_delta: Fix IRQ issue by setting IRQ_DISABLE_UNLAZY flag (git-fixes). * iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes). * iio: adc: berlin2-adc: Add missing of_node_put() in error path (git-fixes). * iio: adc: mxs-lradc: fix the order of two cleanup operations (git-fixes). * iio: adc: palmas_gpadc: fix NULL dereference on rmmod (git-fixes). * iio: adc: stm32-dfsdm: fill module aliases (git-fixes). * iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip (git-fixes). * iio: adis16480: select CONFIG_CRC32 (git-fixes). * iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes). * iio: dac: mcp4725: Fix i2c_master_send() return value handling (git-fixes). * iio: hid: fix the retval in accel_3d_capture_sample (git-fixes). * iio: hid: fix the retval in gyro_3d_capture_sample (git-fixes). * iio: imu: fxos8700: fix ACCEL measurement range selection (git-fixes). * iio: imu: fxos8700: fix IMU data bits returned to user space (git-fixes). * iio: imu: fxos8700: fix MAGN sensor scale and unit (git-fixes). * iio: imu: fxos8700: fix failed initialization ODR mode assignment (git- fixes). * iio: imu: fxos8700: fix incomplete ACCEL and MAGN channels readback (git- fixes). * iio: imu: fxos8700: fix incorrect ODR mode readback (git-fixes). * iio: imu: fxos8700: fix map label of channel type to MAGN sensor (git- fixes). * iio: imu: fxos8700: fix swapped ACCEL and MAGN channels readback (git- fixes). * iio: imu: fxos8700: remove definition FXOS8700_CTRL_ODR_MIN (git-fixes). * iio: imu: inv_icm42600: fix timestamp reset (git-fixes). * iio: light: cm32181: Unregister second I2C client if present (git-fixes). * iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes). * iio: light: tsl2772: fix reading proximity-diodes from device tree (git- fixes). * iio: light: vcnl4035: fixed chip ID check (git-fixes). * iio:adc:twl6030: Enable measurement of VAC (git-fixes). * iio:adc:twl6030: Enable measurements of VUSB, VBAT and others (git-fixes). * ima: Fix memory leak in __ima_inode_hash() (git-fixes). * intel/igbvf: free irq on the error path in igbvf_request_msix() (jsc#SLE-18379). * intel_idle: add Emerald Rapids Xeon support (PED-3849). * interconnect: exynos: fix node leak in probe PM QoS error path (git-fixes). * interconnect: fix mem leak when freeing nodes (git-fixes). * interconnect: qcom: osm-l3: fix icc_onecell_data allocation (git-fixes). * io_uring/fdinfo: fix sqe dumping for IORING_SETUP_SQE128 (git-fixes). * io_uring/kbuf: fix not advancing READV kbuf ring (git-fixes). * io_uring: ensure that cached task references are always put on exit (git- fixes). * io_uring: fix CQ waiting timeout handling (git-fixes). * io_uring: fix fget leak when fs do not support nowait buffered read (bsc#1205205). * io_uring: fix ordering of args in io_uring_queue_async_work (git-fixes). * io_uring: recycle kbuf recycle on tw requeue (git-fixes). * iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes). * iommu/vt-d: Add a fix for devices need extra dtlb flush (bsc#1208219). * iommu/vt-d: Avoid superfluous IOTLB tracking in lazy mode (bsc#1208948). * iommu/vt-d: Fix buggy QAT device mask (bsc#1208219). * ipmi: fix SSIF not responding under certain cond (git-fixes). * ipmi:ssif: Add 60ms time internal between write retries (bsc#1206459). * ipmi:ssif: Add a timer between request retries (bsc#1206459). * ipmi:ssif: Add send_retries increment (git-fixes). * ipmi:ssif: Increase the message retry time (bsc#1206459). * ipmi:ssif: Remove rtc_us_timer (bsc#1206459). * ipmi:ssif: resend_msg() cannot fail (bsc#1206459). * ipmi_ssif: Rename idle state and check (bsc#1206459). * ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592). * ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592). * irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes) * iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (git-fixes) * iwlwifi: cfg: Add missing MODULE_FIRMWARE() for *.pnvm (bsc#1207553). * ixgbe: Allow flow hash to be set via ethtool (jsc#SLE-18384). * ixgbe: Enable setting RSS table to default values (jsc#SLE-18384). * ixgbe: Fix panic during XDP_TX with > 64 CPUs (jsc#SLE-18384). * ixgbe: add double of VLAN header when computing the max MTU (jsc#SLE-18384). * ixgbe: allow to increase MTU to 3K with XDP enabled (jsc#SLE-18384). * ixgbe: fix pci device refcount leak (jsc#SLE-18384). * ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter (jsc#SLE-18384). * jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590). * jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646). * jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641). * jbd2: fix potential buffer head reference count leak (bsc#1207644). * jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645). * jbd2: use the correct print format (git-fixes). * jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643). * jfs: Fix fortify moan in symlink (git-fixes). * k-m-s: Drop Linux 2.6 support * kABI compatibility workaround for efivars (git-fixes). * kABI workaround for btbcm.c (git-fixes). * kABI workaround for drm_dp_mst helper updates (bsc#1206843). * kABI workaround for hid quirks (git-fixes). * kABI workaround for ieee80211 and co (bsc#1209980). * kABI workaround for mt76_poll_msec() (git-fixes). * kABI workaround for struct acpi_ec (bsc#1207149). * kABI workaround for xhci (git-fixes). * kABI: Fix kABI after backport Emulate RDPID only if it is enabled in guest (git-fixes) * kABI: Fixed broken 3rd party dirvers issue (bsc#1208050 bsc#1211414). * kABI: PCI: Reduce warnings on possible RW1C corruption (kabi). * kABI: PCI: dwc: Add dw_pcie_ops.host_deinit() callback (kabi). * kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi). * kABI: Preserve TRACE_EVENT_FL values (git-fixes). * kABI: Work around kABI changes after '20347fca71a3 swiotlb: split up the global swiotlb lock' (jsc#PED-3259). * kABI: fix kabi breakage (bsc#1210206). * kABI: x86/msi: Fix msi message data shadow struct (kabi). * kABI: x86/msr: Remove .fixup usage (kabi). * kabi/severities: add mlx5 internal symbols * kabi/severities: added Microsoft mana symbold (bsc#1210551) * kabi/severities: ignore KABI for NVMe target (bsc#1174777) * kabi/severities: ignore kABI changes for mt76/* local modules (bsc#1209980) * kasan: no need to unset panic_on_warn in end_report() (bsc#1207328). * kconfig: Update config changed flag before calling callback (git-fixes). * kernel-binary: install expoline.o (boo#1210791 bsc#1211089) * kernel-docs: Add missing top level chapter numbers on SLE12 SP5 (bsc#1212158). * kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731). * kernel: Avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529). * kernel: Do not sign the vanilla kernel (bsc#1209008). * kernel: Fix page corruption caused by racy check in __free_pages (bsc#1208149). * kernel: fix panic loop (bsc#1208290). * kernel: secureboot: fix kernel lock issue (bsc#1198101, bsc#1208976). * keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes). * keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088). * kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes). * kvm/vfio: Fix potential deadlock on vfio group_lock (git-fixes) * kvm/vfio: Fix potential deadlock problem in vfio (git-fixes) * kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode (git-fixes). * lan78xx: Add missing return code checks (git-fixes). * lan78xx: Fix exception on link speed change (git-fixes). * lan78xx: Fix memory allocation bug (git-fixes). * lan78xx: Fix partial packet errors on suspend/resume (git-fixes). * lan78xx: Fix race condition in disconnect handling (git-fixes). * lan78xx: Fix race conditions in suspend/resume handling (git-fixes). * lan78xx: Fix white space and style issues (git-fixes). * lan78xx: Remove unused pause frame queue (git-fixes). * lan78xx: Remove unused timer (git-fixes). * lan78xx: Set flow control threshold to prevent packet loss (git-fixes). * leds: Fix reference to led_set_brightness() in doc (git-fixes). * leds: TI_LMU_COMMON: select REGMAP instead of depending on it (git-fixes). * leds: led-class: Add missing put_device() to led_put() (git-fixes). * leds: led-core: Fix refcount leak in of_led_get() (git-fixes). * leds: tca6507: Fix error handling of using fwnode_property_read_string (git- fixes). * lib/mpi: Fix buffer overrun when SG is too long (git-fixes). * lib/sbitmap: Fix invalid loop in __sbitmap_queue_get_batch() (git-fixes). * lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git- fixes). * libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (git-fixes). * lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes). * locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998, bsc#1206552). * locking/rwbase: Mitigate indefinite writer starvation. Move out of sorted as the patch has moved within the tip tree. * locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers (git-fixes). * locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270). * locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270). * locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270). * locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270). * locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270). * locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270). * locking/rwsem: Make handoff bit handling more consistent (bsc#1207270). * locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270). * locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270). * locking: Add missing __sched attributes (bsc#1207270). * loop: Fix the max_loop commandline argument treatment when it is set to 0 (git-fixes). * loop: fix ioctl calls using compat_loop_info (git-fixes). * mac80211: introduce individual TWT support in AP mode (bsc#1209980). * mac80211: introduce set_radar_offchan callback (bsc#1209980). * mac80211: twt: do not use potentially unaligned pointer (bsc#1209980). * mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes). * mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes). * mailbox: zynqmp: Fix IPI isr handling (git-fixes). * mailbox: zynqmp: Fix typo in IPI documentation (git-fixes). * mbcache: Avoid nesting of cache->c_list_lock under bit locks (bsc#1207647). * mbcache: Fixup kABI of mb_cache_entry (bsc#1207653). * mce: fix set_mce_nospec to always unmap the whole page (git-fixes). * md/bitmap: Fix bitmap chunk size overflow issues (git-fixes). * md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes). * md/raid5: Improve performance for sequential IO (bsc#1208081). * md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d (git-fixes). * md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes). * md: Notify sysfs sync_completed in md_reap_sync_thread() (git-fixes). * md: fix a crash in mempool_free (git-fixes). * md: protect md_unregister_thread from reentrancy (git-fixes). * media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes). * media: coda: Add check for dcoda_iram_alloc (git-fixes). * media: coda: Add check for kmalloc (git-fixes). * media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() (git-fixes). * media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes). * media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes). * media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git- fixes). * media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git- fixes). * media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git- fixes). * media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes). * media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git- fixes). * media: dvb_ca_en50221: fix a size write bug (git-fixes). * media: dvb_demux: fix a bug for the continuity counter (git-fixes). * media: i2c: imx219: Fix binning for RAW8 capture (git-fixes). * media: i2c: imx219: Split common registers from mode tables (git-fixes). * media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes). * media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes). * media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes). * media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes). * media: m5mols: fix off-by-one loop termination error (git-fixes). * media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes). * media: max9286: Free control handler (git-fixes). * media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes). * media: netup_unidvb: fix irq init by register it at the end of probe (git- fixes). * media: netup_unidvb: fix use-after-free at del_timer() (git-fixes). * media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes). * media: ov5640: Fix analogue gain control (git-fixes). * media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes). * media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish (git- fixes). * media: platform: ti: Add missing check for devm_regulator_get (git-fixes). * media: radio-shark: Add endpoint checks (git-fixes). * media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes). * media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes). * media: rc: gpio-ir-recv: add remove function (git-fixes). * media: rcar_fdp1: Fix the correct variable assignments (git-fixes). * media: rcar_fdp1: Make use of the helper function devm_platform_ioremap_resource() (git-fixes). * media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes). * media: saa7134: Use video_unregister_device for radio_dev (git-fixes). * media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes). * media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes). * media: usb: siano: Fix use after free bugs caused by do_submit_urb (git- fixes). * media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS (git-fixes). * media: uvcvideo: Check controls flags before accessing them (git-fixes). * media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() (git-fixes). * media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL (git-fixes). * media: uvcvideo: Fix memory leak of object map on error exit path (git- fixes). * media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes). * media: uvcvideo: Handle cameras with invalid descriptors (git-fixes). * media: uvcvideo: Handle errors from calls to usb_string (git-fixes). * media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 (git- fixes). * media: uvcvideo: Remove s_ctrl and g_ctrl (git-fixes). * media: uvcvideo: Silence memcpy() run-time false positive warnings (git- fixes). * media: uvcvideo: Use control names from framework (git-fixes). * media: uvcvideo: refactor __uvc_ctrl_add_mapping (git-fixes). * media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git- fixes). * media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes). * media: venus: dec: Fix handling of the start cmd (git-fixes). * mei: bus-fixup:upon error print return values of send and receive (git- fixes). * mei: bus: fix unlink on bus in error path (git-fixes). * mei: me: add meteor lake point M DID (git-fixes). * mei: pxp: Use correct macros to initialize uuid_le (git-fixes). * memstick: fix memory leak if card device is never registered (git-fixes). * memstick: r592: Fix UAF bug in r592_remove due to race condition (bsc#1211449). * mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak (git- fixes). * mfd: cs5535: Do not build on UML (git-fixes). * mfd: dln2: Fix memory leak in dln2_probe() (git-fixes). * mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git- fixes). * mfd: tqmx86: Correct board names for TQMxE39x (git-fixes). * mfd: tqmx86: Do not access I2C_DETECT register through io_base (git-fixes). * misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes). * misc: enclosure: Fix doc for enclosure_find() (git-fixes). * misc: fastrpc: reject new invocations during device removal (git-fixes). * misc: fastrpc: return -EPIPE to invocations on device removal (git-fixes). * mkinitrd: fix dependency with dracut (bsc#1202353). * mlxsw: minimal: Fix deadlock in ports creation (git-fixes). * mlxsw: spectrum: Allow driver to load with old firmware versions (git- fixes). * mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768). * mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769). * mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() (bsc#1209262). * mm: memcg: fix swapcached stat accounting (bsc#1209804). * mm: mmap: remove newline at the end of the trace (git-fixes). * mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034). * mm: take a page reference when removing device exclusive entries (bsc#1211025). * mmc: atmel-mci: fix race between stop command and start of next command (git-fixes). * mmc: block: Remove error check of hw_reset on reset (git-fixes). * mmc: block: ensure error propagation for non-blk (git-fixes). * mmc: jz4740: Work around bug on JZ4760(B) (git-fixes). * mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes). * mmc: sdhci-esdhc-imx: make "no-mmc-hs400" works (git-fixes). * mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git- fixes). * mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes). * mmc: sdhci_am654: lower power-on failed message severity (git-fixes). * mmc: sdio: fix possible resource leaks in some error paths (git-fixes). * mmc: vub300: fix invalid response handling (git-fixes). * module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662). * mt76: Make use of the helper macro kthread_run() (bsc#1209980). * mt76: Print error message when reading EEPROM from mtd failed (bsc#1209980). * mt76: add 6GHz support (bsc#1209980). * mt76: add MT_RXQ_MAIN_WA for mt7916 (bsc#1209980). * mt76: add support for setting mcast rate (bsc#1209980). * mt76: allow drivers to drop rx packets early (bsc#1209980). * mt76: clear sta powersave flag after notifying driver (bsc#1209980). * mt76: connac: add 6 GHz support for wtbl and starec configuration (bsc#1209980). * mt76: connac: add 6GHz support to mt76_connac_mcu_set_channel_domain (bsc#1209980). * mt76: connac: add 6GHz support to mt76_connac_mcu_sta_tlv (bsc#1209980). * mt76: connac: add 6GHz support to mt76_connac_mcu_uni_add_bss (bsc#1209980). * mt76: connac: add support for limiting to maximum regulatory Tx power (bsc#1209980). * mt76: connac: add support for passing the cipher field in bss_info (bsc#1209980). * mt76: connac: adjust wlan_idx size from u8 to u16 (bsc#1209980). * mt76: connac: align MCU_EXT definitions with 7915 driver (bsc#1209980). * mt76: connac: enable 6GHz band for hw scan (bsc#1209980). * mt76: connac: enable hw amsdu @ 6GHz (bsc#1209980). * mt76: connac: extend mcu_get_nic_capability (bsc#1209980). * mt76: connac: fix a theoretical NULL pointer dereference in mt76_connac_get_phy_mode (bsc#1209980). * mt76: connac: fix last_chan configuration in mt76_connac_mcu_rate_txpower_band (bsc#1209980). * mt76: connac: fix unresolved symbols when CONFIG_PM is unset (bsc#1209980). * mt76: connac: introduce MCU_CE_CMD macro (bsc#1209980). * mt76: connac: introduce MCU_EXT macros (bsc#1209980). * mt76: connac: introduce MCU_UNI_CMD macro (bsc#1209980). * mt76: connac: introduce is_connac_v1 utility routine (bsc#1209980). * mt76: connac: make read-only array ba_range static const (bsc#1209980). * mt76: connac: move mcu reg access utility routines in mt76_connac_lib module (bsc#1209980). * mt76: connac: move mt76_connac_chan_bw in common code (bsc#1209980). * mt76: connac: move mt76_connac_lmac_mapping in mt76-connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_add_key in connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_bss_basic_tlv in connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_bss_ext_tlv in connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_bss_omac_tlv in connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_gen_dl_mode in mt76-connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_get_cipher in common code (bsc#1209980). * mt76: connac: move mt76_connac_mcu_rdd_cmd in mt76-connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_restart in common module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_set_pm in connac module (bsc#1209980). * mt76: connac: move mt76_connac_mcu_wtbl_update_hdr_trans in connac module (bsc#1209980). * mt76: connac: rely on MCU_CMD macro (bsc#1209980). * mt76: connac: rely on le16_add_cpu in mt76_connac_mcu_add_nested_tlv (bsc#1209980). * mt76: connac: remove MCU_FW_PREFIX bit (bsc#1209980). * mt76: connac: remove PHY_MODE_AX_6G configuration in mt76_connac_get_phy_mode (bsc#1209980). * mt76: connac: set 6G phymode in mt76_connac_get_phy_mode{,v2} (bsc#1209980). * mt76: connac: set 6G phymode in single-sku support (bsc#1209980). * mt76: debugfs: fix queue reporting for mt76-usb (bsc#1209980). * mt76: debugfs: improve queue node readability (bsc#1209980). * mt76: disable BH around napi_schedule() calls (bsc#1209980). * mt76: do not access 802.11 header in ccmp check for 802.3 rx skbs (bsc#1209980). * mt76: do not always copy ethhdr in reverse_frag0_hdr_trans (bsc#1209980). * mt76: do not reset MIB counters in get_stats callback (bsc#1209980). * mt76: eeprom: tolerate corrected bit-flips (bsc#1209980). * mt76: fill boottime_ns in Rx path (bsc#1209980). * mt76: fix antenna config missing in 6G cap (bsc#1209980). * mt76: fix boolreturn.cocci warnings (bsc#1209980). * mt76: fix dfs state issue with 160 MHz channels (bsc#1209980). * mt76: fix endianness errors in reverse_frag0_hdr_trans (bsc#1209980). * mt76: fix invalid rssi report (bsc#1209980). * mt76: fix key pointer overwrite in mt7921s_write_txwi/mt7663_usb_sdio_write_txwi (bsc#1209980). * mt76: fix monitor rx FCS error in DFS channel (bsc#1209980). * mt76: fix possible OOB issue in mt76_calculate_default_rate (bsc#1209980). * mt76: fix possible pktid leak (bsc#1209980). * mt76: fix the wiphy's available antennas to the correct value (bsc#1209980). * mt76: fix timestamp check in tx_status (bsc#1209980). * mt76: fix tx status related use-after-free race on station removal (bsc#1209980). * mt76: fix use-after-free by removing a non-RCU wcid pointer (git-fixes). * mt76: fix wrong HE data rate in sniffer tool (bsc#1209980). * mt76: improve signal strength reporting (bsc#1209980). * mt76: introduce packet_id idr (bsc#1209980). * mt76: make mt76_sar_capa static (bsc#1209980). * mt76: move mt76_ethtool_worker_info in mt76 module (bsc#1209980). * mt76: move mt76_sta_stats in mt76.h (bsc#1209980). * mt76: move sar utilities to mt76-core module (bsc#1209980). * mt76: move sar_capa configuration in common code (bsc#1209980). * mt76: move spin_lock_bh to spin_lock in tasklet (bsc#1209980). * mt76: mt7603: improve reliability of tx powersave filtering (bsc#1209980). * mt76: mt7603: introduce SAR support (bsc#1209980). * mt76: mt7615: add support for LG LGSBWAC02 (MT7663BUN) (bsc#1209980). * mt76: mt7615: apply cached RF data for DBDC (bsc#1209980). * mt76: mt7615: clear mcu error interrupt status on mt7663 (bsc#1209980). * mt76: mt7615: fix a possible race enabling/disabling runtime-pm (bsc#1209980). * mt76: mt7615: fix compiler warning on frame size (bsc#1209980). * mt76: mt7615: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980). * mt76: mt7615: fix throughput regression on DFS channels (bsc#1209980). * mt76: mt7615: fix unused tx antenna mask in testmode (bsc#1209980). * mt76: mt7615: fix/rewrite the dfs state handling logic (bsc#1209980). * mt76: mt7615: honor ret from mt7615_mcu_restart in mt7663u_mcu_init (bsc#1209980). * mt76: mt7615: in debugfs queue stats, skip wmm index 3 on mt7663 (bsc#1209980). * mt76: mt7615: introduce SAR support (bsc#1209980). * mt76: mt7615: move mt7615_mcu_set_p2p_oppps in mt76_connac module (bsc#1209980). * mt76: mt7615: remove dead code in get_omac_idx (bsc#1209980). * mt76: mt7615: update bss_info with cipher after setting the group key (bsc#1209980). * mt76: mt7615e: process txfree and txstatus without allocating skbs (bsc#1209980). * mt76: mt7663: disable 4addr capability (bsc#1209980). * mt76: mt7663s: flush runtime-pm queue after waking up the device (bsc#1209980). * mt76: mt7663s: rely on mcu reg access utility (bsc#1209980). * mt76: mt7663u: introduce mt7663u_mcu_power_on routine (bsc#1209980). * mt76: mt76_connac: fix MCU_CE_CMD_SET_ROC definition error (bsc#1209980). * mt76: mt76x02: improve tx hang detection (bsc#1209980). * mt76: mt76x02: introduce SAR support (bsc#1209980). * mt76: mt76x02: use mt76_phy_dfs_state to determine radar detector state (bsc#1209980). * mt76: mt76x0: correct VHT MCS 8/9 tx power eeprom offset (bsc#1209980). * mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() (bsc#1209980). * mt76: mt7915: Fix channel state update error issue (bsc#1209980). * mt76: mt7915: add 6 GHz support (bsc#1209980). * mt76: mt7915: add HE-LTF into fixed rate command (bsc#1209980). * mt76: mt7915: add LED support (bsc#1209980). * mt76: mt7915: add WA firmware log support (bsc#1209980). * mt76: mt7915: add control knobs for thermal throttling (bsc#1209980). * mt76: mt7915: add debugfs knobs for MCU utilization (bsc#1209980). * mt76: mt7915: add default calibrated data support (bsc#1209980). * mt76: mt7915: add device id for mt7916 (bsc#1209980). * mt76: mt7915: add ethtool stats support (bsc#1209980). * mt76: mt7915: add firmware support for mt7916 (bsc#1209980). * mt76: mt7915: add mib counters to ethtool stats (bsc#1209980). * mt76: mt7915: add missing DATA4_TB_SPTL_REUSE1 to mt7915_mac_decode_he_radiotap (bsc#1209980). * mt76: mt7915: add more MIB registers (bsc#1209980). * mt76: mt7915: add mt7915_mmio_probe() as a common probing function (bsc#1209980). * mt76: mt7915: add mt7916 calibrated data support (bsc#1209980). * mt76: mt7915: add mu-mimo and ofdma debugfs knobs (bsc#1209980). * mt76: mt7915: add some per-station tx stats to ethtool (bsc#1209980). * mt76: mt7915: add support for MT7986 (bsc#1209980). * mt76: mt7915: add support for passing chip/firmware debug data to user space (bsc#1209980). * mt76: mt7915: add twt_stats knob in debugfs (bsc#1209980). * mt76: mt7915: add tx mu/su counters to mib (bsc#1209980). * mt76: mt7915: add tx stats gathered from tx-status callbacks (bsc#1209980). * mt76: mt7915: add txfree event v3 (bsc#1209980). * mt76: mt7915: add txpower init for 6GHz (bsc#1209980). * mt76: mt7915: allow beaconing on all chains (bsc#1209980). * mt76: mt7915: change max rx len limit of hw modules (bsc#1209980). * mt76: mt7915: check band idx for bcc event (bsc#1209980). * mt76: mt7915: check for devm_pinctrl_get() failure (bsc#1209980). * mt76: mt7915: do not pass data pointer to mt7915_mcu_muru_debug_set (bsc#1209980). * mt76: mt7915: enable HE UL MU-MIMO (bsc#1209980). * mt76: mt7915: enable configured beacon tx rate (bsc#1209980). * mt76: mt7915: enable radar background detection (bsc#1209980). * mt76: mt7915: enable radar trigger on rdd2 (bsc#1209980). * mt76: mt7915: enable twt responder capability (bsc#1209980). * mt76: mt7915: enlarge wcid size to 544 (bsc#1209980). * mt76: mt7915: fix DBDC default band selection on MT7915D (bsc#1209980). * mt76: mt7915: fix DFS no radar detection event (bsc#1209980). * mt76: mt7915: fix SMPS operation fail (bsc#1209980). * mt76: mt7915: fix WMM index on DBDC cards (bsc#1209980). * mt76: mt7915: fix beamforming mib stats (bsc#1209980). * mt76: mt7915: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980). * mt76: mt7915: fix eeprom fields of txpower init values (bsc#1209980). * mt76: mt7915: fix endiannes warning mt7915_mcu_beacon_check_caps (bsc#1209980). * mt76: mt7915: fix endianness warnings in mt7915_debugfs_rx_fw_monitor (bsc#1209980). * mt76: mt7915: fix endianness warnings in mt7915_mac_tx_free() (bsc#1209980). * mt76: mt7915: fix he_mcs capabilities for 160mhz (bsc#1209980). * mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git- fixes). * mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git- fixes). * mt76: mt7915: fix mcs_map in mt7915_mcu_set_sta_he_mcs() (bsc#1209980). * mt76: mt7915: fix missing HE phy cap (bsc#1209980). * mt76: mt7915: fix phy cap in mt7915_set_stream_he_txbf_caps() (bsc#1209980). * mt76: mt7915: fix polling firmware-own status (git-fixes). * mt76: mt7915: fix possible NULL pointer dereference in mt7915_mac_fill_rx_vector (git-fixes). * mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta (bsc#1209980). * mt76: mt7915: fix possible uninitialized pointer dereference in mt7986_wmac_gpio_setup (bsc#1209980). * mt76: mt7915: fix potential NPE in TXS processing (bsc#1209980). * mt76: mt7915: fix potential memory leak of fw monitor packets (bsc#1209980). * mt76: mt7915: fix return condition in mt7915_tm_reg_backup_restore() (bsc#1209980). * mt76: mt7915: fix the muru tlv issue (bsc#1209980). * mt76: mt7915: fix the nss setting in bitrates (bsc#1209980). * mt76: mt7915: fix twt table_mask to u16 in mt7915_dev (bsc#1209980). * mt76: mt7915: fix txbf starec TLV issues (bsc#1209980). * mt76: mt7915: fix typos in comments (bsc#1209980). * mt76: mt7915: fix/rewrite the dfs state handling logic (bsc#1209980). * mt76: mt7915: get rid of mt7915_mcu_set_fixed_rate routine (bsc#1209980). * mt76: mt7915: honor all possible error conditions in mt7915_mcu_init() (bsc#1209980). * mt76: mt7915: improve code readability for xmit-queue handler (bsc#1209980). * mt76: mt7915: improve code readability in mt7915_mcu_sta_bfer_ht (bsc#1209980). * mt76: mt7915: improve starec readability of txbf (bsc#1209980). * mt76: mt7915: improve wmm index allocation (bsc#1209980). * mt76: mt7915: initialize smps mode in mt7915_mcu_sta_rate_ctrl_tlv() (bsc#1209980). * mt76: mt7915: introduce SAR support (bsc#1209980). * mt76: mt7915: introduce __mt7915_get_tsf routine (bsc#1209980). * mt76: mt7915: introduce band_idx in mt7915_phy (bsc#1209980). * mt76: mt7915: introduce bss coloring support (bsc#1209980). * mt76: mt7915: introduce mt76 debugfs sub-dir for ext-phy (bsc#1209980). * mt76: mt7915: introduce mt76_vif in mt7915_vif (bsc#1209980). * mt76: mt7915: introduce mt7915_mac_add_twt_setup routine (bsc#1209980). * mt76: mt7915: introduce mt7915_mcu_beacon_check_caps() (bsc#1209980). * mt76: mt7915: introduce mt7915_mcu_twt_agrt_update mcu command (bsc#1209980). * mt76: mt7915: introduce mt7915_set_radar_background routine (bsc#1209980). * mt76: mt7915: introduce rdd_monitor debugfs node (bsc#1209980). * mt76: mt7915: move pci specific code back to pci.c (bsc#1209980). * mt76: mt7915: move tx amsdu stats in mib_stats (bsc#1209980). * mt76: mt7915: process txfree and txstatus without allocating skbs (bsc#1209980). * mt76: mt7915: refine register definition (bsc#1209980). * mt76: mt7915: rely on mt76_connac definitions (bsc#1209980). * mt76: mt7915: rely on mt76_connac_get_phy utilities (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_add_tlv routine (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_alloc_sta_req (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_alloc_wtbl_req (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_init_download (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_patch_sem_ctrl/mt76_connac_mcu_start_patch (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_set_rts_thresh (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_sta_ba (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_sta_ba_tlv (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_sta_basic_tlv (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_sta_uapsd (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_start_firmware (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_wtbl_ba_tlv (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_wtbl_generic_tlv (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_wtbl_hdr_trans_tlv (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_wtbl_ht_tlv (bsc#1209980). * mt76: mt7915: rely on mt76_connac_mcu_wtbl_smps_tlv (bsc#1209980). * mt76: mt7915: remove dead code in debugfs code (bsc#1209980). * mt76: mt7915: remove duplicated defs in mcu.h (bsc#1209980). * mt76: mt7915: remove mt7915_mcu_add_he() (bsc#1209980). * mt76: mt7915: rename debugfs tx-queues (bsc#1209980). * mt76: mt7915: report radar pattern if detected by rdd2 (bsc#1209980). * mt76: mt7915: report rx mode value in mt7915_mac_fill_rx_rate (bsc#1209980). * mt76: mt7915: rework .set_bitrate_mask() to support more options (bsc#1209980). * mt76: mt7915: rework debugfs fixed-rate knob (bsc#1209980). * mt76: mt7915: rework debugfs queue info (bsc#1209980). * mt76: mt7915: rework dma.c to adapt mt7916 changes (bsc#1209980). * mt76: mt7915: rework eeprom.c to adapt mt7916 changes (bsc#1209980). * mt76: mt7915: rework mt7915_mcu_sta_muru_tlv() (bsc#1209980). * mt76: mt7915: rework starec TLV tags (bsc#1209980). * mt76: mt7915: run mt7915_get_et_stats holding mt76 mutex (bsc#1209980). * mt76: mt7915: send EAPOL frames at lowest rate (bsc#1209980). * mt76: mt7915: set VTA bit in tx descriptor (bsc#1209980). * mt76: mt7915: set band1 TGID field in tx descriptor (bsc#1209980). * mt76: mt7915: set bssinfo/starec command when adding interface (bsc#1209980). * mt76: mt7915: set muru platform type (bsc#1209980). * mt76: mt7915: simplify conditional (bsc#1209980). * mt76: mt7915: switch proper tx arbiter mode in testmode (bsc#1209980). * mt76: mt7915: update bss_info with cipher after setting the group key (bsc#1209980). * mt76: mt7915: update mac timing settings (bsc#1209980). * mt76: mt7915: update max_mpdu_size in mt7915_mcu_sta_amsdu_tlv() (bsc#1209980). * mt76: mt7915: update mt7915_chan_mib_offs for mt7916 (bsc#1209980). * mt76: mt7915: update rx rate reporting for mt7916 (bsc#1209980). * mt76: mt7915: use min_t() to make code cleaner (bsc#1209980). * mt76: mt7915e: Add a hwmon attribute to get the actual throttle state (bsc#1209980). * mt76: mt7915e: Enable thermal management by default (bsc#1209980). * mt76: mt7915e: Fix degraded performance after temporary overheat (bsc#1209980). * mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes). * mt76: mt7921: add 6GHz support (bsc#1209980). * mt76: mt7921: add MT7921_COMMON module (bsc#1209980). * mt76: mt7921: add MU EDCA cmd support (bsc#1209980). * mt76: mt7921: add delay config for sched scan (bsc#1209980). * mt76: mt7921: add mt7921u driver (bsc#1209980). * mt76: mt7921: add per-vif counters in ethtool (bsc#1209980). * mt76: mt7921: add some more MIB counters (bsc#1209980). * mt76: mt7921: add sta stats accounting in mt7921_mac_add_txs_skb (bsc#1209980). * mt76: mt7921: add support for PCIe ID 0x0608/0x0616 (bsc#1209980). * mt76: mt7921: add support for tx status reporting (bsc#1209980). * mt76: mt7921: clear pm->suspended in mt7921_mac_reset_work (bsc#1209980). * mt76: mt7921: disable 4addr capability (bsc#1209980). * mt76: mt7921: disable runtime pm for usb (bsc#1209980). * mt76: mt7921: do not always disable fw runtime-pm (bsc#1209980). * mt76: mt7921: do not enable beacon filter when IEEE80211_CONF_CHANGE_MONITOR is set (bsc#1209980). * mt76: mt7921: do not update pm states in case of error (git-fixes). * mt76: mt7921: fix MT7921E reset failure (bsc#1209980). * mt76: mt7921: fix Wformat build warning (bsc#1209980). * mt76: mt7921: fix a possible race enabling/disabling runtime-pm (bsc#1209980). * mt76: mt7921: fix boolreturn.cocci warning (bsc#1209980). * mt76: mt7921: fix build regression (bsc#1209980). * mt76: mt7921: fix endianness issues in mt7921_mcu_set_tx() (bsc#1209980). * mt76: mt7921: fix endianness warnings in mt7921_mac_decode_he_mu_radiotap (bsc#1209980). * mt76: mt7921: fix ht mcs in mt7921_mac_add_txs_skb() (bsc#1209980). * mt76: mt7921: fix injected MPDU transmission to not use HW A-MSDU (bsc#1209980). * mt76: mt7921: fix kernel crash at mt7921_pci_remove (git-fixes). * mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data (git- fixes). * mt76: mt7921: fix mt7921s Kconfig (bsc#1209980). * mt76: mt7921: fix network buffer leak by txs missing (bsc#1209980). * mt76: mt7921: fix possible NULL pointer dereference in mt7921_mac_write_txwi (bsc#1209980). * mt76: mt7921: fix up the monitor mode (bsc#1209980). * mt76: mt7921: fix xmit-queue dump for usb and sdio (bsc#1209980). * mt76: mt7921: forbid the doze mode when coredump is in progress (bsc#1209980). * mt76: mt7921: get rid of monitor_vif (bsc#1209980). * mt76: mt7921: get rid of mt7921_mcu_get_eeprom (bsc#1209980). * mt76: mt7921: get rid of mt7921_wait_for_mcu_init declaration (bsc#1209980). * mt76: mt7921: honor mt76_connac_mcu_set_rate_txpower return value in mt7921_config (bsc#1209980). * mt76: mt7921: honor pm user configuration in mt7921_sniffer_interface_iter (bsc#1209980). * mt76: mt7921: introduce 160 MHz channel bandwidth support (bsc#1209980). * mt76: mt7921: introduce mt7921s support (bsc#1209980). * mt76: mt7921: introduce stats reporting through ethtool (bsc#1209980). * mt76: mt7921: make all event parser reusable between mt7921s and mt7921e (bsc#1209980). * mt76: mt7921: make mt7921_init_tx_queues static (bsc#1209980). * mt76: mt7921: move mt76_connac_mcu_set_hif_suspend to bus-related files (bsc#1209980). * mt76: mt7921: move mt7921_init_hw in a dedicated work (bsc#1209980). * mt76: mt7921: move mt7921_queue_rx_skb to mac.c (bsc#1209980). * mt76: mt7921: move mt7921_usb_sdio_tx_complete_skb in common mac code (bsc#1209980). * mt76: mt7921: move mt7921_usb_sdio_tx_prepare_skb in common mac code (bsc#1209980). * mt76: mt7921: move mt7921_usb_sdio_tx_status_data in mac common code (bsc#1209980). * mt76: mt7921: move tx amsdu stats in mib_stats (bsc#1209980). * mt76: mt7921: reduce log severity levels for informative messages (bsc#1209980). * mt76: mt7921: refactor dma.c to be pcie specific (bsc#1209980). * mt76: mt7921: refactor init.c to be bus independent (bsc#1209980). * mt76: mt7921: refactor mac.c to be bus independent (bsc#1209980). * mt76: mt7921: refactor mcu.c to be bus independent (bsc#1209980). * mt76: mt7921: refactor mt7921_mcu_send_message (bsc#1209980). * mt76: mt7921: rely on mcu_get_nic_capability (bsc#1209980). * mt76: mt7921: remove dead definitions (bsc#1209980). * mt76: mt7921: remove duplicated code in mt7921_mac_decode_he_radiotap (bsc#1209980). * mt76: mt7921: remove mcu rate reporting code (bsc#1209980). * mt76: mt7921: remove mt7921_sta_stats (bsc#1209980). * mt76: mt7921: report tx rate directly from tx status (bsc#1209980). * mt76: mt7921: robustify hardware initialization flow (bsc#1209980). * mt76: mt7921: send EAPOL frames at lowest rate (bsc#1209980). * mt76: mt7921: set EDCA parameters with the MCU CE command (bsc#1209980). * mt76: mt7921: start reworking tx rate reporting (bsc#1209980). * mt76: mt7921: toggle runtime-pm adding a monitor vif (bsc#1209980). * mt76: mt7921: update mib counters dumping phy stats (bsc#1209980). * mt76: mt7921: update mt7921_skb_add_usb_sdio_hdr to support usb (bsc#1209980). * mt76: mt7921: use correct iftype data on 6GHz cap init (bsc#1209980). * mt76: mt7921: use mt76_hw instead of open coding it (bsc#1209980). * mt76: mt7921: use physical addr to unify register access (bsc#1209980). * mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835). * mt76: mt7921e: make dev->fw_assert usage consistent (bsc#1209980). * mt76: mt7921e: process txfree and txstatus without allocating skbs (bsc#1209980). * mt76: mt7921s: add reset support (bsc#1209980). * mt76: mt7921s: clear MT76_STATE_MCU_RUNNING immediately after reset (bsc#1209980). * mt76: mt7921s: fix a possible memory leak in mt7921_load_patch (bsc#1209980). * mt76: mt7921s: fix bus hang with wrong privilege (bsc#1209980). * mt76: mt7921s: fix cmd timeout in throughput test (bsc#1209980). * mt76: mt7921s: fix firmware download random fail (bsc#1209980). * mt76: mt7921s: fix missing fc type/sub-type for 802.11 pkts (bsc#1209980). * mt76: mt7921s: fix mt7921s_mcu_[fw|drv]_pmctrl (bsc#1209980). * mt76: mt7921s: fix possible kernel crash due to invalid Rx count (bsc#1209980). * mt76: mt7921s: fix possible sdio deadlock in command fail (bsc#1209980). * mt76: mt7921s: fix suspend error with enlarging mcu timeout value (bsc#1209980). * mt76: mt7921s: fix the device cannot sleep deeply in suspend (bsc#1209980). * mt76: mt7921s: make pm->suspended usage consistent (bsc#1209980). * mt76: mt7921s: run sleep mode by default (bsc#1209980). * mt76: mt7921s: update mt7921s_wfsys_reset sequence (bsc#1209980). * mt76: only access ieee80211_hdr after mt76_insert_ccmp_hdr (bsc#1209980). * mt76: only set rx radiotap flag from within decoder functions (bsc#1209980). * mt76: redefine mt76_for_each_q_rx to adapt mt7986 changes (bsc#1209980). * mt76: rely on phy pointer in mt76_register_debugfs_fops routine signature (bsc#1209980). * mt76: remove mt76_wcid pointer from mt76_tx_status_check signature (bsc#1209980). * mt76: remove variable set but not used (bsc#1209980). * mt76: reverse the first fragmented frame to 802.11 (bsc#1209980). * mt76: schedule status timeout at dma completion (bsc#1209980). * mt76: sdio: disable interrupt in mt76s_sdio_irq (bsc#1209980). * mt76: sdio: export mt76s_alloc_rx_queue and mt76s_alloc_tx routines (bsc#1209980). * mt76: sdio: extend sdio module to support CONNAC2 (bsc#1209980). * mt76: sdio: honor the largest Tx buffer the hardware can support (bsc#1209980). * mt76: sdio: introduce parse_irq callback (bsc#1209980). * mt76: sdio: lock sdio when it is needed (bsc#1209980). * mt76: sdio: move common code in mt76_sdio module (bsc#1209980). * mt76: set wlan_idx_hi on mt7916 (bsc#1209980). * mt76: split single ldpc cap bit into bits (bsc#1209980). * mt76: substitute sk_buff_head status_list with spinlock_t status_lock (bsc#1209980). * mt76: support reading EEPROM data embedded in fdt (bsc#1209980). * mt76: switch from 'pci_' to 'dma_' API (bsc#1209980). * mt76: testmode: add support to set MAC (bsc#1209980). * mt76: usb: add req_type to ___mt76u_rr signature (bsc#1209980). * mt76: usb: add req_type to ___mt76u_wr signature (bsc#1209980). * mt76: usb: introduce __mt76u_init utility routine (bsc#1209980). * mt76: use IEEE80211_OFFLOAD_ENCAP_ENABLED instead of MT_DRV_AMSDU_OFFLOAD (bsc#1209980). * mt76: use a separate CCMP PN receive counter for management frames (bsc#1209980). * mt76: use le32/16_get_bits() whenever possible (bsc#1209980). * mt76x02: improve mac error check/reset reliability (bsc#1209980). * mtd: core: fix error path for nvmem provider (git-fixes). * mtd: core: fix nvmem error reporting (git-fixes). * mtd: core: provide unique name for nvmem device, take two (git-fixes). * mtd: dataflash: remove duplicate SPI ID table (git-fixes). * mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes). * mtd: rawnand: ingenic: fix empty stub helper definitions (git-fixes). * mtd: rawnand: marvell: do not set the NAND frequency select (git-fixes). * mtd: rawnand: marvell: ensure timing values are written (git-fixes). * mtd: rawnand: meson: fix bitmask for length in command word (git-fixes). * mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes). * mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes). * mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git- fixes). * mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes). * mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes). * mtd: spi-nor: Fix a trivial typo (git-fixes). * mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes). * mtd: spi-nor: core: fix implicit declaration warning (git-fixes). * mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes). * mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes). * mtdblock: tolerate corrected bit-flips (git-fixes). * nbd: Fix hung on disconnect request if socket is closed before (git-fixes). * nbd: Fix hung when signal interrupts nbd_start_device_ioctl() (git-fixes). * nbd: Fix hungtask when nbd_config_put (git-fixes). * nbd: add missing definition of pr_fmt (git-fixes). * nbd: call genl_unregister_family() first in nbd_cleanup() (git-fixes). * nbd: fix io hung while disconnecting device (git-fixes). * nbd: fix race between nbd_alloc_config() and module removal (git-fixes). * net/iucv: Fix size of interrupt data (bsc#1211465 git-fixes). * net/mlx5: Dynamically resize flow counters query buffer (bsc#1195175). * net/rose: Fix to not accept on connected socket (git-fixes). * net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git- fixes). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1207842). * net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes). * net/x25: Fix to not accept on connected socket (git-fixes). * net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes). * net: accept UFOv6 packages in virtio_net_hdr_to_skb (git-fixes). * net: add missing include in include/net/gro.h (git-fixes). * net: asix: fix modprobe "sysfs: cannot create duplicate filename" (git- fixes). * net: bridge: command/utility delivers no return output(bsc#1208368). * net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize (git-fixes). * net: devlink: Fix missing mutex_unlock() call (git-fixes). * net: linkwatch: be more careful about dev->linkwatch_dev_tracker (git- fixes). * net: mana: Add new MANA VF performance counters for easier troubleshooting (bsc#1209982). * net: mana: Add support for auxiliary device (bsc#1210741 jsc#PED-4022). * net: mana: Add support for jumbo frame (bsc#1210551). * net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153). * net: mana: Check if netdev/napi_alloc_frag returns single page (bsc#1210551). * net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES (bsc#1210741 jsc#PED-4022). * net: mana: Define data structures for allocating doorbell page from GDMA (bsc#1210741 jsc#PED-4022). * net: mana: Define data structures for protection domain and memory registration (bsc#1210741 jsc#PED-4022). * net: mana: Define max values for SGL entries (bsc#1210741 jsc#PED-4022). * net: mana: Enable RX path to handle various MTU sizes (bsc#1210551). * net: mana: Export Work Queue functions for use by RDMA driver (bsc#1210741 jsc#PED-4022). * net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875). * net: mana: Fix accessing freed irq affinity_hint (bsc#1208153). * net: mana: Fix perf regression: remove rx_cqes, tx_cqes counters (git- fixes). * net: mana: Handle vport sharing between devices (bsc#1210741 jsc#PED-4022). * net: mana: Move header files to a common location (bsc#1210741 jsc#PED-4022). * net: mana: Record port number in netdev (bsc#1210741 jsc#PED-4022). * net: mana: Record the physical address for doorbell page region (bsc#1210741 jsc#PED-4022). * net: mana: Refactor RX buffer allocation code to prepare for various MTU (bsc#1210551). * net: mana: Rename mana_refill_rxoob and remove some empty lines (bsc#1210551). * net: mana: Set the DMA device max segment size (bsc#1210741 jsc#PED-4022). * net: mana: Use napi_build_skb in RX path (bsc#1210551). * net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() (git- fixes). * net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes). * net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure (bsc#1211564). * net: natsemi: fix hw address initialization for jazz and xtensa (git-fixes). * net: of: fix stub of_net helpers for CONFIG_NET=n (git-fixes). * net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git- fixes). * net: phy: Ensure state transitions are processed from phy_stop() (git- fixes). * net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices (git- fixes). * net: phy: dp83867: add w/a for packet errors seen with short cables (git- fixes). * net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes). * net: phy: meson-gxl: Add generic dummy stubs for MMD register access (git- fixes). * net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git- fixes). * net: phy: mxl-gpy: add MDINT workaround (git-fixes). * net: phy: nxp-c45-tja11xx: add remove callback (git-fixes). * net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes). * net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git- fixes). * net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes). * net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes). * net: qrtr: correct types of trace event parameters (git-fixes). * net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes). * net: tun: avoid disabling NAPI twice (git-fixes). * net: tun: fix bugs for oversize packet when napi frags enabled (git-fixes). * net: tun: stop NAPI when detaching queues (git-fixes). * net: tun: unlink NAPI from device on destruction (git-fixes). * net: usb: asix: remove redundant assignment to variable reg (git-fixes). * net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git- fixes). * net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git- fixes). * net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes). * net: usb: lan78xx: Limit packet length to skb->len (git-fixes). * net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 (git-fixes). * net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes). * net: usb: smsc75xx: Limit packet length to skb->len (git-fixes). * net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes). * net: usb: smsc95xx: Limit packet length to skb->len (git-fixes). * net: usb: use eth_hw_addr_set() (git-fixes). * net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes). * netrom: Fix use-after-free caused by accept on already connected socket (git-fixes). * netrom: Fix use-after-free of a listening socket (git-fixes). * nfc: change order inside nfc_se_io error path (git-fixes). * nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties (git-fixes). * nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes). * nfc: pn533: initialize struct pn533_out_arg properly (git-fixes). * nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes). * nfp: flower-ct: fix error return code in nfp_fl_ct_add_offload() (git- fixes). * nfp: flower: fix ingress police using matchall filter (git-fixes). * nfs4: Fix kmemleak when allocate slot failed (git-fixes). * nfs4trace: fix state manager flag printing (git-fixes). * nfs: nfs4clinet: check the return value of kstrdup() (git-fixes). * nfsd: Fix a memory leak in an error handling path (git-fixes). * nfsd: call op_release, even when op_func returns an error (git-fixes). * nfsd: do not call nfsd_file_put from client states seqfile display (git- fixes). * nfsd: fix handling of readdir in v4root vs. mount upcall timeout (git- fixes). * nfsd: fix race to check ls_layouts (git-fixes). * nfsd: shut down the NFSv4 state objects before the filecache (git-fixes). * nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git- fixes). * nfsd: zero out pointers after putting nfsd_files on COPY setup error (git- fixes). * nilfs2: do not write dirty data after degenerating to read-only (git-fixes). * nilfs2: fix general protection fault in nilfs_btree_insert() (git-fixes). * nilfs2: fix infinite loop in nilfs_mdt_get_block() (git-fixes). * nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes). * nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes). * nilfs2: fix sysfs interface lifetime (git-fixes). * nilfs2: fix underflow in second superblock position calculations (git- fixes). * nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() (git- fixes). * nilfs2: initialize unused bytes in segment summary blocks (git-fixes). * null_blk: fix ida error handling in null_add_dev() (git-fixes). * nvdimm: disable namespace on error (bsc#1166486). * nvdimm: disable namespace on error (bsc#1166486). * nvme initialize core quirks before calling nvme_init_subsystem (git-fixes). * nvme-auth: check chap ctrl_key once constructed (bsc#1202633). * nvme-auth: check chap ctrl_key once constructed (bsc#1202633). * nvme-auth: clear sensitive info right after authentication completes (bsc#1202633). * nvme-auth: clear sensitive info right after authentication completes (bsc#1202633). * nvme-auth: convert dhchap_auth_list to an array (bsc#1202633). * nvme-auth: convert dhchap_auth_list to an array (bsc#1202633). * nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633). * nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633). * nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633). * nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633). * nvme-auth: do not override ctrl keys before validation (bsc#1202633). * nvme-auth: do not override ctrl keys before validation (bsc#1202633). * nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633). * nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633). * nvme-auth: do not use NVMe status codes (bsc#1202633). * nvme-auth: do not use NVMe status codes (bsc#1202633). * nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633). * nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633). * nvme-auth: fix smatch warning complaints (bsc#1202633). * nvme-auth: fix smatch warning complaints (bsc#1202633). * nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633). * nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633). * nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633). * nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633). * nvme-auth: mark nvme_auth_wq static (bsc#1202633). * nvme-auth: mark nvme_auth_wq static (bsc#1202633). * nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633). * nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633). * nvme-auth: remove redundant auth_work flush (bsc#1202633). * nvme-auth: remove redundant auth_work flush (bsc#1202633). * nvme-auth: remove redundant buffer deallocations (bsc#1202633). * nvme-auth: remove redundant buffer deallocations (bsc#1202633). * nvme-auth: remove redundant deallocations (bsc#1202633). * nvme-auth: remove redundant deallocations (bsc#1202633). * nvme-auth: remove redundant if statement (bsc#1202633). * nvme-auth: remove redundant if statement (bsc#1202633). * nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633). * nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633). * nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633). * nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633). * nvme-auth: rename authentication work elements (bsc#1202633). * nvme-auth: rename authentication work elements (bsc#1202633). * nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes). * nvme-auth: use workqueue dedicated to authentication (bsc#1202633). * nvme-auth: use workqueue dedicated to authentication (bsc#1202633). * nvme-fabrics: show well known discovery name (bsc#1200054). * nvme-fabrics: show well known discovery name (bsc#1200054). * nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association (git- fixes). * nvme-fcloop: fix "inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage" (git- fixes). * nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes). * nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes). * nvme-multipath: fix hang when disk goes live over reconnect (git-fixes). * nvme-multipath: fix possible hang in live ns resize with ANA access (git- fixes). * nvme-pci: add bogus ID quirk for ADATA SX6000PNP (bsc#1207827). * nvme-pci: add quirks for Samsung X5 SSDs (git-fixes). * nvme-pci: add the IGNORE_DEV_SUBNQN quirk for Intel P4500/P4600 SSDs (git- fixes). * nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs (git- fixes). * nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs (git- fixes). * nvme-pci: clear the prp2 field when not used (git-fixes). * nvme-pci: disable write zeroes on various Kingston SSD (git-fixes). * nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git- fixes). * nvme-pci: fix doorbell buffer value endianness (git-fixes). * nvme-pci: fix mempool alloc size (git-fixes). * nvme-pci: fix page size checks (git-fixes). * nvme-pci: fix timeout request state check (git-fixes). * nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN (git-fixes). * nvme-pci: set min_align_mask before calculating max_hw_sectors (git-fixes). * nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes). * nvme-tcp: always fail a request when sending it failed (bsc#1208902). * nvme-tcp: fix a possible UAF when failing to allocate an io queue (git- fixes). * nvme-tcp: fix bogus request completion when failing to send AER (git-fixes). * nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes). * nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes). * nvme-tcp: fix regression that causes sporadic requests to time out (git- fixes). * nvme-tcp: lockdep: annotate in-kernel sockets (git-fixes). * nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git- fixes). * nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH (git-fixes). * nvme: add device name to warning in uuid_show() (git-fixes). * nvme: also return I/O command effects from nvme_command_effects (git-fixes). * nvme: bring back auto-removal of deleted namespaces during sequential scan (git-fixes). * nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes). * nvme: check for duplicate identifiers earlier (git-fixes). * nvme: cleanup __nvme_check_ids (git-fixes). * nvme: copy firmware_rev on each init (git-fixes). * nvme: copy firmware_rev on each init (git-fixes). * nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes). * nvme: fix async event trace event (git-fixes). * nvme: fix discard support without oncs (git-fixes). * nvme: fix discard support without oncs (git-fixes). * nvme: fix handling single range discard request (git-fixes). * nvme: fix interpretation of DMRSL (git-fixes). * nvme: fix multipath crash caused by flush request when blktrace is enabled (git-fixes). * nvme: fix passthrough csi check (git-fixes). * nvme: fix per-namespace chardev deletion (git-fixes). * nvme: fix the CRIMS and CRWMS definitions to match the spec (git-fixes). * nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes). * nvme: fix the name of Zone Append for verbose logging (git-fixes). * nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes). * nvme: generalize the nvme_multi_css check in nvme_scan_ns (git-fixes). * nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes). * nvme: move nvme_multi_css into nvme.h (git-fixes). * nvme: move the Samsung X5 quirk entry to the core quirks (git-fixes). * nvme: rename nvme_validate_or_alloc_ns to nvme_scan_ns (git-fixes). * nvme: return err on nvme_init_non_mdts_limits fail (git-fixes). * nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693). * nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693). * nvme: set dma alignment to dword (git-fixes). * nvme: set non-mdts limits in nvme_scan_work (git-fixes). * nvme: use command_id instead of req->tag in trace_nvme_complete_rq() (git- fixes). * nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes). * nvmet-tcp: add bounds check on Transfer Tag (git-fixes). * nvmet-tcp: fix incomplete data digest send (git-fixes). * nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (git-fixes). * nvmet-tcp: fix regression in data_digest calculation (git-fixes). * nvmet-tcp: fix unhandled tcp states in nvmet_tcp_state_change() (git-fixes). * nvmet: add helpers to set the result field for connect commands (git-fixes). * nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes). * nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes). * nvmet: fix I/O Command Set specific Identify Controller (git-fixes). * nvmet: fix Identify Active Namespace ID list handling (git-fixes). * nvmet: fix Identify Controller handling (git-fixes). * nvmet: fix Identify Namespace handling (git-fixes). * nvmet: fix a memory leak (git-fixes). * nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes). * nvmet: fix a use-after-free (git-fixes). * nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git- fixes). * nvmet: fix mar and mor off-by-one errors (git-fixes). * nvmet: fix memory leak in nvmet_subsys_attr_model_store_locked (git-fixes). * nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes). * nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes). * nvmet: force reconnect when number of queue changes (git-fixes). * nvmet: looks at the passthrough controller when initializing CAP (git- fixes). * nvmet: move the call to nvmet_ns_changed out of nvmet_ns_revalidate (git- fixes). * nvmet: only allocate a single slab for bvecs (git-fixes). * nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes). * nvmet: use NVME_CMD_EFFECTS_CSUPP instead of open coding it (git-fixes). * objtool: Add a missing comma to avoid string concatenation (bsc#1207328). * ocfs2: Fix data corruption after failed write (bsc#1208542). * ocfs2: clear dinode links count in case of error (bsc#1207650). * ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649). * ocfs2: fix crash when mount with quota enabled (bsc#1207640). * ocfs2: fix defrag path triggering jbd2 ASSERT (bsc#1199304). * ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652). * ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651). * ocfs2: fix non-auto defrag path not working issue (bsc#1199304). * ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770). * ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768). * ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771). * octeon: constify netdev->dev_addr (git-fixes). * of/address: Return an error when no valid dma-ranges are found (git-fixes). * pNFS/filelayout: Fix coalescing test for single DS (git-fixes). * panic: Consolidate open-coded panic_on_warn checks (bsc#1207328). * panic: Introduce warn_limit (bsc#1207328). * panic: unset panic_on_warn inside panic() (bsc#1207328). * perf/amd/ibs: Use interrupt regs ip for stack unwinding (git fixes). * perf/core: Call LSM hook after copying perf_event_attr (git fixes). * perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (git fixes). * perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes). * perf/core: Fix the same task check in perf_event_set_output (git fixes). * perf/core: Inherit event_caps (git fixes). * perf/x86/amd: fix potential integer overflow on shift of a int (git fixes). * perf/x86/intel/ds: Fix precise store latency handling (git fixes). * perf/x86/intel/lbr: Use setup_clear_cpu_cap() instead of clear_cpu_cap() (git fixes). * perf/x86/intel/pt: Fix sampling using single range output (git fixes). * perf/x86/intel/pt: Relax address filter validation (git fixes). * perf/x86/intel/uncore: Add Emerald Rapids (git fixes). * perf/x86/intel/uncore: Clear attr_update properly (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Disable I/O stacks to PMU mapping on ICX-D (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Enable UPI topology discovery for Icelake Server (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Enable UPI topology discovery for Sapphire Rapids (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Enable UPI topology discovery for Skylake Server (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (git fixes). * perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (git fixes). * perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() (git fixes). * perf/x86/intel/uncore: Fix reference count leak in sad_cfg_iio_topology() (git fixes). * perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (git fixes). * perf/x86/intel/uncore: Generalize IIO topology support (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Generalize get_topology() for SKX PMUs (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Get UPI NodeID and GroupID (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Introduce UPI topology type (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Make set_mapping() procedure void (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel/uncore: Update sysfs-devices-mapping file (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/intel: Add Cooper Lake stepping to isolation_ucodes (git fixes). * perf/x86/intel: Add Emerald Rapids (git fixes). * perf/x86/intel: Do not extend the pseudo-encoding to GP counters (git fixes). * perf/x86/intel: Fix PEBS data source encoding for ADL (git fixes). * perf/x86/intel: Fix PEBS memory access info encoding for ADL (git fixes). * perf/x86/intel: Fix event constraints for ICL (git fixes). * perf/x86/intel: Fix pebs event constraints for ADL (git fixes). * perf/x86/intel: Fix pebs event constraints for ICL (git fixes). * perf/x86/intel: Fix pebs event constraints for SPR (git fixes). * perf/x86/lbr: Enable the branch type for the Arch LBR by default (git fixes). * perf/x86/msr: Add Emerald Rapids (git fixes). * perf/x86/rapl: Add support for Intel AlderLake-N (git fixes). * perf/x86/rapl: Add support for Intel Emerald Rapids (PED-4394). * perf/x86/rapl: Treat Tigerlake like Icelake (git fixes). * perf/x86/rapl: Use standard Energy Unit for SPR Dram RAPL domain (git fixes). * perf/x86/rapl: fix AMD event handling (git fixes). * perf/x86/uncore: Add Raptor Lake uncore support (git fixes). * perf/x86/uncore: Add a quirk for UPI on SPR (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/uncore: Add new Alder Lake and Raptor Lake support (git fixes). * perf/x86/uncore: Add new Raptor Lake S support (git fixes). * perf/x86/uncore: Clean up uncore_pci_ids (git fixes). * perf/x86/uncore: Do not WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/uncore: Factor out uncore_device_to_die() (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/uncore: Fix potential NULL pointer in uncore_get_alias_name (bsc#1206824, bsc#1206493, bsc#1206492). * perf/x86/uncore: Ignore broken units in discovery table (bsc#1206824, bsc#1206493, bsc#1206492). * perf: Always wake the parent event (git fixes). * perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes). * perf: Fix possible memleak in pmu_dev_alloc() (git fixes). * perf: fix perf_event_context->time (git fixes). * phy: rockchip-typec: Fix unsigned comparison with less than zero (git- fixes). * phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes). * phy: st: miphy28lp: use _poll_timeout functions for waits (git-fixes). * phy: tegra: xusb: Add missing tegra_xusb_port_unregister for usb2_port and ulpi_port (git-fixes). * pinctrl: amd: Disable and mask interrupts on resume (git-fixes). * pinctrl: aspeed: Fix confusing types in return value (git-fixes). * pinctrl: at91-pio4: fix domain name assignment (git-fixes). * pinctrl: at91: use devm_kasprintf() to avoid potential leaks (git-fixes). * pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git- fixes). * pinctrl: mediatek: Fix the drive register definition of some Pins (git- fixes). * pinctrl: mediatek: Initialize variable *buf to zero (git-fixes). * pinctrl: mediatek: fix coding style (git-fixes). * pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes). * pinctrl: ocelot: Fix alt mode for ocelot (git-fixes). * pinctrl: qcom: lpass-lpi: set output value before enabling output (git- fixes). * pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git- fixes). * pinctrl: renesas: r8a779a0: Remove incorrect AVB[01] pinmux configuration (git-fixes). * pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git- fixes). * pinctrl: single: fix potential NULL dereference (git-fixes). * pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes). * platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git- fixes). * platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes). * platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes). * platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644). * platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644). * platform/x86/amd/pmc: Add new platform support (bsc#1210644). * platform/x86/amd/pmc: Add new platform support (bsc#1210644). * platform/x86/amd: Fix refcount leak in amd_pmc_probe (bsc#1210644). * platform/x86/amd: pmc: Add a module parameter to disable workarounds (bsc#1210644). * platform/x86/amd: pmc: Add a workaround for an s0i3 issue on Cezanne (bsc#1210644). * platform/x86/amd: pmc: Add defines for STB events (bsc#1210644). * platform/x86/amd: pmc: Add line break for readability (bsc#1210644). * platform/x86/amd: pmc: Add new ACPI ID AMDI0009 (bsc#1210644). * platform/x86/amd: pmc: Add num_samples message id support to STB (bsc#1210644). * platform/x86/amd: pmc: Add sysfs files for SMU (bsc#1210644). * platform/x86/amd: pmc: Always write to the STB (bsc#1210644). * platform/x86/amd: pmc: Disable IRQ1 wakeup for RN/CZN (bsc#1210644). * platform/x86/amd: pmc: Do not dump data after resume from s0i3 on picasso (git-fixes). * platform/x86/amd: pmc: Do not try to read SMU version on Picasso (git- fixes). * platform/x86/amd: pmc: Fix build without debugfs (bsc#1210644). * platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2() (bsc#1210644). * platform/x86/amd: pmc: Hide SMU version and program attributes for Picasso (git-fixes). * platform/x86/amd: pmc: Move idlemask check into `amd_pmc_idlemask_read` (git-fixes). * platform/x86/amd: pmc: Move out of BIOS SMN pair for STB init (git-fixes). * platform/x86/amd: pmc: Read SMU version during suspend on Cezanne systems (bsc#1210644). * platform/x86/amd: pmc: Remove more CONFIG_DEBUG_FS checks (bsc#1210644). * platform/x86/amd: pmc: Utilize SMN index 0 for driver probe (git-fixes). * platform/x86/amd: pmc: Write dummy postcode into the STB DRAM (bsc#1210644). * platform/x86/amd: pmc: add CONFIG_SERIO dependency (git-fixes). * platform/x86/amd: pmc: differentiate STB/SMU messaging prints (bsc#1210644). * platform/x86/amd: pmc: remove CONFIG_DEBUG_FS checks (bsc#1210644). * platform/x86/amd: pmc: remove CONFIG_SUSPEND checks (bsc#1210644). * platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes). * platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420). * platform/x86: ISST: Remove 8 socket limit (bsc#1211836). * platform/x86: Move AMD platform drivers to separate directory (bsc#1210644). * platform/x86: amd-pmc: Add a message to print resume time info (bsc#1210644). * platform/x86: amd-pmc: Add special handling for timer based S0i3 wakeup (bsc#1210644). * platform/x86: amd-pmc: Add support for AMD Smart Trace Buffer (bsc#1210644). * platform/x86: amd-pmc: Add support for AMD Spill to DRAM STB feature (bsc#1210644). * platform/x86: amd-pmc: Avoid reading SMU version at probe time (bsc#1210644). * platform/x86: amd-pmc: Check s0i3 cycle status (bsc#1210644). * platform/x86: amd-pmc: Correct usage of SMU version (git-fixes). * platform/x86: amd-pmc: Downgrade dev_info message to dev_dbg (bsc#1210644). * platform/x86: amd-pmc: Drop CPU QoS workaround (bsc#1210644). * platform/x86: amd-pmc: Drop check for valid alarm time (bsc#1210644). * platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes). * platform/x86: amd-pmc: Fix build error unused-function (bsc#1210644). * platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git- fixes). * platform/x86: amd-pmc: Fix compilation without CONFIG_SUSPEND (bsc#1210644). * platform/x86: amd-pmc: Make amd_pmc_stb_debugfs_fops static (bsc#1210644). * platform/x86: amd-pmc: Move FCH init to first use (bsc#1210644). * platform/x86: amd-pmc: Move SMU logging setup out of init (bsc#1210644). * platform/x86: amd-pmc: Move to later in the suspend process (bsc#1210644). * platform/x86: amd-pmc: Only report STB errors when STB enabled (bsc#1210644). * platform/x86: amd-pmc: Output error codes in messages (bsc#1210644). * platform/x86: amd-pmc: Send command to dump data after clearing OS_HINT (bsc#1210644). * platform/x86: amd-pmc: Set QOS during suspend on CZN w/ timer wakeup (bsc#1210644). * platform/x86: amd-pmc: Shuffle location of amd_pmc_get_smu_version() (bsc#1210644). * platform/x86: amd-pmc: Simplify error handling and store the pci_dev in amd_pmc_dev structure (bsc#1210644). * platform/x86: amd-pmc: Validate entry into the deepest state on resume (bsc#1210644). * platform/x86: amd-pmc: adjust arguments for `amd_pmc_send_cmd` (bsc#1210644). * platform/x86: amd-pmc: fix compilation without CONFIG_RTC_SYSTOHC_DEVICE (bsc#1210644). * platform/x86: amd-pmc: uninitialized variable in amd_pmc_s2d_init() (bsc#1210644). * platform/x86: amd: pmc: Remove __maybe_unused from amd_pmc_suspend_handler() (bsc#1210644). * platform/x86: amd: pmc: provide user message where s0ix is not supported (bsc#1210644). * platform/x86: asus-nb-wmi: Add alternate mapping for KEY_SCREENLOCK (git- fixes). * platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git- fixes). * platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes). * platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes). * platform/x86: hp-wmi: Support touchpad on/off (git-fixes). * platform/x86: intel-uncore-freq: add Emerald Rapids support (PED-4390). * platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes). * platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes). * platform/x86: think-lmi: Certificate authentication support (bsc#1210050). * platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes). * platform/x86: think-lmi: Fix memory leak when showing current settings (git- fixes). * platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes). * platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050). * platform/x86: think-lmi: Opcode support (bsc#1210050). * platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050). * platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050). * platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050). * platform/x86: think-lmi: add debug_cmd (bsc#1210050). * platform/x86: think-lmi: add missing type attribute (git-fixes). * platform/x86: think-lmi: certificate support clean ups (bsc#1210050). * platform/x86: think-lmi: only display possible_values if available (git- fixes). * platform/x86: think-lmi: use correct possible_values delimiters (git-fixes). * platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050). * platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050). * platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050). * platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050). * platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050). * platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050). * platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050). * platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050). * platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050). * platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050). * platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050). * platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050). * platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050). * platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050). * platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050). * platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050). * platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050). * platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050). * platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050). * platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050). * platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050). * platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050). * platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050). * platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050). * platform/x86: thinkpad_acpi: Fix platform profiles on T490 (git-fixes). * platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050). * platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050). * platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050). * platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050). * platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050). * platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050). * platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050). * platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050). * platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050). * platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050). * platform/x86: thinkpad_acpi: Remove "goto err_exit" from hotkey_init() (bsc#1210050). * platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050). * platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050). * platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050). * platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050). * platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050). * platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050). * platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050). * platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050). * platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050). * platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050). * platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes). * platform/x86: touchscreen_dmi: Add info for the CSL Panther Tab HD (git- fixes). * platform/x86: touchscreen_dmi: Add info for the Dexp Ursus KX210i (git- fixes). * platform/x86: touchscreen_dmi: Add upside-down quirk for GDIX1002 ts on the Juno Tablet (git-fixes). * platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git- fixes). * power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes). * power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() (git-fixes). * power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize (git-fixes). * power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes (git-fixes). * power: supply: bq27xxx: Fix I2C IRQ race on remove (git-fixes). * power: supply: bq27xxx: Fix bq27xxx_battery_update() race condition (git- fixes). * power: supply: bq27xxx: Fix poll_interval handling and races on remove (git- fixes). * power: supply: bq27xxx: Move bq27xxx_battery_update() down (git-fixes). * power: supply: bq27xxx: expose battery data when CI=1 (git-fixes). * power: supply: cros_usbpd: reclassify "default case!" as debug (git-fixes). * power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes). * power: supply: generic-adc-battery: fix unit scaling (git-fixes). * power: supply: leds: Fix blink to LED on transition (git-fixes). * power: supply: sbs-charger: Fix INHIBITED bit for Status reg (git-fixes). * powercap: fix possible name leak in powercap_register_zone() (git-fixes). * powercap: intel_rapl: add support for Emerald Rapids (PED-4398). * powerpc/64: Always build with 128-bit long double (bsc#1194869). * powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869). * powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869). * powerpc/64s/radix: Fix RWX mapping with relocated kernel (bsc#1194869). * powerpc/64s/radix: Fix crash with unaligned relocated kernel (bsc#1194869). * powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729). * powerpc/64s: Fix local irq disable when PMIs are disabled (bsc#1195655 ltc#1195655 git-fixes). * powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662). * powerpc/btext: add missing of_node_put (bsc#1065729). * powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612). * powerpc/hv-gpci: Fix hv_gpci event list (bsc#1207935). * powerpc/hv-gpci: Fix hv_gpci event list (git fixes). * powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869). * powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869). * powerpc/iommu: DMA address offset is incorrectly calculated with 2MB TCEs (jsc#SLE-19556 git-fixes). * powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869). * powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869). * powerpc/kexec_file: Count hot-pluggable memory in FDT estimate (bsc#1194869). * powerpc/kexec_file: Fix division by zero in extra size estimation (bsc#1194869). * powerpc/kexec_file: fix implicit decl error (bsc#1194869). * powerpc/mm: Fix false detection of read faults (bsc#1208864). * powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes). * powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes). * powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729). * powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869). * powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes). * powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729). * powerpc/pseries/vas: Ignore VAS update for DLPAR if copy/paste is not enabled (bsc#1210216 ltc#202189). * powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes). * powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729). * powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729). * powerpc/vmlinux.lds: Add an explicit symbol for the SRWX boundary (bsc#1194869). * powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869). * powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869). * powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869). * powerpc/vmlinux.lds: Ensure STRICT_ALIGN_SIZE is at least page aligned (bsc#1194869). * powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869). * powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729). * powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662). * powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869). * powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662). * powerpc: declare unmodified attribute_group usages const (bsc#1207935). * powerpc: declare unmodified attribute_group usages const (git-fixes). * powerpc: move __end_rodata to cover arch read-only sections (bsc#1194869). * printf: fix errname.c list (git-fixes). * prlimit: do_prlimit needs to have a speculation check (bsc#1209256). * pstore: Revert pmsg_lock back to a normal mutex (git-fixes). * purgatory: fix disabling debug info (git-fixes). * pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes). * pwm: meson: Fix axg ao mux parents (git-fixes). * pwm: meson: Fix g12a ao clk81 name (git-fixes). * pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes). * pwm: stm32-lp: fix the check on arr and cmp registers update (git-fixes). * qed/qed_dev: guard against a possible division by zero (jsc#SLE-19001). * qed/qed_mng_tlv: correctly zero out ->min instead of ->hour (jsc#SLE-19001). * qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (jsc#SLE-19001). * qed: allow sleep in qed_mcp_trace_dump() (jsc#SLE-19001). * qede: avoid uninitialized entries in coal_entry array (bsc#1205846). * qede: execute xdp_do_flush() before napi_complete_done() (jsc#SLE-19001). * qede: fix interrupt coalescing configuration (bsc#1205846). * quota: Check next/prev free block number after reading from quota file (bsc#1206640). * quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639). * r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes). * r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes). * r8152: fix flow control issue of RTL8156A (git-fixes). * r8152: fix the poor throughput for 2.5G devices (git-fixes). * r8152: move setting r8153b_rx_agg_chg_indicate() (git-fixes). * r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes). * r8169: move rtl_wol_enable_rx() and rtl_prepare_power_down() (git-fixes). * rcu: Fix rcu_torture_read ftrace event (git-fixes). * rcu: Tighten rcu_advance_cbs_nowake() checks (bsc#1209159). * ref_tracker: use __GFP_NOFAIL more carefully (git-fixes). * regmap: Account for register length when chunking (git-fixes). * regmap: cache: Return error in cache sync operations for REGCACHE_NONE (git- fixes). * regulator: Flag uncontrollable regulators as always_on (git-fixes). * regulator: Handle deferred clk (git-fixes). * regulator: core: Avoid lockdep reports when resolving supplies (git-fixes). * regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes). * regulator: core: Fix off-on-delay-us for always-on/boot-on regulators (git- fixes). * regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes). * regulator: core: Use ktime_get_boottime() to determine how long a regulator was off (git-fixes). * regulator: fan53555: Explicitly include bits header (git-fixes). * regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes). * regulator: max77802: Bounds check regulator id against opmode (git-fixes). * regulator: mt6359: add read check for PMIC MT6359 (git-fixes). * regulator: pca9450: Fix BUCK2 enable_mask (git-fixes). * regulator: s5m8767: Bounds check id indexing into arrays (git-fixes). * regulator: stm32-pwr: fix of_iomap leak (git-fixes). * reiserfs: Add missing calls to reiserfs_security_free() (git-fixes). * reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes). * remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes). * remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes). * remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes). * remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes). * remoteproc: st: Call of_node_put() on iteration error (git-fixes). * remoteproc: stm32: Call of_node_put() on iteration error (git-fixes). * remoteproc: stm32_rproc: Add mutex protection for workqueue (git-fixes). * remove "PCI: hv: Use async probing to reduce boot time" (bsc#1207185). * rethook: Reject getting a rethook if RCU is not watching (git-fixes). * rethook: fix a potential memleak in rethook_alloc() (git-fixes). * rethook: use preempt_{disable, enable}_notrace in rethook_trampoline_handler (git-fixes). * revert "squashfs: harden sanity check in squashfs_read_xattr_id_table" (git- fixes). * ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes). * ring-buffer: Fix kernel-doc (git-fixes). * ring-buffer: Fix race while reader and writer are on the same page (git- fixes). * ring-buffer: Handle race between rb_move_tail and rb_check_pages (git- fixes). * ring-buffer: Sync IRQ works before buffer destruction (git-fixes). * ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes). * rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB * rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm * rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435) * rpm/kernel-obs-build.spec.in: Remove SLE11 cruft * rpm/kernel-source.spec.in: Add patches.drm for moved DRM patches * rtc: allow rtc_read_alarm without read_alarm callback (git-fixes). * rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git- fixes). * rtc: omap: include header for omap_rtc_power_off_program prototype (git- fixes). * rtc: pm8xxx: fix set-alarm race (git-fixes). * rtc: sun6i: Always export the internal oscillator (git-fixes). * rtmutex: Ensure that the top waiter is always woken up (git-fixes). * s390/ap: fix crash on older machines based on QCI info missing (git-fixes bsc#1210947). * s390/boot: simplify and fix kernel memory layout setup (bsc#1209600). * s390/ctcm: Fix return type of ctc{mp,}m_tx() (git-fixes bsc#1211686). * s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes). * s390/dasd: fix hanging blockdevice after request requeue (git-fixes bsc#1211687). * s390/dasd: fix no record found for raw_track_access (bsc#1207574). * s390/extmem: return correct segment type in __segment_load() (bsc#1210450 git-fixes). * s390/kprobes: fix current_kprobe never cleared after kprobes reenter (git- fixes bsc#1211688). * s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler (git-fixes bsc#1211689). * s390/lcs: Fix return type of lcs_start_xmit() (git-fixes bsc#1211690). * s390/mem_detect: fix detect_memory() error handling (git-fixes bsc#1211691). * s390/netiucv: Fix return type of netiucv_tx() (git-fixes bsc#1211692). * s390/qdio: fix do_sqbs() inline assembly constraint (git-fixes bsc#1211693). * s390/qeth: fix use-after-free in hsci (bsc#1210449 git-fixes). * s390/uaccess: add missing earlyclobber annotations to __clear_user() (bsc#1209856 git-fixes). * s390/vdso: remove -nostdlib compiler flag (git-fixes bsc#1211714). * s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes). * s390x: Fixed hard lockups while running stress-ng and LPAR hangs (bsc#1195655 ltc#195733). * sched, cpuset: Fix dl_cpu_busy() panic due to empty (git-fixes) * sched/core: Avoid obvious double update_rq_clock warning (git-fixes) * sched/core: Fix arch_scale_freq_tick() on tickless systems (git-fixes) * sched/core: Introduce sched_asym_cpucap_active() (git-fixes) * sched/deadline: Merge dl_task_can_attach() and dl_cpu_busy() (git-fixes) * sched/fair: Fix imbalance overflow (bsc#1155798). * sched/fair: Limit sched slice duration (bsc#1189999). * sched/fair: Move calculate of avg_load to a better location (bsc#1155798). * sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325). * sched/fair: sanitize vruntime of entity being placed (bsc#1203325). * sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999). * sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799). * sched/tracing: Report TASK_RTLOCK_WAIT tasks as (git-fixes) * sched/uclamp: Make asym_fits_capacity() use util_fits_cpu() (git-fixes) * sched: Avoid double preemption in __cond_resched_ _lock_ () (git-fixes) * sched_getaffinity: do not assume 'cpumask_size()' is fully initialized (bsc#1155798). * scsi: Revert "scsi: core: map PQ=1, PDT=other values to SCSI_SCAN_TARGET_PRESENT" (git-fixes). * scsi: aacraid: Allocate cmd_priv with scsicmd (git-fixes). * scsi: aic94xx: Add missing check for dma_map_single() (git-fixes). * scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039) * scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes). * scsi: core: Fix a procfs host directory removal regression (git-fixes). * scsi: core: Fix a source code comment (git-fixes). * scsi: core: Improve scsi_vpd_inquiry() checks (git-fixes). * scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git- fixes). * scsi: hisi_sas: Check devm_add_action() return value (git-fixes). * scsi: hisi_sas: Handle NCQ error when IPTT is valid (git-fixes). * scsi: hisi_sas: Revert change to limit max hw sectors for v3 HW (bsc#1210230). * scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes). * scsi: hpsa: Fix allocation size for scsi_host_alloc() (git-fixes). * scsi: ipr: Work around fortify-string warning (git-fixes). * scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git- fixes). * scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes). * scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes). * scsi: kABI workaround for fc_host_fpin_rcv (git-fixes). * scsi: kABI workaround for fc_host_fpin_rcv (git-fixes). * scsi: libsas: Add sas_ata_device_link_abort() (git-fixes). * scsi: libsas: Grab the ATA port lock in sas_ata_device_link_abort() (git- fixes). * scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes). * scsi: lpfc: Add new RCQE status for handling DMA failures (bsc#1211847). * scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes). * scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes). * scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607). * scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607). * scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943). * scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943). * scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943). * scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943). * scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943). * scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943). * scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943). * scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943). * scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607). * scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607). * scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (bsc#1211847). * scsi: lpfc: Fix double word in comments (bsc#1210943). * scsi: lpfc: Fix double word in comments (bsc#1210943). * scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943). * scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943). * scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943). * scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943). * scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607). * scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607). * scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607). * scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607). * scsi: lpfc: Fix verbose logging for SCSI commands issued to SES devices (bsc#1211847). * scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607). * scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607). * scsi: lpfc: Match lock ordering of lpfc_cmd->buf_lock and hbalock for abort paths (bsc#1211847). * scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943). * scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943). * scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943). * scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943). * scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607). * scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607). * scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534). * scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534). * scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607). * scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607). * scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943). * scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943). * scsi: lpfc: Replace blk_irq_poll intr handler with threaded IRQ (bsc#1211847). * scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607). * scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607). * scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607). * scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607). * scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943). * scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943). * scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607). * scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607). * scsi: lpfc: Silence an incorrect device output (bsc#1210943). * scsi: lpfc: Silence an incorrect device output (bsc#1210943). * scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943). * scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943). * scsi: lpfc: Update congestion warning notification period (bsc#1211847). * scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607). * scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607). * scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943). * scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943). * scsi: lpfc: Update lpfc version to 14.2.0.12 (bsc#1211847). * scsi: megaraid: Fix mega_cmd_done() CMDID_INT_CMDS (git-fixes). * scsi: megaraid_sas: Fix crash after a double completion (git-fixes). * scsi: megaraid_sas: Fix fw_crash_buffer_show() (git-fixes). * scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes). * scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes). * scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() (git-fixes). * scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization (git-fixes). * scsi: mpi3mr: Fix throttle_groups memory leak (git-fixes). * scsi: mpi3mr: Remove unnecessary memcpy() to alltgt_info->dmi (git-fixes). * scsi: mpi3mr: Suppress command reply debug prints (bsc#1211820). * scsi: mpt3sas: Do not print sense pool info twice (git-fixes). * scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git- fixes). * scsi: mpt3sas: Fix a memory leak (git-fixes). * scsi: mpt3sas: Remove scsi_dma_map() error messages (git-fixes). * scsi: qedi: Fix use after free bug in qedi_remove() (git-fixes). * scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103). * scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103). * scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570). * scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570). * scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960). * scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570). * scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570). * scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570). * scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570). * scsi: qla2xxx: Fix erroneous link down (bsc#1208570). * scsi: qla2xxx: Fix erroneous link down (bsc#1208570). * scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570). * scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570). * scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570). * scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570). * scsi: qla2xxx: Fix hang in task management (bsc#1211960). * scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570). * scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570). * scsi: qla2xxx: Fix mem access after free (bsc#1211960). * scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes). * scsi: qla2xxx: Fix printk() format string (bsc#1208570). * scsi: qla2xxx: Fix printk() format string (bsc#1208570). * scsi: qla2xxx: Fix stalled login (bsc#1208570). * scsi: qla2xxx: Fix stalled login (bsc#1208570). * scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960). * scsi: qla2xxx: Fix task management cmd failure (bsc#1211960). * scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570). * scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570). * scsi: qla2xxx: Multi-que support for TMF (bsc#1211960). * scsi: qla2xxx: Perform lockless command completion in abort path (git- fixes). * scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960). * scsi: qla2xxx: Relocate/rename vp map (bsc#1208570). * scsi: qla2xxx: Relocate/rename vp map (bsc#1208570). * scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570). * scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570). * scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570). * scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570). * scsi: qla2xxx: Remove dead code (bsc#1208570). * scsi: qla2xxx: Remove dead code (bsc#1208570). * scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960). * scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570). * scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570). * scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570). * scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570). * scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570). * scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570). * scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960). * scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570). * scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570). * scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570). * scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570). * scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556). * scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570). * scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570). * scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570). * scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570). * scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960). * scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570). * scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570). * scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960). * scsi: qla2xxx: edif: Fix clang warning (bsc#1208570). * scsi: qla2xxx: edif: Fix clang warning (bsc#1208570). * scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570). * scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570). * scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570). * scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570). * scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570). * scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570). * scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() (git-fixes). * scsi: scsi_ioctl: Validate command size (git-fixes). * scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943). * scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943). * scsi: sd: Fix wrong zone_write_granularity value during revalidate (git- fixes). * scsi: sd: Fix wrong zone_write_granularity value during revalidate (git- fixes). * scsi: sd: Revert "Rework asynchronous resume support" (bsc#1209092). * scsi: ses: Do not attach if enclosure has no components (git-fixes). * scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes). * scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes). * scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git- fixes). * scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes). * scsi: ses: Handle enclosure with just a primary component gracefully (git- fixes). * scsi: smartpqi: Add controller cache flush during rmmod (bsc#1207315). * scsi: smartpqi: Add new controller PCI IDs (bsc#1207315). * scsi: smartpqi: Change sysfs raid_level attribute to N/A for controllers (bsc#1207315). * scsi: smartpqi: Change version to 2.1.20-035 (bsc#1207315). * scsi: smartpqi: Convert to host_tagset (bsc#1207315). * scsi: smartpqi: Correct device removal for multi-actuator devices (bsc#1207315). * scsi: smartpqi: Correct max LUN number (bsc#1207315). * scsi: smartpqi: Initialize feature section info (bsc#1207315). * scsi: smartpqi: Replace one-element array with flexible-array member (bsc#1207315). * scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes). * scsi: storvsc: Correct reporting of Hyper-V I/O size limits (git-fixes). * scsi: storvsc: Do not pass unused PFNs to Hyper-V host (git-fixes). * scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file (git-fixes). * scsi: tracing: Fix compile error in trace_array calls when TRACING is disabled (git-fixes). * scsi: ufs: Stop using the clock scaling lock in the error handler (git- fixes). * scsi: ufs: core: Enable link lost interrupt (git-fixes). * scsi_disk kABI: add back members (bsc#1209092). * sctp: fail if no bound addresses can be used for a given scope (bsc#1206677). * sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes). * sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes). * seccomp: Move copy_seccomp() to no failure path (bsc#1210817). * sefltests: netdevsim: wait for devlink instance after netns removal (git- fixes). * selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git- fixes). * selftests mount: Fix mount_setattr_test builds failed (git-fixes). * selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103). * selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103). * selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes). * selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232). * selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232). * selftests/powerpc: Move perror closer to its use (bsc#1206232). * selftests/resctrl: Allow ->setup() to return errors (git-fixes). * selftests/resctrl: Check for return value after write_schemata() (git- fixes). * selftests/resctrl: Extend CPU vendor detection (git-fixes). * selftests/resctrl: Move ->setup() call outside of test specific branches (git-fixes). * selftests/resctrl: Return NULL if malloc_and_init_memory() did not alloc mem (git-fixes). * selftests/sgx: Add "test_encl.elf" to TEST_FILES (git-fixes). * selftests/vm: remove ARRAY_SIZE define from individual tests (git-fixes). * selftests: Provide local define of __cpuid_count() (git-fixes). * selftests: forwarding: lib: quote the sysctl values (git-fixes). * selftests: mptcp: connect: skip if MPTCP is not supported (git-fixes). * selftests: mptcp: pm nl: skip if MPTCP is not supported (git-fixes). * selftests: mptcp: sockopt: skip if MPTCP is not supported (git-fixes). * selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes). * selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes). * selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes). * selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes). * selftests: seg6: disable DAD on IPv6 router cfg for srv6_end_dt4_l3vpn_test (git-fixes). * selftests: sigaltstack: fix -Wuninitialized (git-fixes). * selftests: srv6: make srv6_end_dt46_l3vpn_test more robust (git-fixes). * selftests: xsk: Disable IPv6 on VETH1 (git-fixes). * selftets: seg6: disable rp_filter by default in srv6_end_dt4_l3vpn_test (git-fixes). * selinux: do not use make's grouped targets feature yet (git-fixes). * selinux: ensure av_permissions.h is built when needed (git-fixes). * selinux: fix Makefile dependencies of flask.h (git-fixes). * serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git- fixes). * serial: 8250: Add missing wakeup event reporting (git-fixes). * serial: 8250: Reinit port->pm on port specific driver unbind (git-fixes). * serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git- fixes). * serial: 8250_bcm7271: Fix arbitration handling (git-fixes). * serial: 8250_bcm7271: balance clk_enable calls (git-fixes). * serial: 8250_bcm7271: fix leak in `brcmuart_probe` (git-fixes). * serial: 8250_dma: Fix DMA Rx rearm race (git-fixes). * serial: 8250_em: Fix UART port type (git-fixes). * serial: 8250_exar: Add support for USR298x PCI Modems (git-fixes). * serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git- fixes). * serial: 8250_fsl: fix handle_irq locking (git-fixes). * serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() (git- fixes). * serial: Add support for Advantech PCI-1611U card (git-fixes). * serial: arc_uart: fix of_iomap leak in `arc_serial_probe` (git-fixes). * serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes). * serial: fsl_lpuart: Fix comment typo (git-fixes). * serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes). * serial: qcom-geni: fix console shutdown hang (git-fixes). * serial: qcom-geni: fix enabling deactivated interrupt (git-fixes). * serial: sc16is7xx: setup GPIO controller later in probe (git-fixes). * serial: stm32: re-introduce an irq flag condition in usart_receive_chars (git-fixes). * serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes). * sfc: Change VF mac via PF as first preference if available (git-fixes). * sfc: Fix module EEPROM reporting for QSFP modules (git-fixes). * sfc: Fix use-after-free due to selftest_work (git-fixes). * sfc: correctly advertise tunneled IPv6 segmentation (git-fixes). * sfc: disable RXFCS and RXALL features by default (git-fixes). * sfc: disable RXFCS and RXALL features by default (git-fixes). * sfc: ef10: do not overwrite offload features at NIC reset (git-fixes). * sfc: fix TX channel offset when using legacy interrupts (git-fixes). * sfc: fix considering that all channels have TX queues (git-fixes). * sfc: fix null pointer dereference in efx_hard_start_xmit (git-fixes). * sfc: fix wrong tx channel offset with efx_separate_tx_channels (git-fixes). * sfc: include vport_id in filter spec hash and equal() (git-fixes). * signal handling: do not use BUG_ON() for debugging (bsc#1210439). * signal/seccomp: Refactor seccomp signal and coredump generation (git-fixes). * signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes). * signal/x86: In emulate_vsyscall force a signal instead of calling do_exit (git-fixes). * signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816). * signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816). * signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816). * signal: Implement force_fatal_sig (git-fixes). * smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629). * smb3: display debug information better for encryption (bsc#1193629). * smb3: fix problem remounting a share after shutdown (bsc#1193629). * smb3: fix unusable share after force unmount failure (bsc#1193629). * smb3: improve parallel reads of large files (bsc#1193629). * smb3: lower default deferred close timeout to address perf regression (bsc#1193629). * smb3: make query_on_disk_id open context consistent and move to common code (bsc#1193629). * smb3: move some common open context structs to smbfs_common (bsc#1193629). * soc/tegra: cbb: Use correct master_id mask for CBB NOC in Tegra194 (git- fixes). * soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes). * soundwire: cadence: Do not overflow the command FIFOs (git-fixes). * soundwire: qcom: correct setting ignore bit on v1.5.1 (git-fixes). * soundwire: qcom: gracefully handle too many ports in DT (git-fixes). * spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes). * spi: cadence-quadspi: fix suspend-resume implementations (git-fixes). * spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes). * spi: dw_bt1: fix MUX_MMIO dependencies (git-fixes). * spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes). * spi: qup: Do not skip cleanup in remove's error path (git-fixes). * spi: qup: Request DMA before enabling clocks (git-fixes). * spi: spi-imx: fix MX51_ECSPI_* macros when cs > 3 (git-fixes). * spi: spi-imx: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes). * spi: spidev: remove debug messages that access spidev->spi without locking (git-fixes). * spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git- fixes). * spi: tegra210-quad: Fix validate combined sequence (git-fixes). * squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes). * staging: emxx_udc: Add checks for dma_alloc_coherent() (git-fixes). * staging: iio: resolver: ads1210: fix config mode (git-fixes). * staging: mt7621-dts: change palmbus address to lower case (git-fixes). * staging: mt7621-dts: change some node hex addresses to lower case (git- fixes). * staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git- fixes). * staging: rtl8192e: Remove call_usermodehelper starting RadioPower.sh (git- fixes). * staging: rtl8192e: Remove function ..dm_check_ac_dc_power calling a script (git-fixes). * staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE (git-fixes). * stat: fix inconsistency between struct stat and struct compat_stat (git- fixes). * struct ci_hdrc: hide new member at end (git-fixes). * struct dwc3: mask new member (git-fixes). * struct uvc_device move flush_status new member to end (git-fixes). * sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git- fixes). * sunrpc: only free unix grouplist after RCU settles (git-fixes). * swim3: add missing major.h include (git-fixes). * swiotlb: Free tbl memory in swiotlb_exit() (jsc#PED-3259). * swiotlb: add a SWIOTLB_ANY flag to lift the low memory restriction (PED-3259). * swiotlb: avoid potential left shift overflow (PED-3259). * swiotlb: clean up some coding style and minor issues (PED-3259). * swiotlb: consolidate rounding up default_nslabs (PED-3259). * swiotlb: do not panic when the swiotlb buffer can't be allocated (PED-3259). * swiotlb: ensure a segment does not cross the area boundary (PED-3259). * swiotlb: fail map correctly with failed io_tlb_default_mem (PED-3259). * swiotlb: fix a typo (PED-3259). * swiotlb: fix passing local variable to debugfs_create_ulong() (PED-3259). * swiotlb: fix setting ->force_bounce (PED-3259). * swiotlb: fix use after free on error handling path (PED-3259). * swiotlb: make swiotlb_exit a no-op if SWIOTLB_FORCE is set (PED-3259). * swiotlb: make the swiotlb_init interface more useful (PED-3259). * swiotlb: merge swiotlb-xen initialization into swiotlb (jsc#PED-3259). * swiotlb: panic if nslabs is too small (PED-3259). * swiotlb: pass a gfp_mask argument to swiotlb_init_late (PED-3259). * swiotlb: provide swiotlb_init variants that remap the buffer (PED-3259). * swiotlb: relocate PageHighMem test away from rmem_swiotlb_setup (git-fixes). * swiotlb: remove a useless return in swiotlb_init (PED-3259). * swiotlb: remove swiotlb_init_with_tbl and swiotlb_init_late_with_tbl (PED-3259). * swiotlb: remove unused fields in io_tlb_mem (PED-3259). * swiotlb: rename swiotlb_late_init_with_default_size (PED-3259). * swiotlb: simplify debugfs setup (jsc#PED-3259). * swiotlb: simplify swiotlb_max_segment (PED-3259). * swiotlb: split up the global swiotlb lock (PED-3259). * swiotlb: use the right nslabs value in swiotlb_init_remap (PED-3259). * swiotlb: use the right nslabs-derived sizes in swiotlb_init_late (PED-3259). * sysctl: add a new register_sysctl_init() interface (bsc#1207328). * test_firmware: fix the memory leak of the allocated firmware buffer (git- fixes). * thermal/core: Remove duplicate information when an error occurs (git-fixes). * thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes). * thermal/drivers/tsens: Add compat string for the qcom,msm8960 (git-fixes). * thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes). * thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes). * thermal/drivers/tsens: fix slope values for msm8939 (git-fixes). * thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes). * thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git- fixes). * thermal: intel: Fix unsigned comparison with less than zero (git-fixes). * thermal: intel: intel_pch: Add support for Wellsburg PCH (git-fixes). * thermal: intel: powerclamp: Fix cur_state for multi package system (git- fixes). * thermal: intel: quark_dts: fix error pointer dereference (git-fixes). * thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes). * thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes). * thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165). * thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165). * thunderbolt: Disable interrupt auto clear for rings (git-fixes). * thunderbolt: Mask ring interrupt on Intel hardware as well (bsc#1210165). * thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes). * thunderbolt: Use const qualifier for `ring_interrupt_index` (git-fixes). * thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes). * timers: Prevent union confusion from unexpected (git-fixes) * tools/iio/iio_utils:fix memory leak (git-fixes). * tools/virtio: compile with -pthread (git-fixes). * tools/virtio: fix the vringh test for virtio ring changes (git-fixes). * tools/virtio: fix virtio_test execution (git-fixes). * tools/virtio: initialize spinlocks in vring_test.c (git-fixes). * tools: fix ARRAY_SIZE defines in tools and selftests hdrs (git-fixes). * tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (git- fixes). * tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (git-fixes). * tpm, tpm_tis: Request threaded interrupt handler (git-fixes). * tpm/eventlog: Do not abort tpm_read_log on faulty ACPI address (git-fixes). * tpm/tpm_tis: Disable interrupts for more Lenovo devices (git-fixes). * trace/hwlat: Do not start per-cpu thread if it is already running (git- fixes). * trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes). * trace/hwlat: make use of the helper function kthread_run_on_cpu() (git- fixes). * trace/hwlat: make use of the helper function kthread_run_on_cpu() (git- fixes). * trace_events_hist: add check for return value of 'create_hist_field' (git- fixes). * tracing/fprobe: Fix to check whether fprobe is registered correctly (git- fixes). * tracing/hist: Fix issue of losting command info in error_log (git-fixes). * tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx' (git- fixes). * tracing/hist: Fix wrong return value in parse_action_params() (git-fixes). * tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git- fixes). * tracing/osnoise: Make osnoise_main to sleep for microseconds (git-fixes). * tracing/perf: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes). * tracing/probes: Handle system names with hyphens (git-fixes). * tracing: Add '__rel_loc' using trace event macros (git-fixes). * tracing: Add DYNAMIC flag for dynamic events (git-fixes). * tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git- fixes). * tracing: Add trace_array_puts() to write into instance (git-fixes). * tracing: Add trace_event helper macros __string_len() and __assign_str_len() (git-fixes). * tracing: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes). * tracing: Avoid adding tracer option before update_tracer_options (git- fixes). * tracing: Check field value in hist_field_name() (git-fixes). * tracing: Do not let histogram values have some modifiers (git-fixes). * tracing: Do not use out-of-sync va_list in event printing (git-fixes). * tracing: Ensure trace buffer is at least 4096 bytes large (git-fixes). * tracing: Fix a kmemleak false positive in tracing_map (git-fixes). * tracing: Fix complicated dependency of CONFIG_TRACER_MAX_TRACE (git-fixes). * tracing: Fix infinite loop in tracing_read_pipe on overflowed print_trace_line (git-fixes). * tracing: Fix issue of missing one synthetic field (git-fixes). * tracing: Fix mismatched comment in __string_len (git-fixes). * tracing: Fix permissions for the buffer_percent file (git-fixes). * tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes). * tracing: Fix possible memory leak in __create_synth_event() error path (git- fixes). * tracing: Fix race where histograms can be called before the event (git- fixes). * tracing: Fix sleeping function called from invalid context on RT kernel (git-fixes). * tracing: Fix tp_printk option related with tp_printk_stop_on_boot (git- fixes). * tracing: Fix warning on variable 'struct trace_array' (git-fixes). * tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes). * tracing: Free error logs of tracing instances (git-fixes). * tracing: Have TRACE_DEFINE_ENUM affect trace event types as well (git- fixes). * tracing: Have syscall trace events use trace_event_buffer_lock_reserve() (git-fixes). * tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes). * tracing: Have type enum modifications copy the strings (git-fixes). * tracing: Make splice_read available again (git-fixes). * tracing: Make sure trace_printk() can output as soon as it can be used (git- fixes). * tracing: Make tp_printk work on syscall tracepoints (git-fixes). * tracing: Make tracepoint lockdep check actually test something (git-fixes). * tracing: Use alignof__(struct {type b;}) instead of offsetof() (git-fixes). * tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate (git-fixes). * tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes). * tty: fix out-of-bounds access in tty_driver_lookup_tty() (git-fixes). * tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git- fixes). * tty: serial: fsl_lpuart: adjust buffer length to the intended size (git- fixes). * tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty (git-fixes). * tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes). * tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git- fixes). * tty: serial: fsl_lpuart: disable the CTS when send break signal (git-fixes). * tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes). * tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK (git-fixes). * tty: serial: imx: Handle RS485 DE signal active high (git-fixes). * tty: serial: imx: disable Ageing Timer interrupt request irq (git-fixes). * tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git- fixes). * tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes). * tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes). * tun: annotate access to queue->trans_start (jsc#PED-370). * uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes). * ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328). * udf: Check consistency of Space Bitmap Descriptor (bsc#1210771). * udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649). * udf: Support splicing to file (bsc#1210770). * update internal module version number for cifs.ko (bsc#1193629). * usb-storage: fix deadlock when a scsi command timeouts more than once (git- fixes). * usb: acpi: add helper to check port lpm capability using acpi _DSM (git- fixes). * usb: cdns3: Fix issue with using incorrect PCI device function (git-fixes). * usb: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes). * usb: cdnsp: Fixes issue with redundant Status Stage (git-fixes). * usb: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git- fixes). * usb: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes). * usb: chipidea: core: fix possible concurrent when switch role (git-fixes). * usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes). * usb: chipidea: imx: avoid unnecessary probe defer (git-fixes). * usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes). * usb: core: hub: disable autosuspend for TI TUSB8041 (git-fixes). * usb: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes). * usb: dwc3: Align DWC3_EP_* flag macros (git-fixes). * usb: dwc3: Fix a repeated word checkpatch warning (git-fixes). * usb: dwc3: Fix a typo in field name (git-fixes). * usb: dwc3: Fix ep0 handling when getting reset while doing control transfer (git-fixes). * usb: dwc3: core: Host wake up support from system suspend (git-fixes). * usb: dwc3: debugfs: Resume dwc3 before accessing registers (git-fixes). * usb: dwc3: drd: use helper to get role-switch-default-mode (git-fixes). * usb: dwc3: ep0: Do not prepare beyond Setup stage (git-fixes). * usb: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes). * usb: dwc3: gadget: Change condition for processing suspend event (git- fixes). * usb: dwc3: gadget: Delay issuing End Transfer (git-fixes). * usb: dwc3: gadget: Execute gadget stop after halting the controller (git- fixes). * usb: dwc3: gadget: Improve dwc3_gadget_suspend() and dwc3_gadget_resume() (git-fixes). * usb: dwc3: gadget: Only End Transfer for ep0 data phase (git-fixes). * usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive (git- fixes). * usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes). * usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes). * usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes). * usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes). * usb: dwc3: qcom: Keep power domain on to retain controller status (git- fixes). * usb: dwc3: qcom: clean up icc init (git-fixes). * usb: dwc3: qcom: clean up suspend callbacks (git-fixes). * usb: dwc3: qcom: enable vbus override when in OTG dr-mode (git-fixes). * usb: dwc3: qcom: fix gadget-only builds (git-fixes). * usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes). * usb: dwc3: qcom: fix wakeup implementation (git-fixes). * usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes). * usb: dwc3: qcom: suppress unused-variable warning (git-fixes). * usb: dwc3: remove a possible unnecessary 'out of memory' message (git- fixes). * usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git- fixes). * usb: gadget: configfs: Restrict symlink creation is UDC already binded (git- fixes). * usb: gadget: configfs: remove using list iterator after loop body as a ptr (git-fixes). * usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() (git- fixes). * usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func (git-fixes). * usb: gadget: f_fs: Add unbind event before functionfs_unbind (git-fixes). * usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait (git- fixes). * usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes). * usb: gadget: f_hid: fix refcount leak on error path (git-fixes). * usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() (git- fixes). * usb: gadget: f_uac2: Fix incorrect increment of bNumEndpoints (git-fixes). * usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes). * usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes). * usb: gadget: u_audio: do not let userspace block driver unbind (git-fixes). * usb: gadget: u_ether: Fix host MAC address case (git-fixes). * usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes). * usb: gadget: udc: do not clear gadget driver.bus (git-fixes). * usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition (git-fixes). * usb: host: xhci-rcar: remove leftover quirk handling (git-fixes). * usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math (git-fixes). * usb: max-3421: Fix setting of I/O pins (git-fixes). * usb: mtu3: fix kernel panic at qmu transfer done irq handler (git-fixes). * usb: musb: Add and use inline function musb_otg_state_string (git-fixes). * usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes). * usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes). * usb: musb: remove schedule work called after flush (git-fixes). * usb: typec: altmodes/displayport: Fix configure initial pin assignment (git- fixes). * usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes). * usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes). * usb: typec: intel_pmc_mux: Do not leak the ACPI device reference count (git- fixes). * usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() (git-fixes). * usb: typec: pd: Remove usb_suspend_supported sysfs from sink PDO (git- fixes). * usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes). * usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes). * usb: typec: tcpm: fix multiple times discover svids error (git-fixes). * usb: typec: tcpm: fix warning when handle discover_identity message (git- fixes). * usb: typec: ucsi: Do not attempt to resume the ports before they exist (git- fixes). * usb: typec: ucsi: Do not warn on probe deferral (git-fixes). * usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes). * usb: ucsi: Fix ucsi->connector race (git-fixes). * usb: ucsi_acpi: Increase the command completion timeout (git-fixes). * usb: usbfs: Enforce page requirements for mmap (git-fixes). * usb: usbfs: Use consistent mmap functions (git-fixes). * usb: uvc: Enumerate valid values for color matching (git-fixes). * usb: xhci: tegra: fix sleep in atomic call (git-fixes). * usrmerge: Compatibility with earlier rpm (boo#1211796) * usrmerge: Remove usrmerge compatibility symlink in buildroot (boo#1211796). * vc_screen: do not clobber return value in vcs_read (git-fixes). * vc_screen: do not clobber return value in vcs_read (git-fixes). * vc_screen: modify vcs_size() handling in vcs_read() (git-fixes). * vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (git-fixes). * vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (git-fixes). * vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove (git-fixes). * vdpa: fix use-after-free on vp_vdpa_remove (git-fixes). * vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes). * vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git- fixes). * vfio/type1: prevent underflow of locked_vm via exec() (git-fixes). * vfio/type1: restore locked_vm (git-fixes). * vfio/type1: track locked_vm per dma (git-fixes). * vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642). * vfs: make sync_filesystem return errors from ->sync_fs (git-fixes). * vhost/net: Clear the pending messages when the backend is removed (git- fixes). * virt/coco/sev-guest: Add throttling awareness (bsc#1209927). * virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927). * virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927). * virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927). * virt/coco/sev-guest: Do some code style cleanups (bsc#1209927). * virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927). * virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927). * virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449). * virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449). * virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449). * virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927). * virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449). * virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449). * virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449). * virtio-blk: modify the value type of num in virtio_queue_rq() (git-fixes). * virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes). * virtio-net: execute xdp_do_flush() before napi_complete_done() (git-fixes). * virtio_net: Fix probe failed when modprobe virtio_net (git-fixes). * virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes). * virtio_net: split free_unused_bufs() (git-fixes). * virtio_net: suppress cpu stall when free_unused_bufs (git-fixes). * virtio_pci: modify ENOENT to EINVAL (git-fixes). * virtio_ring: do not update event idx on get_buf (git-fixes). * vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes). * vmxnet3: move rss code block under eop descriptor (bsc#1208212). * vmxnet3: use gro callback when UPT is enabled (bsc#1209739). * vp_vdpa: fix the crash in hot unplug with vp_vdpa (git-fixes). * wait: Fix __wait_event_hrtimeout for RT/DL tasks (git-fixes) * watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths (bsc#1197617). * watchdog-diag288_wdt-fix-__diag288-inline-assembly.patch * watchdog/hpwdt: Enable HP_WATCHDOG for ARM64 systems. (jsc#PED-3210) Also enable module in aarch64 default configuration. * watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes). * watchdog: allow building BCM7038_WDT for BCM4908 (bsc#1208619). * watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes). * watchdog: diag288_wdt: do not use stack buffers for hardware data (bsc#1207497). * watchdog: diag288_wdt: fix __diag288() inline assembly (bsc#1207497). * watchdog: dw_wdt: Fix the error handling path of dw_wdt_drv_probe() (git- fixes). * watchdog: ixp4xx: Implement restart (bsc#1208619). * watchdog: ixp4xx: Rewrite driver to use core (bsc#1208619). * watchdog: ixp4xx_wdt: Fix address space warning (bsc#1208619). * watchdog: menz069_wdt: fix watchdog initialisation (git-fixes). * watchdog: orion_wdt: support pretimeout on Armada-XP (bsc#1208619). * watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git- fixes). * watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes). * watchdog: sp5100_tco: Immediately trigger upon starting (git-fixes). * wifi: ath11k: Fix SKB corruption in REO destination ring (git-fixes). * wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes). * wifi: ath11k: allow system suspend to survive ath11k (git-fixes). * wifi: ath11k: fix SAC bug on peer addition with sta band migration (git- fixes). * wifi: ath11k: fix deinitialization of firmware resources (git-fixes). * wifi: ath11k: fix writing to unintended memory region (git-fixes). * wifi: ath11k: reduce the MHI timeout to 20s (bsc#1207948). * wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git- fixes). * wifi: ath6kl: minor fix for allocation size (git-fixes). * wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes). * wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes). * wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() (git-fixes). * wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (git- fixes). * wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes). * wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes). * wifi: ath9k: use proper statements in conditionals (git-fixes). * wifi: ath: Silence memcpy run-time false positive warning (git-fixes). * wifi: b43: fix incorrect __packed annotation (git-fixes). * wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (git-fixes). * wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (git-fixes). * wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out- of-bounds (git-fixes). * wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git- fixes). * wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git- fixes). * wifi: brcmfmac: support CQM RSSI notification with older firmware (git- fixes). * wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes). * wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes). * wifi: cfg80211: Fix use after free for wext (git-fixes). * wifi: cfg80211: Partial revert "wifi: cfg80211: Fix use after free for wext" (git-fixes). * wifi: cfg80211: fix locking in regulatory disconnect (git-fixes). * wifi: cfg80211: fix locking in sched scan stop work (git-fixes). * wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes). * wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git- fixes). * wifi: iwl3945: Add missing check for create_singlethread_workqueue (git- fixes). * wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git- fixes). * wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes). * wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (git-fixes). * wifi: iwlwifi: fix OEM's name in the ppag approved list (git-fixes). * wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes). * wifi: iwlwifi: fw: fix DBGI dump (git-fixes). * wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes). * wifi: iwlwifi: fw: move memset before early return (git-fixes). * wifi: iwlwifi: make the loop for card preparation effective (git-fixes). * wifi: iwlwifi: mvm: check firmware response size (git-fixes). * wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes). * wifi: iwlwifi: mvm: do not trust firmware n_channels (git-fixes). * wifi: iwlwifi: mvm: fix OEM's name in the tas approved list (git-fixes). * wifi: iwlwifi: mvm: fix cancel_delayed_work_sync() deadlock (git-fixes). * wifi: iwlwifi: mvm: fix mvmtxq->stopped handling (git-fixes). * wifi: iwlwifi: mvm: initialize seq variable (git-fixes). * wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf (git- fixes). * wifi: iwlwifi: pcie: fix possible NULL pointer dereference (git-fixes). * wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes). * wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes). * wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes). * wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes). * wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git- fixes). * wifi: mac80211: Set TWT Information Frame Disabled bit as 1 (bsc#1209980). * wifi: mac80211: adjust scan cancel comment/check (git-fixes). * wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes). * wifi: mac80211: fix min center freq offset tracing (git-fixes). * wifi: mac80211: fix qos on mesh interfaces (git-fixes). * wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes). * wifi: mac80211: sdata can be NULL during AMPDU start (git-fixes). * wifi: mac80211: simplify chanctx allocation (git-fixes). * wifi: mt7601u: fix an integer underflow (git-fixes). * wifi: mt76: add flexible polling wait-interval support (git-fixes). * wifi: mt76: add memory barrier to SDIO queue kick (bsc#1209980). * wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes). * wifi: mt76: connac: fix possible unaligned access in mt76_connac_mcu_add_nested_tlv (bsc#1209980). * wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup (git-fixes). * wifi: mt76: do not run mt76_unregister_device() on unregistered hw (bsc#1209980). * wifi: mt76: fix 6GHz high channel not be scanned (git-fixes). * wifi: mt76: fix receiving LLC packets on mt7615/mt7915 (bsc#1209980). * wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes). * wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes). * wifi: mt76: mt7915: add missing of_node_put() (bsc#1209980). * wifi: mt76: mt7915: call mt7915_mcu_set_thermal_throttling() only after init_work (bsc#1209980). * wifi: mt76: mt7915: check return value before accessing free_block_num (bsc#1209980). * wifi: mt76: mt7915: drop always true condition of __mt7915_reg_addr() (bsc#1209980). * wifi: mt76: mt7915: expose device tree match table (git-fixes). * wifi: mt76: mt7915: fix mcs value in ht mode (bsc#1209980). * wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit (git-fixes). * wifi: mt76: mt7915: fix mt7915_mac_set_timing() (bsc#1209980). * wifi: mt76: mt7915: fix possible unaligned access in mt7915_mac_add_twt_setup (bsc#1209980). * wifi: mt76: mt7915: fix reporting of TX AGGR histogram (git-fixes). * wifi: mt76: mt7915: fix unintended sign extension of mt7915_hw_queue_read() (bsc#1209980). * wifi: mt76: mt7921: fix missing unwind goto in `mt7921u_probe` (git-fixes). * wifi: mt76: mt7921: fix reporting of TX AGGR histogram (git-fixes). * wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset (git- fixes). * wifi: mt76: mt7921e: fix crash in chip reset fail (bsc#1209980). * wifi: mt76: mt7921e: fix probe timeout after reboot (git-fixes). * wifi: mt76: mt7921e: fix random fw download fail (git-fixes). * wifi: mt76: mt7921e: fix random fw download fail (git-fixes). * wifi: mt76: mt7921e: fix rmmod crash in driver reload test (bsc#1209980). * wifi: mt76: mt7921e: improve reliability of dma reset (git-fixes). * wifi: mt76: mt7921e: stop chip reset worker in unregister hook (git-fixes). * wifi: mt76: mt7921s: fix race issue between reset and suspend/resume (bsc#1209980). * wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host (bsc#1209980). * wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes). * wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git- fixes). * wifi: mwifiex: mark OF related data as maybe unused (git-fixes). * wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes). * wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes). * wifi: rt2x00: Fix memory leak when handling surveys (git-fixes). * wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes). * wifi: rtl8xxxu: RTL8192EU always needs full init (git-fixes). * wifi: rtl8xxxu: Use a longer retry limit of 48 (git-fixes). * wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git- fixes). * wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git- fixes). * wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu (git-fixes). * wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes). * wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes). * wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes). * wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes). * wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes). * wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git- fixes). * wifi: rtw89: Add missing check for alloc_workqueue (git-fixes). * wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes). * wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes). * wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git- fixes). * wireguard: ratelimiter: use hrtimer in selftest (git-fixes) * workqueue: Fix hung time report of worker pools (bsc#1211044). * workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044). * workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044). * workqueue: Warn when a new worker could not be created (bsc#1211044). * workqueue: Warn when a rescuer could not be created (bsc#1211044). * writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769). * writeback: avoid use-after-free after removing device (bsc#1207638). * x86, sched: Fix undefined reference to init_freq_invariance_cppc() build error (git-fixes). * x86/64/mm: Map all kernel memory into trampoline_pgd (git-fixes). * x86/ACPI/boot: Use FADT version to check support for online capable (git- fixes). * x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes). * x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes). * x86/MCE/AMD: Use an u64 for bank_map (git-fixes). * x86/PAT: Have pat_enabled() properly reflect state when running on Xen (git- fixes). * x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes). * x86/acpi/boot: Correct acpi_is_processor_usable() check (git-fixes). * x86/acpi/boot: Do not register processors that cannot be onlined for x2APIC (git-fixes). * x86/alternative: Make debug-alternative selective (bsc#1206578). * x86/alternative: Report missing return thunk details (git-fixes). * x86/alternative: Support relocations in alternatives (bsc#1206578). * x86/amd: Use IBPB for firmware calls (git-fixes). * x86/amd_nb: Add AMD PCI IDs for SMN communication (bsc#1208848). * x86/asm: Fix an assembler warning with current binutils (git-fixes). * x86/boot: Avoid using Intel mnemonics in AT&T syntax asm (git-fixes). * x86/boot: Skip realmode init code when running as Xen PV guest (git-fixes). * x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes). * x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes). * x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes). * x86/bugs: Add "unknown" reporting for MMIO Stale Data (git-fixes). * x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available (git-fixes). * x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes). * x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts (git-fixes). * x86/cpu: Add CPU model numbers for Meteor Lake (git fixes). * x86/cpu: Add Raptor Lake to Intel family (git fixes). * x86/cpu: Add new Alderlake and Raptorlake CPU model numbers (git fixes). * x86/cpu: Add new Raptor Lake CPU model number (git fixes). * x86/cpu: Add several Intel server CPU model numbers (git fixes). * x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define (git fixes). * x86/cpufeatures: Add macros for Intel's new fast rep string features (bsc#1211140). * x86/cpufeatures: Introduce x2AVIC CPUID bit (bsc#1208619). * x86/crash: Disable virt in core NMI crash handler to avoid double shootdown (git-fixes). * x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes). * x86/entry: Avoid very early RET (git-fixes). * x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y (git-fixes). * x86/entry: Do not call error_entry() for XENPV (git-fixes). * x86/entry: Move CLD to the start of the idtentry macro (git-fixes). * x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes). * x86/entry: Switch the stack after error_entry() returns (git-fixes). * x86/fault: Cast an argument to the proper address space in prefetch() (git- fixes). * x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes). * x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes). * x86/fpu/xsave: Initialize offset/size cache early (bsc#1211205). * x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes). * x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes). * x86/fpu: Cache xfeature flags from CPUID (git-fixes). * x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (git- fixes). * x86/fpu: Fix the init_fpstate size check with the actual size (git-fixes). * x86/fpu: Prevent FPU state corruption (git-fixes). * x86/fpu: Remove unused supervisor only offsets (git-fixes). * x86/fpu: Remove unused supervisor only offsets (git-fixes). * x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes). * x86/hyperv: Block root partition functionality in a Confidential VM (git- fixes). * x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes). * x86/hyperv: Remove unregister syscore call from Hyper-V cleanup (git-fixes). * x86/hyperv: Restore VP assist page after cpu offlining/onlining (git-fixes). * x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git- fixes). * x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git- fixes). * x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes). * x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes). * x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git- fixes). * x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes). * x86/lib/memmove: Decouple ERMS from FSRM (bsc#1206578). * x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes). * x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes). * x86/mce: Allow instrumentation during task work queueing (git-fixes). * x86/mce: Allow instrumentation during task work queueing (git-fixes). * x86/mce: Mark mce_end() noinstr (git-fixes). * x86/mce: Mark mce_end() noinstr (git-fixes). * x86/mce: Mark mce_panic() noinstr (git-fixes). * x86/mce: Mark mce_panic() noinstr (git-fixes). * x86/mce: Mark mce_read_aux() noinstr (git-fixes). * x86/mce: Mark mce_read_aux() noinstr (git-fixes). * x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). This is a preparation for the next patch * x86/microcode/AMD: Add a @cpu parameter to the reloading functions (git- fixes). * x86/microcode/AMD: Fix mixed steppings support (git-fixes). * x86/microcode/AMD: Track patch allocation size explicitly (git-fixes). * x86/microcode/intel: Do not retry microcode reloading on the APs (git- fixes). * x86/microcode: Add a parameter to microcode_check() to store CPU capabilities (git-fixes). * x86/microcode: Add explicit CPU vendor dependency (git-fixes). * x86/microcode: Adjust late loading result reporting message (git-fixes). * x86/microcode: Check CPU capabilities after late microcode update correctly (git-fixes). * x86/microcode: Rip out the OLD_INTERFACE (git-fixes). * x86/mm: Cleanup the control_va_addr_alignment() __setup handler (git-fixes). * x86/mm: Flush global TLB when switching to trampoline page-table (git- fixes). * x86/mm: Flush global TLB when switching to trampoline page-table (git- fixes). * x86/mm: Use proper mask when setting PUD mapping (git-fixes). * x86/msi: Fix msi message data shadow struct (git-fixes). * x86/msr: Remove .fixup usage (git-fixes). * x86/nospec: Unwreck the RSB stuffing (git-fixes). * x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes). * x86/pat: Fix x86_has_pat_wp() (git-fixes). * x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes). * x86/perf/zhaoxin: Add stepping check for ZXC (git fixes). * x86/perf: Avoid warning for Arch LBR without XSAVE (git fixes). * x86/perf: Default set FREEZE_ON_SMI for all (git fixes). * x86/pm: Add enumeration check before spec MSRs save/restore setup (git- fixes). * x86/reboot: Disable SVM, not just VMX, when stopping CPUs (git-fixes). * x86/resctrl: Fix min_cbm_bits for AMD (git-fixes). * x86/sev: Add SEV-SNP guest feature negotiation support (git-fixes). * x86/sgx: Fix free page accounting (git-fixes). * x86/sgx: Free backing memory after faulting the enclave page (git-fixes). * x86/sgx: Free backing memory after faulting the enclave page (git-fixes). * x86/sgx: Silence softlockup detection when releasing large enclaves (git- fixes). * x86/sgx: Silence softlockup detection when releasing large enclaves (git- fixes). * x86/signal: Fix the value returned by strict_sas_size() (git-fixes). * x86/speculation/mmio: Print SMT warning (git-fixes). * x86/speculation: Identify processors vulnerable to SMT RSB predictions (git- fixes). * x86/static_call: Serialize __static_call_fixup() properly (git-fixes). * x86/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes). * x86/topology: Fix duplicated core ID within a package (git-fixes). * x86/topology: Fix multiple packages shown on a single-package system (git- fixes). * x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes). * x86/tsx: Add a feature bit for TSX control MSR support (git-fixes). * x86/tsx: Disable TSX development mode at boot (git-fixes). * x86/uaccess: Move variable into switch case statement (git-fixes). * x86/uaccess: Move variable into switch case statement (git-fixes). * x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes). * x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes). * x86: ACPI: cstate: Optimize C3 entry on AMD CPUs (git-fixes). * x86: Annotate call_on_stack() (git-fixes). * x86: Annotate call_on_stack() (git-fixes). * x86: Fix return value of __setup handlers (git-fixes). * x86: Handle idle=nomwait cmdline properly for x86_idle (bsc#1208619). * x86: Remove vendor checks from prefer_mwait_c1_over_halt (bsc#1208619). * x86: __memcpy_flushcache: fix wrong alignment if size > 2^32 (git-fixes). * x86: centralize setting SWIOTLB_FORCE when guest memory encryption is enabled (jsc#PED-3259). * x86: do not use REP_GOOD or ERMS for small memory clearing (bsc#1211140). * x86: drop bogus "cc" clobber from __try_cmpxchg_user_asm() (git-fixes). * x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200). * x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200). * x86: remove cruft from <asm/dma-mapping.h> (PED-3259). * xen-netfront: Fix NULL sring after live migration (git-fixes). * xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes). * xen/arm: Fix race in RB-tree based P2M accounting (git-fixes) * xen/netback: do not do grant copy across page boundary (git-fixes). * xen/netback: do some code cleanup (git-fixes). * xen/netback: fix build warning (git-fixes). * xen/netback: use same error messages for same errors (git-fixes). * xen/netfront: destroy queues before real_num_tx_queues is zeroed (git- fixes). * xen/platform-pci: add missing free_irq() in error path (git-fixes). * xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git- fixes). * xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git- fixes). * xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git- fixes). * xfs: convert ptag flags to unsigned (git-fixes). * xfs: do not assert fail on perag references on teardown (git-fixes). * xfs: do not leak btree cursor when insrec fails after a split (git-fixes). * xfs: estimate post-merge refcounts correctly (bsc#1208183). * xfs: fix incorrect error-out in xfs_remove (git-fixes). * xfs: fix incorrect error-out in xfs_remove (git-fixes). * xfs: fix incorrect i_nlink caused by inode racing (git-fixes). * xfs: fix incorrect i_nlink caused by inode racing (git-fixes). * xfs: fix maxlevels comparisons in the btree staging code (git-fixes). * xfs: fix maxlevels comparisons in the btree staging code (git-fixes). * xfs: fix memory leak in xfs_errortag_init (git-fixes). * xfs: fix memory leak in xfs_errortag_init (git-fixes). * xfs: fix rm_offset flag handling in rmap keys (git-fixes). * xfs: get rid of assert from xfs_btree_islastblock (git-fixes). * xfs: get rid of assert from xfs_btree_islastblock (git-fixes). * xfs: get root inode correctly at bulkstat (bsc#1207501). * xfs: get root inode correctly at bulkstat (git-fixes). * xfs: get root inode correctly at bulkstat (git-fixes). * xfs: hoist refcount record merge predicates (bsc#1208183). * xfs: initialize the check_owner object fully (git-fixes). * xfs: initialize the check_owner object fully (git-fixes). * xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes). * xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes). * xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes). * xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes). * xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes). * xfs: remove xfs_setattr_time() declaration (git-fixes). * xfs: return errors in xfs_fs_sync_fs (git-fixes). * xfs: return errors in xfs_fs_sync_fs (git-fixes). * xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes). * xfs: zero inode fork buffer at allocation (git-fixes). * xhci-pci: Only run d3cold avoidance quirk for s2idle (git-fixes). * xhci-pci: set the dma max_seg_size (git-fixes). * xhci-pci: set the dma max_seg_size (git-fixes). * xhci: Fix incorrect tracking of free space on transfer rings (git-fixes). * xhci: Fix null pointer dereference when host dies (git-fixes). * xhci: Fix null pointer dereference when host dies (git-fixes). * xhci: Free the command allocated for setting LPM if we return early (git- fixes). * xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git- fixes). * xhci: fix debugfs register accesses while suspended (git-fixes). * xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes). * xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes). * xsk: Fix corrupted packets for XDP_SHARED_UMEM (git-fixes). * zram: do not lookup algorithm in backends table (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2023-2646=1 openSUSE-SLE-15.5-2023-2646=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2023-2646=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * kernel-azure-devel-debuginfo-5.14.21-150500.33.3.1 * cluster-md-kmp-azure-debuginfo-5.14.21-150500.33.3.1 * dlm-kmp-azure-5.14.21-150500.33.3.1 * kernel-azure-debugsource-5.14.21-150500.33.3.1 * kernel-azure-extra-5.14.21-150500.33.3.1 * reiserfs-kmp-azure-5.14.21-150500.33.3.1 * kernel-azure-optional-debuginfo-5.14.21-150500.33.3.1 * gfs2-kmp-azure-debuginfo-5.14.21-150500.33.3.1 * reiserfs-kmp-azure-debuginfo-5.14.21-150500.33.3.1 * kernel-azure-extra-debuginfo-5.14.21-150500.33.3.1 * kernel-syms-azure-5.14.21-150500.33.3.1 * gfs2-kmp-azure-5.14.21-150500.33.3.1 * ocfs2-kmp-azure-debuginfo-5.14.21-150500.33.3.1 * dlm-kmp-azure-debuginfo-5.14.21-150500.33.3.1 * kernel-azure-debuginfo-5.14.21-150500.33.3.1 * kselftests-kmp-azure-5.14.21-150500.33.3.1 * kernel-azure-optional-5.14.21-150500.33.3.1 * kernel-azure-devel-5.14.21-150500.33.3.1 * ocfs2-kmp-azure-5.14.21-150500.33.3.1 * cluster-md-kmp-azure-5.14.21-150500.33.3.1 * kernel-azure-livepatch-devel-5.14.21-150500.33.3.1 * kselftests-kmp-azure-debuginfo-5.14.21-150500.33.3.1 * openSUSE Leap 15.5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.3.1 * openSUSE Leap 15.5 (x86_64) * kernel-azure-vdso-debuginfo-5.14.21-150500.33.3.1 * kernel-azure-vdso-5.14.21-150500.33.3.1 * openSUSE Leap 15.5 (noarch) * kernel-source-azure-5.14.21-150500.33.3.1 * kernel-devel-azure-5.14.21-150500.33.3.1 * Public Cloud Module 15-SP5 (aarch64 nosrc x86_64) * kernel-azure-5.14.21-150500.33.3.1 * Public Cloud Module 15-SP5 (aarch64 x86_64) * kernel-azure-devel-debuginfo-5.14.21-150500.33.3.1 * kernel-azure-devel-5.14.21-150500.33.3.1 * kernel-syms-azure-5.14.21-150500.33.3.1 * kernel-azure-debugsource-5.14.21-150500.33.3.1 * kernel-azure-debuginfo-5.14.21-150500.33.3.1 * Public Cloud Module 15-SP5 (noarch) * kernel-source-azure-5.14.21-150500.33.3.1 * kernel-devel-azure-5.14.21-150500.33.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2196.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-38096.html * https://www.suse.com/security/cve/CVE-2022-4269.html * https://www.suse.com/security/cve/CVE-2022-45884.html * https://www.suse.com/security/cve/CVE-2022-45885.html * https://www.suse.com/security/cve/CVE-2022-45886.html * https://www.suse.com/security/cve/CVE-2022-45887.html * https://www.suse.com/security/cve/CVE-2022-45919.html * https://www.suse.com/security/cve/CVE-2022-4744.html * https://www.suse.com/security/cve/CVE-2023-0045.html * https://www.suse.com/security/cve/CVE-2023-0122.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-0394.html * https://www.suse.com/security/cve/CVE-2023-0461.html * https://www.suse.com/security/cve/CVE-2023-0469.html * https://www.suse.com/security/cve/CVE-2023-0590.html * https://www.suse.com/security/cve/CVE-2023-0597.html * https://www.suse.com/security/cve/CVE-2023-1075.html * https://www.suse.com/security/cve/CVE-2023-1076.html * https://www.suse.com/security/cve/CVE-2023-1077.html * https://www.suse.com/security/cve/CVE-2023-1079.html * https://www.suse.com/security/cve/CVE-2023-1095.html * https://www.suse.com/security/cve/CVE-2023-1118.html * https://www.suse.com/security/cve/CVE-2023-1380.html * https://www.suse.com/security/cve/CVE-2023-1382.html * https://www.suse.com/security/cve/CVE-2023-1513.html * https://www.suse.com/security/cve/CVE-2023-1582.html * https://www.suse.com/security/cve/CVE-2023-1583.html * https://www.suse.com/security/cve/CVE-2023-1611.html * https://www.suse.com/security/cve/CVE-2023-1637.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-1670.html * https://www.suse.com/security/cve/CVE-2023-1838.html * https://www.suse.com/security/cve/CVE-2023-1855.html * https://www.suse.com/security/cve/CVE-2023-1989.html * https://www.suse.com/security/cve/CVE-2023-1998.html * https://www.suse.com/security/cve/CVE-2023-2002.html * https://www.suse.com/security/cve/CVE-2023-21102.html * https://www.suse.com/security/cve/CVE-2023-21106.html * https://www.suse.com/security/cve/CVE-2023-2124.html * https://www.suse.com/security/cve/CVE-2023-2156.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-2176.html * https://www.suse.com/security/cve/CVE-2023-2235.html * https://www.suse.com/security/cve/CVE-2023-2269.html * https://www.suse.com/security/cve/CVE-2023-22998.html * https://www.suse.com/security/cve/CVE-2023-23000.html * https://www.suse.com/security/cve/CVE-2023-23001.html * https://www.suse.com/security/cve/CVE-2023-23004.html * https://www.suse.com/security/cve/CVE-2023-23006.html * https://www.suse.com/security/cve/CVE-2023-2483.html * https://www.suse.com/security/cve/CVE-2023-25012.html * https://www.suse.com/security/cve/CVE-2023-2513.html * https://www.suse.com/security/cve/CVE-2023-26545.html * https://www.suse.com/security/cve/CVE-2023-28327.html * https://www.suse.com/security/cve/CVE-2023-28410.html * https://www.suse.com/security/cve/CVE-2023-28464.html * https://www.suse.com/security/cve/CVE-2023-3006.html * https://www.suse.com/security/cve/CVE-2023-30456.html * https://www.suse.com/security/cve/CVE-2023-30772.html * https://www.suse.com/security/cve/CVE-2023-31084.html * https://www.suse.com/security/cve/CVE-2023-3141.html * https://www.suse.com/security/cve/CVE-2023-31436.html * https://www.suse.com/security/cve/CVE-2023-3161.html * https://www.suse.com/security/cve/CVE-2023-32233.html * https://www.suse.com/security/cve/CVE-2023-33288.html * https://www.suse.com/security/cve/CVE-2023-33951.html * https://www.suse.com/security/cve/CVE-2023-33952.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1109158 * https://bugzilla.suse.com/show_bug.cgi?id=1142685 * https://bugzilla.suse.com/show_bug.cgi?id=1152472 * https://bugzilla.suse.com/show_bug.cgi?id=1152489 * https://bugzilla.suse.com/show_bug.cgi?id=1155798 * https://bugzilla.suse.com/show_bug.cgi?id=1160435 * https://bugzilla.suse.com/show_bug.cgi?id=1166486 * https://bugzilla.suse.com/show_bug.cgi?id=1172073 * https://bugzilla.suse.com/show_bug.cgi?id=1174777 * https://bugzilla.suse.com/show_bug.cgi?id=1177529 * https://bugzilla.suse.com/show_bug.cgi?id=1186449 * https://bugzilla.suse.com/show_bug.cgi?id=1189998 * https://bugzilla.suse.com/show_bug.cgi?id=1189999 * https://bugzilla.suse.com/show_bug.cgi?id=1191731 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1195175 * https://bugzilla.suse.com/show_bug.cgi?id=1195655 * https://bugzilla.suse.com/show_bug.cgi?id=1195921 * https://bugzilla.suse.com/show_bug.cgi?id=1196058 * https://bugzilla.suse.com/show_bug.cgi?id=1197534 * https://bugzilla.suse.com/show_bug.cgi?id=1197617 * https://bugzilla.suse.com/show_bug.cgi?id=1198101 * https://bugzilla.suse.com/show_bug.cgi?id=1198438 * https://bugzilla.suse.com/show_bug.cgi?id=1198835 * https://bugzilla.suse.com/show_bug.cgi?id=1199304 * https://bugzilla.suse.com/show_bug.cgi?id=1200054 * https://bugzilla.suse.com/show_bug.cgi?id=1202353 * https://bugzilla.suse.com/show_bug.cgi?id=1202633 * https://bugzilla.suse.com/show_bug.cgi?id=1203039 * https://bugzilla.suse.com/show_bug.cgi?id=1203200 * https://bugzilla.suse.com/show_bug.cgi?id=1203325 * https://bugzilla.suse.com/show_bug.cgi?id=1203331 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1203693 * https://bugzilla.suse.com/show_bug.cgi?id=1203906 * https://bugzilla.suse.com/show_bug.cgi?id=1204356 * https://bugzilla.suse.com/show_bug.cgi?id=1204662 * https://bugzilla.suse.com/show_bug.cgi?id=1204993 * https://bugzilla.suse.com/show_bug.cgi?id=1205191 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1205544 * https://bugzilla.suse.com/show_bug.cgi?id=1205650 * https://bugzilla.suse.com/show_bug.cgi?id=1205756 * https://bugzilla.suse.com/show_bug.cgi?id=1205758 * https://bugzilla.suse.com/show_bug.cgi?id=1205760 * https://bugzilla.suse.com/show_bug.cgi?id=1205762 * https://bugzilla.suse.com/show_bug.cgi?id=1205803 * https://bugzilla.suse.com/show_bug.cgi?id=1205846 * https://bugzilla.suse.com/show_bug.cgi?id=1206024 * https://bugzilla.suse.com/show_bug.cgi?id=1206036 * https://bugzilla.suse.com/show_bug.cgi?id=1206056 * https://bugzilla.suse.com/show_bug.cgi?id=1206057 * https://bugzilla.suse.com/show_bug.cgi?id=1206103 * https://bugzilla.suse.com/show_bug.cgi?id=1206224 * https://bugzilla.suse.com/show_bug.cgi?id=1206232 * https://bugzilla.suse.com/show_bug.cgi?id=1206340 * https://bugzilla.suse.com/show_bug.cgi?id=1206459 * https://bugzilla.suse.com/show_bug.cgi?id=1206492 * https://bugzilla.suse.com/show_bug.cgi?id=1206493 * https://bugzilla.suse.com/show_bug.cgi?id=1206552 * https://bugzilla.suse.com/show_bug.cgi?id=1206578 * https://bugzilla.suse.com/show_bug.cgi?id=1206640 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206677 * https://bugzilla.suse.com/show_bug.cgi?id=1206824 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1206876 * https://bugzilla.suse.com/show_bug.cgi?id=1206877 * https://bugzilla.suse.com/show_bug.cgi?id=1206878 * https://bugzilla.suse.com/show_bug.cgi?id=1206880 * https://bugzilla.suse.com/show_bug.cgi?id=1206881 * https://bugzilla.suse.com/show_bug.cgi?id=1206882 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1206885 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1206888 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1206890 * https://bugzilla.suse.com/show_bug.cgi?id=1206891 * https://bugzilla.suse.com/show_bug.cgi?id=1206893 * https://bugzilla.suse.com/show_bug.cgi?id=1206894 * https://bugzilla.suse.com/show_bug.cgi?id=1206935 * https://bugzilla.suse.com/show_bug.cgi?id=1206992 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207050 * https://bugzilla.suse.com/show_bug.cgi?id=1207088 * https://bugzilla.suse.com/show_bug.cgi?id=1207149 * https://bugzilla.suse.com/show_bug.cgi?id=1207158 * https://bugzilla.suse.com/show_bug.cgi?id=1207168 * https://bugzilla.suse.com/show_bug.cgi?id=1207185 * https://bugzilla.suse.com/show_bug.cgi?id=1207270 * https://bugzilla.suse.com/show_bug.cgi?id=1207315 * https://bugzilla.suse.com/show_bug.cgi?id=1207328 * https://bugzilla.suse.com/show_bug.cgi?id=1207497 * https://bugzilla.suse.com/show_bug.cgi?id=1207500 * https://bugzilla.suse.com/show_bug.cgi?id=1207501 * https://bugzilla.suse.com/show_bug.cgi?id=1207506 * https://bugzilla.suse.com/show_bug.cgi?id=1207507 * https://bugzilla.suse.com/show_bug.cgi?id=1207521 * https://bugzilla.suse.com/show_bug.cgi?id=1207553 * https://bugzilla.suse.com/show_bug.cgi?id=1207560 * https://bugzilla.suse.com/show_bug.cgi?id=1207574 * https://bugzilla.suse.com/show_bug.cgi?id=1207588 * https://bugzilla.suse.com/show_bug.cgi?id=1207589 * https://bugzilla.suse.com/show_bug.cgi?id=1207590 * https://bugzilla.suse.com/show_bug.cgi?id=1207591 * https://bugzilla.suse.com/show_bug.cgi?id=1207592 * https://bugzilla.suse.com/show_bug.cgi?id=1207593 * https://bugzilla.suse.com/show_bug.cgi?id=1207594 * https://bugzilla.suse.com/show_bug.cgi?id=1207602 * https://bugzilla.suse.com/show_bug.cgi?id=1207603 * https://bugzilla.suse.com/show_bug.cgi?id=1207605 * https://bugzilla.suse.com/show_bug.cgi?id=1207606 * https://bugzilla.suse.com/show_bug.cgi?id=1207607 * https://bugzilla.suse.com/show_bug.cgi?id=1207608 * https://bugzilla.suse.com/show_bug.cgi?id=1207609 * https://bugzilla.suse.com/show_bug.cgi?id=1207610 * https://bugzilla.suse.com/show_bug.cgi?id=1207611 * https://bugzilla.suse.com/show_bug.cgi?id=1207612 * https://bugzilla.suse.com/show_bug.cgi?id=1207613 * https://bugzilla.suse.com/show_bug.cgi?id=1207614 * https://bugzilla.suse.com/show_bug.cgi?id=1207615 * https://bugzilla.suse.com/show_bug.cgi?id=1207616 * https://bugzilla.suse.com/show_bug.cgi?id=1207617 * https://bugzilla.suse.com/show_bug.cgi?id=1207618 * https://bugzilla.suse.com/show_bug.cgi?id=1207619 * https://bugzilla.suse.com/show_bug.cgi?id=1207620 * https://bugzilla.suse.com/show_bug.cgi?id=1207621 * https://bugzilla.suse.com/show_bug.cgi?id=1207622 * https://bugzilla.suse.com/show_bug.cgi?id=1207623 * https://bugzilla.suse.com/show_bug.cgi?id=1207624 * https://bugzilla.suse.com/show_bug.cgi?id=1207625 * https://bugzilla.suse.com/show_bug.cgi?id=1207626 * https://bugzilla.suse.com/show_bug.cgi?id=1207627 * https://bugzilla.suse.com/show_bug.cgi?id=1207628 * https://bugzilla.suse.com/show_bug.cgi?id=1207629 * https://bugzilla.suse.com/show_bug.cgi?id=1207630 * https://bugzilla.suse.com/show_bug.cgi?id=1207631 * https://bugzilla.suse.com/show_bug.cgi?id=1207632 * https://bugzilla.suse.com/show_bug.cgi?id=1207633 * https://bugzilla.suse.com/show_bug.cgi?id=1207634 * https://bugzilla.suse.com/show_bug.cgi?id=1207635 * https://bugzilla.suse.com/show_bug.cgi?id=1207636 * https://bugzilla.suse.com/show_bug.cgi?id=1207637 * https://bugzilla.suse.com/show_bug.cgi?id=1207638 * https://bugzilla.suse.com/show_bug.cgi?id=1207639 * https://bugzilla.suse.com/show_bug.cgi?id=1207640 * https://bugzilla.suse.com/show_bug.cgi?id=1207641 * https://bugzilla.suse.com/show_bug.cgi?id=1207642 * https://bugzilla.suse.com/show_bug.cgi?id=1207643 * https://bugzilla.suse.com/show_bug.cgi?id=1207644 * https://bugzilla.suse.com/show_bug.cgi?id=1207645 * https://bugzilla.suse.com/show_bug.cgi?id=1207646 * https://bugzilla.suse.com/show_bug.cgi?id=1207647 * https://bugzilla.suse.com/show_bug.cgi?id=1207648 * https://bugzilla.suse.com/show_bug.cgi?id=1207649 * https://bugzilla.suse.com/show_bug.cgi?id=1207650 * https://bugzilla.suse.com/show_bug.cgi?id=1207651 * https://bugzilla.suse.com/show_bug.cgi?id=1207652 * https://bugzilla.suse.com/show_bug.cgi?id=1207653 * https://bugzilla.suse.com/show_bug.cgi?id=1207734 * https://bugzilla.suse.com/show_bug.cgi?id=1207768 * https://bugzilla.suse.com/show_bug.cgi?id=1207769 * https://bugzilla.suse.com/show_bug.cgi?id=1207770 * https://bugzilla.suse.com/show_bug.cgi?id=1207771 * https://bugzilla.suse.com/show_bug.cgi?id=1207773 * https://bugzilla.suse.com/show_bug.cgi?id=1207795 * https://bugzilla.suse.com/show_bug.cgi?id=1207827 * https://bugzilla.suse.com/show_bug.cgi?id=1207842 * https://bugzilla.suse.com/show_bug.cgi?id=1207845 * https://bugzilla.suse.com/show_bug.cgi?id=1207875 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1207935 * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1208050 * https://bugzilla.suse.com/show_bug.cgi?id=1208076 * https://bugzilla.suse.com/show_bug.cgi?id=1208081 * https://bugzilla.suse.com/show_bug.cgi?id=1208105 * https://bugzilla.suse.com/show_bug.cgi?id=1208107 * https://bugzilla.suse.com/show_bug.cgi?id=1208128 * https://bugzilla.suse.com/show_bug.cgi?id=1208130 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1208153 * https://bugzilla.suse.com/show_bug.cgi?id=1208183 * https://bugzilla.suse.com/show_bug.cgi?id=1208212 * https://bugzilla.suse.com/show_bug.cgi?id=1208219 * https://bugzilla.suse.com/show_bug.cgi?id=1208290 * https://bugzilla.suse.com/show_bug.cgi?id=1208368 * https://bugzilla.suse.com/show_bug.cgi?id=1208420 * https://bugzilla.suse.com/show_bug.cgi?id=1208428 * https://bugzilla.suse.com/show_bug.cgi?id=1208429 * https://bugzilla.suse.com/show_bug.cgi?id=1208449 * https://bugzilla.suse.com/show_bug.cgi?id=1208534 * https://bugzilla.suse.com/show_bug.cgi?id=1208541 * https://bugzilla.suse.com/show_bug.cgi?id=1208542 * https://bugzilla.suse.com/show_bug.cgi?id=1208570 * https://bugzilla.suse.com/show_bug.cgi?id=1208588 * https://bugzilla.suse.com/show_bug.cgi?id=1208598 * https://bugzilla.suse.com/show_bug.cgi?id=1208599 * https://bugzilla.suse.com/show_bug.cgi?id=1208600 * https://bugzilla.suse.com/show_bug.cgi?id=1208602 * https://bugzilla.suse.com/show_bug.cgi?id=1208604 * https://bugzilla.suse.com/show_bug.cgi?id=1208605 * https://bugzilla.suse.com/show_bug.cgi?id=1208607 * https://bugzilla.suse.com/show_bug.cgi?id=1208619 * https://bugzilla.suse.com/show_bug.cgi?id=1208628 * https://bugzilla.suse.com/show_bug.cgi?id=1208700 * https://bugzilla.suse.com/show_bug.cgi?id=1208758 * https://bugzilla.suse.com/show_bug.cgi?id=1208759 * https://bugzilla.suse.com/show_bug.cgi?id=1208776 * https://bugzilla.suse.com/show_bug.cgi?id=1208777 * https://bugzilla.suse.com/show_bug.cgi?id=1208784 * https://bugzilla.suse.com/show_bug.cgi?id=1208787 * https://bugzilla.suse.com/show_bug.cgi?id=1208815 * https://bugzilla.suse.com/show_bug.cgi?id=1208816 * https://bugzilla.suse.com/show_bug.cgi?id=1208829 * https://bugzilla.suse.com/show_bug.cgi?id=1208837 * https://bugzilla.suse.com/show_bug.cgi?id=1208843 * https://bugzilla.suse.com/show_bug.cgi?id=1208845 * https://bugzilla.suse.com/show_bug.cgi?id=1208848 * https://bugzilla.suse.com/show_bug.cgi?id=1208864 * https://bugzilla.suse.com/show_bug.cgi?id=1208902 * https://bugzilla.suse.com/show_bug.cgi?id=1208948 * https://bugzilla.suse.com/show_bug.cgi?id=1208976 * https://bugzilla.suse.com/show_bug.cgi?id=1209008 * https://bugzilla.suse.com/show_bug.cgi?id=1209052 * https://bugzilla.suse.com/show_bug.cgi?id=1209092 * https://bugzilla.suse.com/show_bug.cgi?id=1209159 * https://bugzilla.suse.com/show_bug.cgi?id=1209256 * https://bugzilla.suse.com/show_bug.cgi?id=1209258 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209287 * https://bugzilla.suse.com/show_bug.cgi?id=1209288 * https://bugzilla.suse.com/show_bug.cgi?id=1209290 * https://bugzilla.suse.com/show_bug.cgi?id=1209292 * https://bugzilla.suse.com/show_bug.cgi?id=1209367 * https://bugzilla.suse.com/show_bug.cgi?id=1209457 * https://bugzilla.suse.com/show_bug.cgi?id=1209504 * https://bugzilla.suse.com/show_bug.cgi?id=1209532 * https://bugzilla.suse.com/show_bug.cgi?id=1209556 * https://bugzilla.suse.com/show_bug.cgi?id=1209600 * https://bugzilla.suse.com/show_bug.cgi?id=1209635 * https://bugzilla.suse.com/show_bug.cgi?id=1209636 * https://bugzilla.suse.com/show_bug.cgi?id=1209637 * https://bugzilla.suse.com/show_bug.cgi?id=1209684 * https://bugzilla.suse.com/show_bug.cgi?id=1209687 * https://bugzilla.suse.com/show_bug.cgi?id=1209693 * https://bugzilla.suse.com/show_bug.cgi?id=1209739 * https://bugzilla.suse.com/show_bug.cgi?id=1209779 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1209798 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209804 * https://bugzilla.suse.com/show_bug.cgi?id=1209805 * https://bugzilla.suse.com/show_bug.cgi?id=1209856 * https://bugzilla.suse.com/show_bug.cgi?id=1209871 * https://bugzilla.suse.com/show_bug.cgi?id=1209927 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1209982 * https://bugzilla.suse.com/show_bug.cgi?id=1209999 * https://bugzilla.suse.com/show_bug.cgi?id=1210034 * https://bugzilla.suse.com/show_bug.cgi?id=1210050 * https://bugzilla.suse.com/show_bug.cgi?id=1210158 * https://bugzilla.suse.com/show_bug.cgi?id=1210165 * https://bugzilla.suse.com/show_bug.cgi?id=1210202 * https://bugzilla.suse.com/show_bug.cgi?id=1210203 * https://bugzilla.suse.com/show_bug.cgi?id=1210206 * https://bugzilla.suse.com/show_bug.cgi?id=1210216 * https://bugzilla.suse.com/show_bug.cgi?id=1210230 * https://bugzilla.suse.com/show_bug.cgi?id=1210294 * https://bugzilla.suse.com/show_bug.cgi?id=1210301 * https://bugzilla.suse.com/show_bug.cgi?id=1210329 * https://bugzilla.suse.com/show_bug.cgi?id=1210336 * https://bugzilla.suse.com/show_bug.cgi?id=1210409 * https://bugzilla.suse.com/show_bug.cgi?id=1210439 * https://bugzilla.suse.com/show_bug.cgi?id=1210449 * https://bugzilla.suse.com/show_bug.cgi?id=1210450 * https://bugzilla.suse.com/show_bug.cgi?id=1210469 * https://bugzilla.suse.com/show_bug.cgi?id=1210498 * https://bugzilla.suse.com/show_bug.cgi?id=1210506 * https://bugzilla.suse.com/show_bug.cgi?id=1210533 * https://bugzilla.suse.com/show_bug.cgi?id=1210551 * https://bugzilla.suse.com/show_bug.cgi?id=1210629 * https://bugzilla.suse.com/show_bug.cgi?id=1210644 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1210725 * https://bugzilla.suse.com/show_bug.cgi?id=1210741 * https://bugzilla.suse.com/show_bug.cgi?id=1210762 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1210764 * https://bugzilla.suse.com/show_bug.cgi?id=1210765 * https://bugzilla.suse.com/show_bug.cgi?id=1210766 * https://bugzilla.suse.com/show_bug.cgi?id=1210767 * https://bugzilla.suse.com/show_bug.cgi?id=1210768 * https://bugzilla.suse.com/show_bug.cgi?id=1210769 * https://bugzilla.suse.com/show_bug.cgi?id=1210770 * https://bugzilla.suse.com/show_bug.cgi?id=1210771 * https://bugzilla.suse.com/show_bug.cgi?id=1210775 * https://bugzilla.suse.com/show_bug.cgi?id=1210783 * https://bugzilla.suse.com/show_bug.cgi?id=1210791 * https://bugzilla.suse.com/show_bug.cgi?id=1210793 * https://bugzilla.suse.com/show_bug.cgi?id=1210806 * https://bugzilla.suse.com/show_bug.cgi?id=1210816 * https://bugzilla.suse.com/show_bug.cgi?id=1210817 * https://bugzilla.suse.com/show_bug.cgi?id=1210827 * https://bugzilla.suse.com/show_bug.cgi?id=1210940 * https://bugzilla.suse.com/show_bug.cgi?id=1210943 * https://bugzilla.suse.com/show_bug.cgi?id=1210947 * https://bugzilla.suse.com/show_bug.cgi?id=1210953 * https://bugzilla.suse.com/show_bug.cgi?id=1210986 * https://bugzilla.suse.com/show_bug.cgi?id=1211025 * https://bugzilla.suse.com/show_bug.cgi?id=1211037 * https://bugzilla.suse.com/show_bug.cgi?id=1211043 * https://bugzilla.suse.com/show_bug.cgi?id=1211044 * https://bugzilla.suse.com/show_bug.cgi?id=1211089 * https://bugzilla.suse.com/show_bug.cgi?id=1211105 * https://bugzilla.suse.com/show_bug.cgi?id=1211113 * https://bugzilla.suse.com/show_bug.cgi?id=1211131 * https://bugzilla.suse.com/show_bug.cgi?id=1211140 * https://bugzilla.suse.com/show_bug.cgi?id=1211205 * https://bugzilla.suse.com/show_bug.cgi?id=1211263 * https://bugzilla.suse.com/show_bug.cgi?id=1211280 * https://bugzilla.suse.com/show_bug.cgi?id=1211281 * https://bugzilla.suse.com/show_bug.cgi?id=1211299 * https://bugzilla.suse.com/show_bug.cgi?id=1211387 * https://bugzilla.suse.com/show_bug.cgi?id=1211414 * https://bugzilla.suse.com/show_bug.cgi?id=1211449 * https://bugzilla.suse.com/show_bug.cgi?id=1211465 * https://bugzilla.suse.com/show_bug.cgi?id=1211519 * https://bugzilla.suse.com/show_bug.cgi?id=1211564 * https://bugzilla.suse.com/show_bug.cgi?id=1211590 * https://bugzilla.suse.com/show_bug.cgi?id=1211592 * https://bugzilla.suse.com/show_bug.cgi?id=1211593 * https://bugzilla.suse.com/show_bug.cgi?id=1211595 * https://bugzilla.suse.com/show_bug.cgi?id=1211654 * https://bugzilla.suse.com/show_bug.cgi?id=1211686 * https://bugzilla.suse.com/show_bug.cgi?id=1211687 * https://bugzilla.suse.com/show_bug.cgi?id=1211688 * https://bugzilla.suse.com/show_bug.cgi?id=1211689 * https://bugzilla.suse.com/show_bug.cgi?id=1211690 * https://bugzilla.suse.com/show_bug.cgi?id=1211691 * https://bugzilla.suse.com/show_bug.cgi?id=1211692 * https://bugzilla.suse.com/show_bug.cgi?id=1211693 * https://bugzilla.suse.com/show_bug.cgi?id=1211714 * https://bugzilla.suse.com/show_bug.cgi?id=1211796 * https://bugzilla.suse.com/show_bug.cgi?id=1211804 * https://bugzilla.suse.com/show_bug.cgi?id=1211807 * https://bugzilla.suse.com/show_bug.cgi?id=1211808 * https://bugzilla.suse.com/show_bug.cgi?id=1211820 * https://bugzilla.suse.com/show_bug.cgi?id=1211836 * https://bugzilla.suse.com/show_bug.cgi?id=1211847 * https://bugzilla.suse.com/show_bug.cgi?id=1211855 * https://bugzilla.suse.com/show_bug.cgi?id=1211960 * https://bugzilla.suse.com/show_bug.cgi?id=1212129 * https://bugzilla.suse.com/show_bug.cgi?id=1212154 * https://bugzilla.suse.com/show_bug.cgi?id=1212155 * https://bugzilla.suse.com/show_bug.cgi?id=1212158 * https://jira.suse.com/browse/PED-3210 * https://jira.suse.com/browse/PED-3259 * https://jira.suse.com/browse/PED-3692 * https://jira.suse.com/browse/PED-3750 * https://jira.suse.com/browse/PED-3759 * https://jira.suse.com/browse/PED-4022 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:01:54 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:01:54 -0000 Subject: SUSE-SU-2023:2613-1: important: Security update for bluez Message-ID: <170903531433.25129.1357139868266494090@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2023:2613-1 Rating: important References: * bsc#1210398 Cross-References: * CVE-2023-27349 CVSS scores: * CVE-2023-27349 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2613=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2613=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2613=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2613=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2613=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2613=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2613=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2613=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2613=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2613=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * bluez-cups-debuginfo-5.55-150300.3.22.1 * bluez-test-5.55-150300.3.22.1 * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * bluez-cups-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-test-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * openSUSE Leap 15.3 (noarch) * bluez-auto-enable-devices-5.55-150300.3.22.1 * openSUSE Leap 15.3 (x86_64) * libbluetooth3-32bit-5.55-150300.3.22.1 * libbluetooth3-32bit-debuginfo-5.55-150300.3.22.1 * bluez-devel-32bit-5.55-150300.3.22.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libbluetooth3-64bit-5.55-150300.3.22.1 * bluez-devel-64bit-5.55-150300.3.22.1 * libbluetooth3-64bit-debuginfo-5.55-150300.3.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Manager Proxy 4.2 (x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * bluez-deprecated-debuginfo-5.55-150300.3.22.1 * bluez-deprecated-5.55-150300.3.22.1 * libbluetooth3-5.55-150300.3.22.1 * bluez-devel-5.55-150300.3.22.1 * libbluetooth3-debuginfo-5.55-150300.3.22.1 * bluez-5.55-150300.3.22.1 * bluez-debuginfo-5.55-150300.3.22.1 * bluez-debugsource-5.55-150300.3.22.1 ## References: * https://www.suse.com/security/cve/CVE-2023-27349.html * https://bugzilla.suse.com/show_bug.cgi?id=1210398 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:02:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:02:04 -0000 Subject: SUSE-SU-2023:2638-1: moderate: Security update for python-requests Message-ID: <170903532460.25172.15249525959692380536@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2023:2638-1 Rating: moderate References: * bsc#1211674 Cross-References: * CVE-2023-32681 CVSS scores: * CVE-2023-32681 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2023-32681 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2023-2638=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2638=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2638=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2638=1 SUSE-SLE- HA-12-SP5-2023-2638=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2023-2638=1 ## Package List: * Public Cloud Module 12 (noarch) * python-requests-2.24.0-8.14.1 * python3-requests-2.24.0-8.14.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python-requests-2.24.0-8.14.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python-requests-2.24.0-8.14.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python-requests-2.24.0-8.14.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (noarch) * python-requests-2.24.0-8.14.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32681.html * https://bugzilla.suse.com/show_bug.cgi?id=1211674 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:02:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:02:10 -0000 Subject: SUSE-SU-2023:2883-1: moderate: Security update for python3-requests Message-ID: <170903533097.25211.11291230493240920296@smelt2.prg2.suse.org> # Security update for python3-requests Announcement ID: SUSE-SU-2023:2883-1 Rating: moderate References: * bsc#1211674 Cross-References: * CVE-2023-32681 CVSS scores: * CVE-2023-32681 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2023-32681 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python3-requests fixes the following issues: * CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-2883=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2883=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2883=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2883=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2023-2883=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * python3-requests-2.24.0-8.17.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python3-requests-2.24.0-8.17.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python3-requests-2.24.0-8.17.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python3-requests-2.24.0-8.17.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (noarch) * python3-requests-2.24.0-8.17.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32681.html * https://bugzilla.suse.com/show_bug.cgi?id=1211674 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:02:19 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:02:19 -0000 Subject: SUSE-SU-2023:2600-1: important: Security update for container-suseconnect Message-ID: <170903533980.25270.8511358139553969768@smelt2.prg2.suse.org> # Security update for container-suseconnect Announcement ID: SUSE-SU-2023:2600-1 Rating: important References: * bsc#1206346 Affected Products: * Containers Module 15-SP4 * Containers Module 15-SP5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update of container-suseconnect fixes the following issues: * rebuild the package with the go 1.20 security release (bsc#1206346). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2600=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2600=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-2600=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * Containers Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2023-2600=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2023-2600=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2600=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-2600=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2600=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2600=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2600=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2600=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2600=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2600=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2600=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE CaaS Platform 4.0 (x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * Containers Module 15-SP4 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * container-suseconnect-debuginfo-2.4.0-150000.4.30.1 * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * container-suseconnect-2.4.0-150000.4.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * container-suseconnect-2.4.0-150000.4.30.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206346 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:02:30 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:02:30 -0000 Subject: SUSE-SU-2023:2637-1: important: Security update for sccache Message-ID: <170903535088.25316.15927670270505265598@smelt2.prg2.suse.org> # Security update for sccache Announcement ID: SUSE-SU-2023:2637-1 Rating: important References: * bsc#1208553 * bsc#1212407 Cross-References: * CVE-2022-31394 * CVE-2023-1521 CVSS scores: * CVE-2022-31394 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-31394 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1521 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for sccache fixes the following issues: * CVE-2023-1521: Fixed possible code injection via LD_PRELOAD to sccache server (bsc#1212407). * CVE-2022-31394: Fixed a denial-of-service vulnerability via header list size (bsc#1208553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2637=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-2637=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2637=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2637=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2637=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2637=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2637=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2637=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * Development Tools Module 15-SP5 (ppc64le s390x) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 x86_64) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * sccache-debuginfo-0.4.1~18-150300.7.12.1 * sccache-0.4.1~18-150300.7.12.1 ## References: * https://www.suse.com/security/cve/CVE-2022-31394.html * https://www.suse.com/security/cve/CVE-2023-1521.html * https://bugzilla.suse.com/show_bug.cgi?id=1208553 * https://bugzilla.suse.com/show_bug.cgi?id=1212407 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:02:40 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:02:40 -0000 Subject: SUSE-SU-2023:2634-1: moderate: Security update for openssl Message-ID: <170903536023.25399.3731576438583717124@smelt2.prg2.suse.org> # Security update for openssl Announcement ID: SUSE-SU-2023:2634-1 Rating: moderate References: * bsc#1207534 Cross-References: * CVE-2022-4304 CVSS scores: * CVE-2022-4304 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-4304 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 An update that solves one vulnerability can now be installed. ## Description: This update for openssl fixes the following issues: * CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2023-2634=1 ## Package List: * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (x86_64) * libopenssl1_0_0-debuginfo-32bit-1.0.2j-60.98.1 * libopenssl1_0_0-hmac-32bit-1.0.2j-60.98.1 * libopenssl1_0_0-debuginfo-1.0.2j-60.98.1 * libopenssl1_0_0-1.0.2j-60.98.1 * openssl-debugsource-1.0.2j-60.98.1 * libopenssl1_0_0-32bit-1.0.2j-60.98.1 * libopenssl1_0_0-hmac-1.0.2j-60.98.1 * openssl-1.0.2j-60.98.1 * openssl-debuginfo-1.0.2j-60.98.1 * libopenssl-devel-1.0.2j-60.98.1 * SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (noarch) * openssl-doc-1.0.2j-60.98.1 ## References: * https://www.suse.com/security/cve/CVE-2022-4304.html * https://bugzilla.suse.com/show_bug.cgi?id=1207534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:02:47 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:02:47 -0000 Subject: SUSE-SU-2023:2633-1: moderate: Security update for openssl-1_0_0 Message-ID: <170903536788.25440.925758870301991626@smelt2.prg2.suse.org> # Security update for openssl-1_0_0 Announcement ID: SUSE-SU-2023:2633-1 Rating: moderate References: * bsc#1207534 Cross-References: * CVE-2022-4304 CVSS scores: * CVE-2022-4304 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-4304 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Legacy Module 15-SP4 * Legacy Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_0_0 fixes the following issues: * CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2633=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2633=1 * Legacy Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2023-2633=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2023-2633=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2633=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2633=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2633=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2633=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2633=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2633=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2633=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2633=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2633=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-2633=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-cavs-1.0.2p-150000.3.79.1 * libopenssl1_0_0-hmac-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-1.0.2p-150000.3.79.1 * openssl-1_0_0-cavs-debuginfo-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-debuginfo-1.0.2p-150000.3.79.1 * openSUSE Leap 15.4 (x86_64) * libopenssl1_0_0-32bit-1.0.2p-150000.3.79.1 * libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.79.1 * libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-32bit-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-32bit-debuginfo-1.0.2p-150000.3.79.1 * openSUSE Leap 15.4 (noarch) * openssl-1_0_0-doc-1.0.2p-150000.3.79.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-cavs-1.0.2p-150000.3.79.1 * libopenssl1_0_0-hmac-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-1.0.2p-150000.3.79.1 * openssl-1_0_0-cavs-debuginfo-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-debuginfo-1.0.2p-150000.3.79.1 * openSUSE Leap 15.5 (x86_64) * libopenssl1_0_0-32bit-1.0.2p-150000.3.79.1 * libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.79.1 * libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.79.1 * libopenssl1_0_0-steam-32bit-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-32bit-debuginfo-1.0.2p-150000.3.79.1 * openSUSE Leap 15.5 (noarch) * openssl-1_0_0-doc-1.0.2p-150000.3.79.1 * Legacy Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-hmac-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-hmac-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * libopenssl10-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * libopenssl10-debuginfo-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 * SUSE CaaS Platform 4.0 (x86_64) * libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 * openssl-1_0_0-1.0.2p-150000.3.79.1 * libopenssl1_0_0-1.0.2p-150000.3.79.1 * openssl-1_0_0-debugsource-1.0.2p-150000.3.79.1 * openssl-1_0_0-debuginfo-1.0.2p-150000.3.79.1 * libopenssl1_0_0-debuginfo-1.0.2p-150000.3.79.1 ## References: * https://www.suse.com/security/cve/CVE-2022-4304.html * https://bugzilla.suse.com/show_bug.cgi?id=1207534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:00 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:00 -0000 Subject: SUSE-SU-2023:2932-1: low: Security update for python-pip Message-ID: <170903538041.25481.1513762074545567214@smelt2.prg2.suse.org> # Security update for python-pip Announcement ID: SUSE-SU-2023:2932-1 Rating: low References: * bsc#1212015 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP4 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for python-pip fixes the following issues: * Removed .exe files from the RPM package, to prevent issues with security scanners (bsc#1212015). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2023-2932=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-2932=1 openSUSE-SLE-15.4-2023-2932=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2932=1 * Python 3 Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Python3-15-SP4-2023-2932=1 ## Package List: * Python 3 Module 15-SP5 (noarch) * python311-pip-22.3.1-150400.17.6.1 * openSUSE Leap 15.4 (noarch) * python311-pip-22.3.1-150400.17.6.1 * openSUSE Leap 15.5 (noarch) * python311-pip-22.3.1-150400.17.6.1 * Python 3 Module 15-SP4 (noarch) * python311-pip-22.3.1-150400.17.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212015 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:08 -0000 Subject: SUSE-SU-2023:2933-1: low: Security update for python-pip Message-ID: <170903538821.25522.17982231832695483797@smelt2.prg2.suse.org> # Security update for python-pip Announcement ID: SUSE-SU-2023:2933-1 Rating: low References: * bsc#1212015 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one security fix can now be installed. ## Description: This update for python-pip fixes the following issues: * Removed .exe files from the RPM package, to prevent issues with security scanners (bsc#1212015). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2933=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2933=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2933=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * python-pip-10.0.1-13.11.1 * python3-pip-10.0.1-13.11.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * python-pip-10.0.1-13.11.1 * python3-pip-10.0.1-13.11.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * python-pip-10.0.1-13.11.1 * python3-pip-10.0.1-13.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212015 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:14 -0000 Subject: SUSE-SU-2023:2954-1: important: Security update for bind Message-ID: <170903539477.25563.640743765195866441@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2023:2954-1 Rating: important References: * bsc#1212544 Cross-References: * CVE-2023-2828 CVSS scores: * CVE-2023-2828 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2828 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2023-2828: Fixed denial-of-service against recursive resolvers related to cache-cleaning algorithm (bsc#1212544). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2954=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2954=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2954=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2954=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2954=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2954=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2954=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2954=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2954=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2954=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2954=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2954=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2954=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * openSUSE Leap 15.3 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * bind-chrootenv-9.16.6-150300.22.30.1 * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Linux Enterprise Real Time 15 SP3 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Manager Proxy 4.2 (x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Manager Proxy 4.2 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Manager Server 4.2 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libbind9-1600-9.16.6-150300.22.30.1 * libisc1606-9.16.6-150300.22.30.1 * libirs1601-debuginfo-9.16.6-150300.22.30.1 * bind-debugsource-9.16.6-150300.22.30.1 * libisccfg1600-debuginfo-9.16.6-150300.22.30.1 * libdns1605-debuginfo-9.16.6-150300.22.30.1 * bind-debuginfo-9.16.6-150300.22.30.1 * libns1604-9.16.6-150300.22.30.1 * bind-utils-9.16.6-150300.22.30.1 * libirs1601-9.16.6-150300.22.30.1 * libirs-devel-9.16.6-150300.22.30.1 * libisccc1600-9.16.6-150300.22.30.1 * libns1604-debuginfo-9.16.6-150300.22.30.1 * bind-utils-debuginfo-9.16.6-150300.22.30.1 * libisc1606-debuginfo-9.16.6-150300.22.30.1 * bind-9.16.6-150300.22.30.1 * libbind9-1600-debuginfo-9.16.6-150300.22.30.1 * libisccc1600-debuginfo-9.16.6-150300.22.30.1 * bind-chrootenv-9.16.6-150300.22.30.1 * libisccfg1600-9.16.6-150300.22.30.1 * libdns1605-9.16.6-150300.22.30.1 * bind-devel-9.16.6-150300.22.30.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-bind-9.16.6-150300.22.30.1 * bind-doc-9.16.6-150300.22.30.1 ## References: * https://www.suse.com/security/cve/CVE-2023-2828.html * https://bugzilla.suse.com/show_bug.cgi?id=1212544 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:25 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:25 -0000 Subject: SUSE-SU-2023:2823-1: important: Security update for rabbitmq-c Message-ID: <170903540549.25604.6852091311768956422@smelt2.prg2.suse.org> # Security update for rabbitmq-c Announcement ID: SUSE-SU-2023:2823-1 Rating: important References: * bsc#1212499 Cross-References: * CVE-2023-35789 CVSS scores: * CVE-2023-35789 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2023-35789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP4 * Server Applications Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for rabbitmq-c fixes the following issues: * CVE-2023-35789: Fixed insecure credentials submission (bsc#1212499). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2023-2823=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2823=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2823=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-2823=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-2823=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-2823=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-2823=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2823=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2823=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-2823=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2823=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2823=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2823=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-2823=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-tools-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * rabbitmq-c-tools-debuginfo-0.10.0-150300.5.6.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-tools-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * rabbitmq-c-tools-debuginfo-0.10.0-150300.5.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-tools-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * rabbitmq-c-tools-debuginfo-0.10.0-150300.5.6.1 * Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Manager Proxy 4.2 (x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * librabbitmq-devel-0.10.0-150300.5.6.1 * rabbitmq-c-debugsource-0.10.0-150300.5.6.1 * librabbitmq4-debuginfo-0.10.0-150300.5.6.1 * rabbitmq-c-debuginfo-0.10.0-150300.5.6.1 * librabbitmq4-0.10.0-150300.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-35789.html * https://bugzilla.suse.com/show_bug.cgi?id=1212499 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:32 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:32 -0000 Subject: SUSE-SU-2023:2967-1: moderate: Security update for libqt5-qtsvg Message-ID: <170903541272.25682.10348043696844970046@smelt2.prg2.suse.org> # Security update for libqt5-qtsvg Announcement ID: SUSE-SU-2023:2967-1 Rating: moderate References: * bsc#1196654 * bsc#1211298 Cross-References: * CVE-2021-45930 * CVE-2023-32573 CVSS scores: * CVE-2021-45930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-45930 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-32573 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-32573 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for libqt5-qtsvg fixes the following issues: * CVE-2021-45930: Fixed an out-of-bounds write that may have let to a denial- of-service (bsc#1196654). * CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm variable (bsc#1211298). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2023-2967=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2967=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2967=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-2967=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libqt5-qtsvg-debugsource-5.6.2-3.11.1 * libqt5-qtsvg-devel-5.6.2-3.11.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * libqt5-qtsvg-private-headers-devel-5.6.2-3.11.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libqt5-qtsvg-debugsource-5.6.2-3.11.1 * libQt5Svg5-debuginfo-5.6.2-3.11.1 * libQt5Svg5-5.6.2-3.11.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libqt5-qtsvg-debugsource-5.6.2-3.11.1 * libQt5Svg5-debuginfo-5.6.2-3.11.1 * libQt5Svg5-5.6.2-3.11.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libqt5-qtsvg-debugsource-5.6.2-3.11.1 * libQt5Svg5-debuginfo-5.6.2-3.11.1 * libQt5Svg5-5.6.2-3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2021-45930.html * https://www.suse.com/security/cve/CVE-2023-32573.html * https://bugzilla.suse.com/show_bug.cgi?id=1196654 * https://bugzilla.suse.com/show_bug.cgi?id=1211298 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:39 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:39 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903541932.25721.4416954143782017993@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:03:59 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:03:59 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903543949.25764.2284916037365512765@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:06:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:06:04 -0000 Subject: SUSE-SU-2023:2941-1: moderate: Security update for poppler Message-ID: <170903556496.25909.13282238981296461170@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2023:2941-1 Rating: moderate References: * bsc#1199272 Cross-References: * CVE-2022-27337 CVSS scores: * CVE-2022-27337 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-27337 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2022-27337: Fixed a logic error in the Hints::Hints function which can cause denial of service (bsc#1199272). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2941=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2941=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2941=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2941=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2941=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2941=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2941=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libpoppler89-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * openSUSE Leap 15.4 (x86_64) * libpoppler89-32bit-0.79.0-150200.3.11.1 * libpoppler89-32bit-debuginfo-0.79.0-150200.3.11.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * poppler-debugsource-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * poppler-debugsource-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * SUSE Manager Proxy 4.2 (x86_64) * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2022-27337.html * https://bugzilla.suse.com/show_bug.cgi?id=1199272 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:03 -0000 Subject: SUSE-RU-2024:0261-2: moderate: Recommended update for conmon Message-ID: <170903700351.26348.9183424412258842671@smelt2.prg2.suse.org> # Recommended update for conmon Announcement ID: SUSE-RU-2024:0261-2 Rating: moderate References: * bsc#1215806 * bsc#1217773 Affected Products: * Containers Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for conmon fixes the following issues: * New upstream release 2.1.10 Bug fixes: * Fix incorrect free in conn_sock * logging: Respect log-size-max immediately after open * Add patch for fixing regression in v2.1.9 (https://github.com/containers/conmon/issues/475 and https://github.com/containers/conmon/issues/477) * New upstream release 2.1.9 ### Bug fixes * fix some issues flagged by SAST scan * src: fix write after end of buffer * src: open all files with O_CLOEXEC * oom-score: restore oom score before running exit command ### Features * Forward more messages on the sd-notify socket * logging: -l passthrough accepts TTYs * [bsc#1215806] * Update to version 2.1.8: * stdio: ignore EIO for terminals (bsc#1217773) * ensure console socket buffers are properly sized * conmon: drop return after pexit() * ctrl: make accept4 failures fatal * logging: avoid opening /dev/null for each write * oom: restore old OOM score * Use default umask 0022 * cli: log parsing errors to stderr * Changes to build conmon for riscv64 * Changes to build conmon for ppc64le * Fix close_other_fds on FreeBSD ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2024-261=1 ## Package List: * Containers Module 15-SP4 (aarch64 ppc64le s390x x86_64) * conmon-2.1.10-150400.3.17.1 * conmon-debuginfo-2.1.10-150400.3.17.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215806 * https://bugzilla.suse.com/show_bug.cgi?id=1217773 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:04 -0000 Subject: SUSE-SU-2024:0638-1: moderate: Security update for gnutls Message-ID: <170903700495.26348.14724023924168938395@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2024:0638-1 Rating: moderate References: * bsc#1218862 * bsc#1218865 Cross-References: * CVE-2024-0553 * CVE-2024-0567 CVSS scores: * CVE-2024-0553 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0553 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0567 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0567 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-0567: Fixed an incorrect rejection of certificate chains with distributed trust (bsc#1218862). * CVE-2024-0553: Fixed a timing attack against the RSA-PSK key exchange, which could lead to the leakage of sensitive data (bsc#1218865). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-638=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-638=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-638=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-638=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-638=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-638=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-638=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gnutls-debuginfo-3.7.3-150400.4.41.3 * gnutls-guile-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-guile-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * openSUSE Leap 15.4 (x86_64) * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-3.7.3-150400.4.41.3 * openSUSE Leap 15.4 (aarch64_ilp32) * libgnutls30-64bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-64bit-3.7.3-150400.4.41.3 * libgnutls-devel-64bit-3.7.3-150400.4.41.3 * libgnutls30-64bit-3.7.3-150400.4.41.3 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * gnutls-guile-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-guile-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * openSUSE Leap 15.5 (x86_64) * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * Basesystem Module 15-SP5 (x86_64) * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-32bit-3.7.3-150400.4.41.3 ## References: * https://www.suse.com/security/cve/CVE-2024-0553.html * https://www.suse.com/security/cve/CVE-2024-0567.html * https://bugzilla.suse.com/show_bug.cgi?id=1218862 * https://bugzilla.suse.com/show_bug.cgi?id=1218865 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0636-1: moderate: Recommended update for postgresql Message-ID: <170903700818.26348.15547134392733474154@smelt2.prg2.suse.org> # Recommended update for postgresql Announcement ID: SUSE-RU-2024:0636-1 Rating: moderate References: * bsc#1219340 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 An update that has one fix can now be installed. ## Description: This update for postgresql fixes the following issues: * Require fillup package to properly create the config file (bsc#1219340) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-636=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-636=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-636=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-636=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch) * postgresql-server-devel-16-4.26.1 * postgresql-devel-16-4.26.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * postgresql-16-4.26.1 * postgresql-contrib-16-4.26.1 * postgresql-pltcl-16-4.26.1 * postgresql-docs-16-4.26.1 * postgresql-server-16-4.26.1 * postgresql-plpython-16-4.26.1 * postgresql-plperl-16-4.26.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * postgresql-16-4.26.1 * postgresql-contrib-16-4.26.1 * postgresql-pltcl-16-4.26.1 * postgresql-docs-16-4.26.1 * postgresql-server-16-4.26.1 * postgresql-plpython-16-4.26.1 * postgresql-plperl-16-4.26.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * postgresql-16-4.26.1 * postgresql-contrib-16-4.26.1 * postgresql-pltcl-16-4.26.1 * postgresql-docs-16-4.26.1 * postgresql-server-16-4.26.1 * postgresql-plpython-16-4.26.1 * postgresql-plperl-16-4.26.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:10 -0000 Subject: SUSE-RU-2024:0635-1: moderate: Recommended update for postgresql Message-ID: <170903701063.26348.1759984607044599541@smelt2.prg2.suse.org> # Recommended update for postgresql Announcement ID: SUSE-RU-2024:0635-1 Rating: moderate References: * bsc#1219340 Affected Products: * Basesystem Module 15-SP5 * Legacy Module 15-SP5 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for postgresql fixes the following issues: * Require fillup package to properly create the config file (bsc#1219340) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-635=1 openSUSE-SLE-15.5-2024-635=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-635=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-635=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-635=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-635=1 ## Package List: * openSUSE Leap 15.5 (noarch) * postgresql-plperl-16-150500.10.6.1 * postgresql-llvmjit-16-150500.10.6.1 * postgresql-pltcl-16-150500.10.6.1 * postgresql-contrib-16-150500.10.6.1 * postgresql-llvmjit-devel-16-150500.10.6.1 * postgresql-16-150500.10.6.1 * postgresql-plpython-16-150500.10.6.1 * postgresql-test-16-150500.10.6.1 * postgresql-docs-16-150500.10.6.1 * postgresql-server-16-150500.10.6.1 * postgresql-server-devel-16-150500.10.6.1 * postgresql-devel-16-150500.10.6.1 * Basesystem Module 15-SP5 (noarch) * postgresql-16-150500.10.6.1 * Legacy Module 15-SP5 (noarch) * postgresql-llvmjit-16-150500.10.6.1 * postgresql-llvmjit-devel-16-150500.10.6.1 * SUSE Package Hub 15 15-SP5 (noarch) * postgresql-plperl-16-150500.10.6.1 * postgresql-llvmjit-16-150500.10.6.1 * postgresql-pltcl-16-150500.10.6.1 * postgresql-contrib-16-150500.10.6.1 * postgresql-llvmjit-devel-16-150500.10.6.1 * postgresql-16-150500.10.6.1 * postgresql-plpython-16-150500.10.6.1 * postgresql-test-16-150500.10.6.1 * postgresql-docs-16-150500.10.6.1 * postgresql-server-16-150500.10.6.1 * postgresql-server-devel-16-150500.10.6.1 * postgresql-devel-16-150500.10.6.1 * Server Applications Module 15-SP5 (noarch) * postgresql-plperl-16-150500.10.6.1 * postgresql-pltcl-16-150500.10.6.1 * postgresql-contrib-16-150500.10.6.1 * postgresql-plpython-16-150500.10.6.1 * postgresql-docs-16-150500.10.6.1 * postgresql-server-16-150500.10.6.1 * postgresql-server-devel-16-150500.10.6.1 * postgresql-devel-16-150500.10.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:12 -0000 Subject: SUSE-RU-2024:0634-1: moderate: Recommended update for postgresql Message-ID: <170903701212.26348.10921507630248627486@smelt2.prg2.suse.org> # Recommended update for postgresql Announcement ID: SUSE-RU-2024:0634-1 Rating: moderate References: * bsc#1219340 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for postgresql fixes the following issues: * Require fillup package to properly create the config file (bsc#1219340) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-634=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-634=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-634=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-634=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-634=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-634=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-634=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-634=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-634=1 ## Package List: * openSUSE Leap 15.4 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-test-16-150400.4.12.1 * postgresql-llvmjit-16-150400.4.12.1 * postgresql-llvmjit-devel-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-llvmjit-16-150400.4.12.1 * postgresql-llvmjit-devel-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-llvmjit-16-150400.4.12.1 * postgresql-llvmjit-devel-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * postgresql-16-150400.4.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-llvmjit-16-150400.4.12.1 * postgresql-llvmjit-devel-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-llvmjit-16-150400.4.12.1 * postgresql-llvmjit-devel-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Manager Proxy 4.3 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 * SUSE Manager Server 4.3 (noarch) * postgresql-plpython-16-150400.4.12.1 * postgresql-pltcl-16-150400.4.12.1 * postgresql-server-16-150400.4.12.1 * postgresql-server-devel-16-150400.4.12.1 * postgresql-16-150400.4.12.1 * postgresql-plperl-16-150400.4.12.1 * postgresql-docs-16-150400.4.12.1 * postgresql-devel-16-150400.4.12.1 * postgresql-contrib-16-150400.4.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:14 -0000 Subject: SUSE-RU-2024:0633-1: moderate: Recommended update for postgresql Message-ID: <170903701432.26348.13829470266717165433@smelt2.prg2.suse.org> # Recommended update for postgresql Announcement ID: SUSE-RU-2024:0633-1 Rating: moderate References: * bsc#1219340 Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that has one fix can now be installed. ## Description: This update for postgresql fixes the following issues: * Require fillup package to properly create the config file (bsc#1219340) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-633=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-633=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-633=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * postgresql-devel-16-150200.4.27.1 * postgresql-server-16-150200.4.27.1 * postgresql-docs-16-150200.4.27.1 * postgresql-server-devel-16-150200.4.27.1 * postgresql-contrib-16-150200.4.27.1 * postgresql-plpython-16-150200.4.27.1 * postgresql-plperl-16-150200.4.27.1 * postgresql-16-150200.4.27.1 * postgresql-pltcl-16-150200.4.27.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * postgresql-devel-16-150200.4.27.1 * postgresql-server-16-150200.4.27.1 * postgresql-docs-16-150200.4.27.1 * postgresql-server-devel-16-150200.4.27.1 * postgresql-contrib-16-150200.4.27.1 * postgresql-plpython-16-150200.4.27.1 * postgresql-plperl-16-150200.4.27.1 * postgresql-16-150200.4.27.1 * postgresql-pltcl-16-150200.4.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * postgresql-devel-16-150200.4.27.1 * postgresql-server-16-150200.4.27.1 * postgresql-docs-16-150200.4.27.1 * postgresql-server-devel-16-150200.4.27.1 * postgresql-contrib-16-150200.4.27.1 * postgresql-plpython-16-150200.4.27.1 * postgresql-plperl-16-150200.4.27.1 * postgresql-16-150200.4.27.1 * postgresql-pltcl-16-150200.4.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:06 -0000 Subject: SUSE-RU-2024:0637-1: moderate: Recommended update for duktape Message-ID: <170903700660.26348.14895798457894030475@smelt2.prg2.suse.org> # Recommended update for duktape Announcement ID: SUSE-RU-2024:0637-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that can now be installed. ## Description: This update for duktape fixes the following issues: * Ship libduktape206-32bit: needed by libproxy since version 0.5. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-637=1 openSUSE-SLE-15.5-2024-637=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-637=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-637=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * duktape-devel-2.6.0-150500.4.5.1 * duktape-debugsource-2.6.0-150500.4.5.1 * libduktape206-2.6.0-150500.4.5.1 * libduktape206-debuginfo-2.6.0-150500.4.5.1 * openSUSE Leap 15.5 (x86_64) * libduktape206-32bit-2.6.0-150500.4.5.1 * libduktape206-32bit-debuginfo-2.6.0-150500.4.5.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libduktape206-64bit-debuginfo-2.6.0-150500.4.5.1 * libduktape206-64bit-2.6.0-150500.4.5.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * duktape-debugsource-2.6.0-150500.4.5.1 * libduktape206-2.6.0-150500.4.5.1 * libduktape206-debuginfo-2.6.0-150500.4.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * duktape-devel-2.6.0-150500.4.5.1 * duktape-debugsource-2.6.0-150500.4.5.1 * libduktape206-2.6.0-150500.4.5.1 * libduktape206-debuginfo-2.6.0-150500.4.5.1 * Basesystem Module 15-SP5 (x86_64) * libduktape206-32bit-2.6.0-150500.4.5.1 * libduktape206-32bit-debuginfo-2.6.0-150500.4.5.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:15 -0000 Subject: SUSE-RU-2024:0632-1: moderate: Recommended update for postgresql Message-ID: <170903701554.26348.4488625023789229286@smelt2.prg2.suse.org> # Recommended update for postgresql Announcement ID: SUSE-RU-2024:0632-1 Rating: moderate References: * bsc#1219340 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for postgresql fixes the following issues: * Require fillup package to properly create the config file (bsc#1219340) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-632=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-632=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-632=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-632=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-632=1 ## Package List: * openSUSE Leap 15.3 (noarch) * postgresql-contrib-16-150300.10.21.1 * postgresql-llvmjit-devel-16-150300.10.21.1 * postgresql-llvmjit-16-150300.10.21.1 * postgresql-plpython-16-150300.10.21.1 * postgresql-devel-16-150300.10.21.1 * postgresql-pltcl-16-150300.10.21.1 * postgresql-16-150300.10.21.1 * postgresql-server-devel-16-150300.10.21.1 * postgresql-test-16-150300.10.21.1 * postgresql-docs-16-150300.10.21.1 * postgresql-plperl-16-150300.10.21.1 * postgresql-server-16-150300.10.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * postgresql-contrib-16-150300.10.21.1 * postgresql-plpython-16-150300.10.21.1 * postgresql-devel-16-150300.10.21.1 * postgresql-pltcl-16-150300.10.21.1 * postgresql-16-150300.10.21.1 * postgresql-server-devel-16-150300.10.21.1 * postgresql-docs-16-150300.10.21.1 * postgresql-plperl-16-150300.10.21.1 * postgresql-server-16-150300.10.21.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * postgresql-contrib-16-150300.10.21.1 * postgresql-plpython-16-150300.10.21.1 * postgresql-devel-16-150300.10.21.1 * postgresql-pltcl-16-150300.10.21.1 * postgresql-16-150300.10.21.1 * postgresql-server-devel-16-150300.10.21.1 * postgresql-docs-16-150300.10.21.1 * postgresql-plperl-16-150300.10.21.1 * postgresql-server-16-150300.10.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * postgresql-contrib-16-150300.10.21.1 * postgresql-plpython-16-150300.10.21.1 * postgresql-devel-16-150300.10.21.1 * postgresql-pltcl-16-150300.10.21.1 * postgresql-16-150300.10.21.1 * postgresql-server-devel-16-150300.10.21.1 * postgresql-docs-16-150300.10.21.1 * postgresql-plperl-16-150300.10.21.1 * postgresql-server-16-150300.10.21.1 * SUSE Enterprise Storage 7.1 (noarch) * postgresql-contrib-16-150300.10.21.1 * postgresql-plpython-16-150300.10.21.1 * postgresql-devel-16-150300.10.21.1 * postgresql-pltcl-16-150300.10.21.1 * postgresql-16-150300.10.21.1 * postgresql-server-devel-16-150300.10.21.1 * postgresql-docs-16-150300.10.21.1 * postgresql-plperl-16-150300.10.21.1 * postgresql-server-16-150300.10.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:17 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:17 -0000 Subject: SUSE-RU-2024:0631-1: moderate: Recommended update for texlive-specs-a Message-ID: <170903701792.26348.12583021267259051158@smelt2.prg2.suse.org> # Recommended update for texlive-specs-a Announcement ID: SUSE-RU-2024:0631-1 Rating: moderate References: * bsc#1218601 Affected Products: * Desktop Applications Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for texlive-specs-a fixes the following issues: * Replace arara.jar in arara.tar.xz with a updated log4j to silent some simple screening tools reporting vulnerable log4j version even if even log4j is not used that way (bsc#1218601) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-631=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-631=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-631=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-631=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-631=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-631=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-631=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-631=1 ## Package List: * openSUSE Leap 15.4 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-achemso-doc-2021.189.3.13csvn57479-150400.20.3.1 * texlive-akletter-doc-2021.189.1.5isvn15878-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-apxproof-doc-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-annee-scolaire-doc-2021.189.1.6svn55988-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-apalike-german-doc-2021.189.svn54080-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-acro-doc-2021.189.3.5svn57447-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-12many-doc-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-algpseudocodex-doc-2021.189.1.0svn56125-150400.20.3.1 * texlive-acmconf-doc-2021.189.1.3svn15878-150400.20.3.1 * texlive-actuarialsymbol-doc-2021.189.1.1svn54080-150400.20.3.1 * texlive-adrconv-doc-2021.189.1.4svn46817-150400.20.3.1 * texlive-a0poster-doc-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-adjmulticol-doc-2021.189.1.2svn54157-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-adtrees-doc-2021.189.1.1svn51618-150400.20.3.1 * texlive-ESIEEcv-doc-2021.189.svn15878-150400.20.3.1 * texlive-allrunes-doc-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-a5comb-doc-2021.189.4svn17020-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-arabicfront-doc-2021.189.1.1svn51474-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-appendixnumberbeamer-doc-2021.189.1.2svn46317-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-archaic-doc-2021.189.svn38005-150400.20.3.1 * texlive-advdate-doc-2021.189.svn20538-150400.20.3.1 * texlive-aligned-overset-doc-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-GS1-doc-2021.189.22svn44822-150400.20.3.1 * texlive-accessibility-doc-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-alnumsec-doc-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-amsrefs-doc-2021.189.2.14svn30646-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-abstract-doc-2021.189.1.2asvn15878-150400.20.3.1 * texlive-almendra-doc-2021.189.svn56035-150400.20.3.1 * texlive-apnum-doc-2021.189.1.7svn47510-150400.20.3.1 * texlive-SIstyle-doc-2021.189.2.3asvn54080-150400.20.3.1 * texlive-a4wide-doc-2021.189.svn20943-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-aiaa-doc-2021.189.3.6svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-appendix-doc-2021.189.1.2csvn53718-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-antt-doc-2021.189.2.08svn18651-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-academicons-doc-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-Asana-Math-doc-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-arabxetex-doc-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-armtex-doc-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-amiri-doc-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-alkalami-doc-2021.189.1.000svn44497-150400.20.3.1 * texlive-arimo-doc-2021.189.svn42880-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-aesupp-doc-2021.189.1svn58253-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-antomega-doc-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-archivo-doc-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-apa-doc-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-aramaic-serto-doc-2021.189.1.0svn30042-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-Tabbing-doc-2021.189.svn17022-150400.20.3.1 * texlive-amsfonts-doc-2021.189.3.04svn29208-150400.20.3.1 * texlive-albatross-doc-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-anonymous-acm-doc-2021.189.1.0svn55121-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-algxpar-doc-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsmath-doc-2021.189.svn56514-150400.20.3.1 * texlive-accanthis-doc-2021.189.svn32089-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-adfsymbols-doc-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aalok-doc-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-algorithm2e-doc-2021.189.5.2svn44846-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-aomart-doc-2021.189.1.24svn56102-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-IEEEtran-doc-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-aguplus-doc-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-altfont-doc-2021.189.1.1svn15878-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-ae-doc-2021.189.1.4svn15878-150400.20.3.1 * texlive-accents-doc-2021.189.1.4svn51497-150400.20.3.1 * texlive-arev-doc-2021.189.svn15878-150400.20.3.1 * texlive-SIunits-doc-2021.189.1.36svn15878-150400.20.3.1 * texlive-almfixed-doc-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-abraces-doc-2021.189.2.0svn58761-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-adigraph-doc-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-arabtex-doc-2021.189.3.17svn25711-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-algorithms-doc-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-alg-doc-2021.189.svn15878-150400.20.3.1 * texlive-anonchap-doc-2021.189.1.1asvn17049-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-apa6e-doc-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-anysize-doc-2021.189.svn15878-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-abc-doc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-afthesis-doc-2021.189.2.7svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-alegreya-doc-2021.189.svn54512-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-alfaslabone-doc-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-archaeologie-doc-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-adhocfilelist-doc-2021.189.svn29349-150400.20.3.1 * texlive-adjustbox-doc-2021.189.1.3svn56291-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-antiqua-doc-2021.189.001.003svn24266-150400.20.3.1 * texlive-arara-doc-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-abntex2-doc-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-adforn-doc-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-apacite-doc-2021.189.6.03svn54080-150400.20.3.1 * texlive-addfont-doc-2021.189.1.1svn58559-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-antanilipsum-doc-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-2up-doc-2021.189.1.3asvn55076-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-animate-doc-2021.189.svn56583-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-aeguill-doc-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-afm2pl-doc-2021.189.svn54074-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-addliga-doc-2021.189.1.0svn50912-150400.20.3.1 * texlive-alpha-persian-doc-2021.189.1.3svn50316-150400.20.3.1 * texlive-anyfontsize-doc-2021.189.svn17050-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-accsupp-doc-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-acroterm-doc-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-a2ping-doc-2021.189.2.84psvn52964-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-arabi-add-doc-2021.189.1.0svn37709-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-amsaddr-doc-2021.189.1.1svn29630-150400.20.3.1 * texlive-IEEEconf-doc-2021.189.1.4svn15878-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-accfonts-doc-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-acmart-doc-2021.189.1.75svn56946-150400.20.3.1 * texlive-abstyles-doc-2021.189.svn15878-150400.20.3.1 * texlive-acronym-doc-2021.189.1.47svn54758-150400.20.3.1 * texlive-apa7-doc-2021.189.2.10svn58121-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-arabluatex-doc-2021.189.1.20svn54512-150400.20.3.1 * texlive-arcs-doc-2021.189.1svn15878-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-apptools-doc-2021.189.1.0svn28400-150400.20.3.1 * texlive-akktex-doc-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-actuarialangle-doc-2021.189.2.1svn51376-150400.20.3.1 * texlive-apa6-doc-2021.189.2.34svn53406-150400.20.3.1 * texlive-algolrevived-doc-2021.189.1.052svn56864-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-arabi-doc-2021.189.1.1svn44662-150400.20.3.1 * texlive-alphalph-doc-2021.189.2.6svn53087-150400.20.3.1 * texlive-algorithmicx-doc-2021.189.svn15878-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-abnt-doc-2021.189.svn55471-150400.20.3.1 * texlive-HA-prosper-doc-2021.189.4.21svn15878-150400.20.3.1 * texlive-amstex-doc-2021.189.svn57972-150400.20.3.1 * texlive-abbr-doc-2021.189.svn15878-150400.20.3.1 * texlive-algobox-doc-2021.189.1.3svn52204-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-anonymouspro-doc-2021.189.2.2svn51631-150400.20.3.1 * texlive-adfathesis-doc-2021.189.2.42svn26048-150400.20.3.1 * texlive-ametsoc-doc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-afparticle-doc-2021.189.1.3svn35900-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-alertmessage-doc-2021.189.1.1svn38055-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-aobs-tikz-doc-2021.189.1.0svn32662-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-addlines-doc-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-akshar-doc-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-amscdx-doc-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-aastex-doc-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-active-conf-doc-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-answers-doc-2021.189.2.16svn35032-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * openSUSE Leap 15.5 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-achemso-doc-2021.189.3.13csvn57479-150400.20.3.1 * texlive-akletter-doc-2021.189.1.5isvn15878-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-apxproof-doc-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-annee-scolaire-doc-2021.189.1.6svn55988-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-apalike-german-doc-2021.189.svn54080-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-acro-doc-2021.189.3.5svn57447-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-12many-doc-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-algpseudocodex-doc-2021.189.1.0svn56125-150400.20.3.1 * texlive-acmconf-doc-2021.189.1.3svn15878-150400.20.3.1 * texlive-actuarialsymbol-doc-2021.189.1.1svn54080-150400.20.3.1 * texlive-adrconv-doc-2021.189.1.4svn46817-150400.20.3.1 * texlive-a0poster-doc-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-adjmulticol-doc-2021.189.1.2svn54157-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-adtrees-doc-2021.189.1.1svn51618-150400.20.3.1 * texlive-ESIEEcv-doc-2021.189.svn15878-150400.20.3.1 * texlive-allrunes-doc-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-a5comb-doc-2021.189.4svn17020-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-arabicfront-doc-2021.189.1.1svn51474-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-appendixnumberbeamer-doc-2021.189.1.2svn46317-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-archaic-doc-2021.189.svn38005-150400.20.3.1 * texlive-advdate-doc-2021.189.svn20538-150400.20.3.1 * texlive-aligned-overset-doc-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-GS1-doc-2021.189.22svn44822-150400.20.3.1 * texlive-accessibility-doc-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-alnumsec-doc-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-amsrefs-doc-2021.189.2.14svn30646-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-abstract-doc-2021.189.1.2asvn15878-150400.20.3.1 * texlive-almendra-doc-2021.189.svn56035-150400.20.3.1 * texlive-apnum-doc-2021.189.1.7svn47510-150400.20.3.1 * texlive-SIstyle-doc-2021.189.2.3asvn54080-150400.20.3.1 * texlive-a4wide-doc-2021.189.svn20943-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-aiaa-doc-2021.189.3.6svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-appendix-doc-2021.189.1.2csvn53718-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-antt-doc-2021.189.2.08svn18651-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-academicons-doc-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-Asana-Math-doc-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-arabxetex-doc-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-armtex-doc-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-amiri-doc-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-alkalami-doc-2021.189.1.000svn44497-150400.20.3.1 * texlive-arimo-doc-2021.189.svn42880-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-aesupp-doc-2021.189.1svn58253-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-antomega-doc-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-archivo-doc-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-apa-doc-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-aramaic-serto-doc-2021.189.1.0svn30042-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-Tabbing-doc-2021.189.svn17022-150400.20.3.1 * texlive-amsfonts-doc-2021.189.3.04svn29208-150400.20.3.1 * texlive-albatross-doc-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-anonymous-acm-doc-2021.189.1.0svn55121-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-algxpar-doc-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsmath-doc-2021.189.svn56514-150400.20.3.1 * texlive-accanthis-doc-2021.189.svn32089-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-adfsymbols-doc-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aalok-doc-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-algorithm2e-doc-2021.189.5.2svn44846-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-aomart-doc-2021.189.1.24svn56102-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-IEEEtran-doc-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-aguplus-doc-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-altfont-doc-2021.189.1.1svn15878-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-ae-doc-2021.189.1.4svn15878-150400.20.3.1 * texlive-accents-doc-2021.189.1.4svn51497-150400.20.3.1 * texlive-arev-doc-2021.189.svn15878-150400.20.3.1 * texlive-SIunits-doc-2021.189.1.36svn15878-150400.20.3.1 * texlive-almfixed-doc-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-abraces-doc-2021.189.2.0svn58761-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-adigraph-doc-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-arabtex-doc-2021.189.3.17svn25711-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-algorithms-doc-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-alg-doc-2021.189.svn15878-150400.20.3.1 * texlive-anonchap-doc-2021.189.1.1asvn17049-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-apa6e-doc-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-anysize-doc-2021.189.svn15878-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-abc-doc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-afthesis-doc-2021.189.2.7svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-alegreya-doc-2021.189.svn54512-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-alfaslabone-doc-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-archaeologie-doc-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-adhocfilelist-doc-2021.189.svn29349-150400.20.3.1 * texlive-adjustbox-doc-2021.189.1.3svn56291-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-antiqua-doc-2021.189.001.003svn24266-150400.20.3.1 * texlive-arara-doc-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-abntex2-doc-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-adforn-doc-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-apacite-doc-2021.189.6.03svn54080-150400.20.3.1 * texlive-addfont-doc-2021.189.1.1svn58559-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-antanilipsum-doc-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-2up-doc-2021.189.1.3asvn55076-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-animate-doc-2021.189.svn56583-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-aeguill-doc-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-afm2pl-doc-2021.189.svn54074-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-addliga-doc-2021.189.1.0svn50912-150400.20.3.1 * texlive-alpha-persian-doc-2021.189.1.3svn50316-150400.20.3.1 * texlive-anyfontsize-doc-2021.189.svn17050-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-accsupp-doc-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-acroterm-doc-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-a2ping-doc-2021.189.2.84psvn52964-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-arabi-add-doc-2021.189.1.0svn37709-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-amsaddr-doc-2021.189.1.1svn29630-150400.20.3.1 * texlive-IEEEconf-doc-2021.189.1.4svn15878-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-accfonts-doc-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-acmart-doc-2021.189.1.75svn56946-150400.20.3.1 * texlive-abstyles-doc-2021.189.svn15878-150400.20.3.1 * texlive-acronym-doc-2021.189.1.47svn54758-150400.20.3.1 * texlive-apa7-doc-2021.189.2.10svn58121-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-arabluatex-doc-2021.189.1.20svn54512-150400.20.3.1 * texlive-arcs-doc-2021.189.1svn15878-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-apptools-doc-2021.189.1.0svn28400-150400.20.3.1 * texlive-akktex-doc-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-actuarialangle-doc-2021.189.2.1svn51376-150400.20.3.1 * texlive-apa6-doc-2021.189.2.34svn53406-150400.20.3.1 * texlive-algolrevived-doc-2021.189.1.052svn56864-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-arabi-doc-2021.189.1.1svn44662-150400.20.3.1 * texlive-alphalph-doc-2021.189.2.6svn53087-150400.20.3.1 * texlive-algorithmicx-doc-2021.189.svn15878-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-abnt-doc-2021.189.svn55471-150400.20.3.1 * texlive-HA-prosper-doc-2021.189.4.21svn15878-150400.20.3.1 * texlive-amstex-doc-2021.189.svn57972-150400.20.3.1 * texlive-abbr-doc-2021.189.svn15878-150400.20.3.1 * texlive-algobox-doc-2021.189.1.3svn52204-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-anonymouspro-doc-2021.189.2.2svn51631-150400.20.3.1 * texlive-adfathesis-doc-2021.189.2.42svn26048-150400.20.3.1 * texlive-ametsoc-doc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-afparticle-doc-2021.189.1.3svn35900-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-alertmessage-doc-2021.189.1.1svn38055-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-aobs-tikz-doc-2021.189.1.0svn32662-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-addlines-doc-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-akshar-doc-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-amscdx-doc-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-aastex-doc-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-active-conf-doc-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-answers-doc-2021.189.2.16svn35032-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * Desktop Applications Module 15-SP5 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * texlive-abnt-2021.189.svn55471-150400.20.3.1 * texlive-arabtex-2021.189.3.17svn25711-150400.20.3.1 * texlive-aramaic-serto-fonts-2021.189.1.0svn30042-150400.20.3.1 * texlive-acmconf-2021.189.1.3svn15878-150400.20.3.1 * texlive-arabtex-fonts-2021.189.3.17svn25711-150400.20.3.1 * texlive-afm2pl-2021.189.svn54074-150400.20.3.1 * texlive-algpseudocodex-2021.189.1.0svn56125-150400.20.3.1 * texlive-aastex-2021.189.6.3.1svn58057-150400.20.3.1 * texlive-ae-2021.189.1.4svn15878-150400.20.3.1 * texlive-amiweb2c-guide-2021.189.1.0svn56878-150400.20.3.1 * texlive-antiqua-2021.189.001.003svn24266-150400.20.3.1 * texlive-a5comb-2021.189.4svn17020-150400.20.3.1 * texlive-amsthdoc-it-2021.189.svn45662-150400.20.3.1 * texlive-acronym-2021.189.1.47svn54758-150400.20.3.1 * texlive-amiri-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abntex2-2021.189.1.9.7svn49248-150400.20.3.1 * texlive-amsfonts-fonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-SIstyle-2021.189.2.3asvn54080-150400.20.3.1 * texlive-apxproof-2021.189.1.2.1svn56673-150400.20.3.1 * texlive-academicons-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-acmart-2021.189.1.75svn56946-150400.20.3.1 * texlive-amiri-fonts-2021.189.0.0.113svn55403-150400.20.3.1 * texlive-abraces-2021.189.2.0svn58761-150400.20.3.1 * texlive-archaic-2021.189.svn38005-150400.20.3.1 * texlive-abbr-2021.189.svn15878-150400.20.3.1 * texlive-adobemapping-2021.189.svn51787-150400.20.3.1 * texlive-anonymouspro-2021.189.2.2svn51631-150400.20.3.1 * texlive-ESIEEcv-2021.189.svn15878-150400.20.3.1 * texlive-accfonts-2021.189.0.0.25svn18835-150400.20.3.1 * texlive-acroterm-2021.189.0.0.1svn20498-150400.20.3.1 * texlive-ajl-2021.189.svn34016-150400.20.3.1 * texlive-afparticle-2021.189.1.3svn35900-150400.20.3.1 * texlive-amscdx-2021.189.2.2xsvn51532-150400.20.3.1 * texlive-almfixed-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-antt-fonts-2021.189.2.08svn18651-150400.20.3.1 * texlive-antomega-2021.189.0.0.8svn21933-150400.20.3.1 * texlive-algolrevived-2021.189.1.052svn56864-150400.20.3.1 * texlive-akshar-2021.189.0.0.2svn56277-150400.20.3.1 * texlive-GS1-2021.189.22svn44822-150400.20.3.1 * texlive-accanthis-fonts-2021.189.svn32089-150400.20.3.1 * texlive-algxpar-2021.189.0.0.91svn56006-150400.20.3.1 * texlive-archivo-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-adjmulticol-2021.189.1.2svn54157-150400.20.3.1 * texlive-alpha-persian-2021.189.1.3svn50316-150400.20.3.1 * texlive-answers-2021.189.2.16svn35032-150400.20.3.1 * texlive-anonymouspro-fonts-2021.189.2.2svn51631-150400.20.3.1 * texlive-aeguill-2021.189.svn15878-150400.20.3.1 * texlive-altfont-2021.189.1.1svn15878-150400.20.3.1 * texlive-apptools-2021.189.1.0svn28400-150400.20.3.1 * texlive-amsrefs-2021.189.2.14svn30646-150400.20.3.1 * texlive-arabxetex-2021.189.1.2.1svn38299-150400.20.3.1 * texlive-MemoirChapStyles-2021.189.1.7esvn25918-150400.20.3.1 * texlive-aguplus-2021.189.1.6bsvn17156-150400.20.3.1 * texlive-adhocfilelist-2021.189.svn29349-150400.20.3.1 * texlive-algorithm2e-2021.189.5.2svn44846-150400.20.3.1 * texlive-algorithms-2021.189.0.0.1svn42428-150400.20.3.1 * texlive-appendixnumberbeamer-2021.189.1.2svn46317-150400.20.3.1 * texlive-amscls-doc-2021.189.svn46110-150400.20.3.1 * texlive-active-conf-2021.189.0.0.3asvn15878-150400.20.3.1 * texlive-aligned-overset-2021.189.0.0.1.0svn47290-150400.20.3.1 * texlive-alertmessage-2021.189.1.1svn38055-150400.20.3.1 * texlive-12many-2021.189.0.0.3svn15878-150400.20.3.1 * texlive-amsldoc-vn-2021.189.2.0svn21855-150400.20.3.1 * texlive-Type1fonts-2021.189.2.14svn19603-150400.20.3.1 * texlive-archaic-fonts-2021.189.svn38005-150400.20.3.1 * texlive-ametsoc-2021.189.4.3.2svn36030-150400.20.3.1 * texlive-allrunes-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-adforn-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-aesupp-2021.189.1svn58253-150400.20.3.1 * texlive-aesupp-fonts-2021.189.1svn58253-150400.20.3.1 * texlive-amsmath-2021.189.svn56514-150400.20.3.1 * texlive-annee-scolaire-2021.189.1.6svn55988-150400.20.3.1 * texlive-alkalami-2021.189.1.000svn44497-150400.20.3.1 * texlive-apalike2-2021.189.svn54080-150400.20.3.1 * texlive-a0poster-2021.189.1.22bsvn54071-150400.20.3.1 * texlive-algolrevived-fonts-2021.189.1.052svn56864-150400.20.3.1 * texlive-alegreya-2021.189.svn54512-150400.20.3.1 * texlive-accents-2021.189.1.4svn51497-150400.20.3.1 * texlive-SIunits-2021.189.1.36svn15878-150400.20.3.1 * texlive-alfaslabone-fonts-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-amstex-2021.189.svn57972-150400.20.3.1 * texlive-2up-2021.189.1.3asvn55076-150400.20.3.1 * texlive-abstract-2021.189.1.2asvn15878-150400.20.3.1 * texlive-amsmath-it-2021.189.svn22930-150400.20.3.1 * texlive-arabi-fonts-2021.189.1.1svn44662-150400.20.3.1 * texlive-arabi-2021.189.1.1svn44662-150400.20.3.1 * texlive-achemso-2021.189.3.13csvn57479-150400.20.3.1 * texlive-arabicfront-2021.189.1.1svn51474-150400.20.3.1 * texlive-archivo-fonts-2021.189.0.0.0.2svn57283-150400.20.3.1 * texlive-accsupp-2021.189.0.0.6svn53052-150400.20.3.1 * texlive-abstyles-2021.189.svn15878-150400.20.3.1 * texlive-actuarialsymbol-2021.189.1.1svn54080-150400.20.3.1 * texlive-antiqua-fonts-2021.189.001.003svn24266-150400.20.3.1 * texlive-arabi-add-2021.189.1.0svn37709-150400.20.3.1 * texlive-alegreya-fonts-2021.189.svn54512-150400.20.3.1 * texlive-accanthis-2021.189.svn32089-150400.20.3.1 * texlive-adforn-fonts-2021.189.1.1bsvn54512-150400.20.3.1 * texlive-arev-fonts-2021.189.svn15878-150400.20.3.1 * texlive-apa-2021.189.1.3.4svn54080-150400.20.3.1 * texlive-accessibility-2021.189.2.0.3svn55777-150400.20.3.1 * texlive-anysize-2021.189.svn15878-150400.20.3.1 * texlive-adfsymbols-fonts-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-aobs-tikz-2021.189.1.0svn32662-150400.20.3.1 * texlive-anyfontsize-2021.189.svn17050-150400.20.3.1 * texlive-advdate-2021.189.svn20538-150400.20.3.1 * texlive-apa7-2021.189.2.10svn58121-150400.20.3.1 * texlive-anufinalexam-2021.189.svn26053-150400.20.3.1 * texlive-animate-2021.189.svn56583-150400.20.3.1 * texlive-allrunes-fonts-2021.189.2.1.1svn42221-150400.20.3.1 * texlive-akktex-2021.189.0.0.3.2svn26055-150400.20.3.1 * texlive-apacite-2021.189.6.03svn54080-150400.20.3.1 * texlive-aleph-2021.189.svn57972-150400.20.3.1 * texlive-Asana-Math-fonts-2021.189.0.000.958svn50999-150400.20.3.1 * texlive-adtrees-2021.189.1.1svn51618-150400.20.3.1 * texlive-arimo-2021.189.svn42880-150400.20.3.1 * texlive-aramaic-serto-2021.189.1.0svn30042-150400.20.3.1 * texlive-alkalami-fonts-2021.189.1.000svn44497-150400.20.3.1 * texlive-anonchap-2021.189.1.1asvn17049-150400.20.3.1 * texlive-adigraph-2021.189.1.7.1svn49862-150400.20.3.1 * texlive-archaeologie-2021.189.2.4.5svn57090-150400.20.3.1 * texlive-academicons-fonts-2021.189.1.9.0svn56119-150400.20.3.1 * texlive-alnumsec-2021.189.0.0.03svn15878-150400.20.3.1 * texlive-albatross-2021.189.0.0.3.0svn57416-150400.20.3.1 * texlive-antt-2021.189.2.08svn18651-150400.20.3.1 * texlive-aiaa-2021.189.3.6svn15878-150400.20.3.1 * texlive-Tabbing-2021.189.svn17022-150400.20.3.1 * texlive-apa6e-2021.189.0.0.3svn23350-150400.20.3.1 * texlive-aichej-2021.189.svn15878-150400.20.3.1 * texlive-apalike-german-2021.189.svn54080-150400.20.3.1 * texlive-apnum-2021.189.1.7svn47510-150400.20.3.1 * texlive-arev-2021.189.svn15878-150400.20.3.1 * texlive-a2ping-2021.189.2.84psvn52964-150400.20.3.1 * texlive-IEEEtran-2021.189.1.8bsvn51065-150400.20.3.1 * texlive-acro-2021.189.3.5svn57447-150400.20.3.1 * texlive-aalok-2021.189.0.0.2svn57728-150400.20.3.1 * texlive-actuarialangle-2021.189.2.1svn51376-150400.20.3.1 * texlive-IEEEconf-2021.189.1.4svn15878-150400.20.3.1 * texlive-amslatex-primer-2021.189.2.3svn28980-150400.20.3.1 * texlive-arcs-2021.189.1svn15878-150400.20.3.1 * texlive-adjustbox-2021.189.1.3svn56291-150400.20.3.1 * texlive-amsldoc-it-2021.189.svn45662-150400.20.3.1 * texlive-apprendre-a-programmer-en-tex-2021.189.svn57179-150400.20.3.1 * texlive-akletter-2021.189.1.5isvn15878-150400.20.3.1 * texlive-amscls-2021.189.2.20.6svn55378-150400.20.3.1 * texlive-amsaddr-2021.189.1.1svn29630-150400.20.3.1 * texlive-afthesis-2021.189.2.7svn15878-150400.20.3.1 * texlive-HA-prosper-2021.189.4.21svn15878-150400.20.3.1 * texlive-anonymous-acm-2021.189.1.0svn55121-150400.20.3.1 * texlive-almendra-2021.189.svn56035-150400.20.3.1 * texlive-apa6-2021.189.2.34svn53406-150400.20.3.1 * texlive-alg-2021.189.svn15878-150400.20.3.1 * texlive-alfaslabone-2021.189.0.0.0.1svn57452-150400.20.3.1 * texlive-adfathesis-2021.189.2.42svn26048-150400.20.3.1 * texlive-abc-2021.189.2.0bsvn41157-150400.20.3.1 * texlive-armtex-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-addliga-2021.189.1.0svn50912-150400.20.3.1 * texlive-addlines-2021.189.0.0.3svn49326-150400.20.3.1 * texlive-almendra-fonts-2021.189.svn56035-150400.20.3.1 * texlive-almfixed-fonts-2021.189.0.0.92svn35065-150400.20.3.1 * texlive-appendix-2021.189.1.2csvn53718-150400.20.3.1 * texlive-antanilipsum-2021.189.0.0.8.1svn55250-150400.20.3.1 * texlive-adrconv-2021.189.1.4svn46817-150400.20.3.1 * texlive-adfsymbols-2021.189.1.2bsvn54512-150400.20.3.1 * texlive-algorithmicx-2021.189.svn15878-150400.20.3.1 * texlive-apprends-latex-2021.189.4.02svn19306-150400.20.3.1 * texlive-addfont-2021.189.1.1svn58559-150400.20.3.1 * texlive-aomart-2021.189.1.24svn56102-150400.20.3.1 * texlive-a4wide-2021.189.svn20943-150400.20.3.1 * texlive-arabluatex-2021.189.1.20svn54512-150400.20.3.1 * texlive-aaai-named-2021.189.svn52470-150400.20.3.1 * texlive-algobox-2021.189.1.3svn52204-150400.20.3.1 * texlive-alphalph-2021.189.2.6svn53087-150400.20.3.1 * texlive-arimo-fonts-2021.189.svn42880-150400.20.3.1 * texlive-arara-2021.189.6.1.0svn58764-150400.20.3.1 * texlive-armtex-fonts-2021.189.3.0_beta3svn33894-150400.20.3.1 * texlive-annotate-2021.189.svn52824-150400.20.3.1 * texlive-amsfonts-2021.189.3.04svn29208-150400.20.3.1 * texlive-Asana-Math-2021.189.0.000.958svn50999-150400.20.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:19 -0000 Subject: SUSE-RU-2024:0630-1: moderate: Recommended update for cloud-netconfig Message-ID: <170903701974.26348.14889116797148864515@smelt2.prg2.suse.org> # Recommended update for cloud-netconfig Announcement ID: SUSE-RU-2024:0630-1 Rating: moderate References: * bsc#1218069 * bsc#1219007 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for cloud-netconfig fixes the following issues: * Drop cloud-netconfig-nm sub package and include NM dispatcher script in main packages (bsc#1219007) * Drop package dependency on sysconfig-netconfig * Improve log level handling * Support IPv6 IMDS endpoint in EC2 (bsc#1218069) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-630=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-630=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-630=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-630=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-630=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2024-630=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2024-630=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-630=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-630=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-630=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-630=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-630=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * Public Cloud Module 15-SP2 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * Public Cloud Module 15-SP3 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * Public Cloud Module 15-SP4 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * Public Cloud Module 15-SP5 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * openSUSE Leap Micro 5.3 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * openSUSE Leap Micro 5.4 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 * openSUSE Leap 15.5 (noarch) * cloud-netconfig-azure-1.10-150000.25.14.1 * cloud-netconfig-gce-1.10-150000.25.14.1 * cloud-netconfig-ec2-1.10-150000.25.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218069 * https://bugzilla.suse.com/show_bug.cgi?id=1219007 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:25 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:25 -0000 Subject: SUSE-SU-2023:3474-1: important: Maintenance update for SUSE Manager 4.2: Server, Proxy and Retail Branch Server Message-ID: <170903702525.26348.3000470799024383689@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.2: Server, Proxy and Retail Branch Server Announcement ID: SUSE-SU-2023:3474-1 Rating: important References: * bsc#1175823 * bsc#1208528 * bsc#1208577 * bsc#1209156 * bsc#1210103 * bsc#1210994 * bsc#1211100 * bsc#1211469 * bsc#1211650 * bsc#1211884 * bsc#1212032 * bsc#1212106 * bsc#1212416 * bsc#1212507 * bsc#1212589 * bsc#1212700 * bsc#1212943 * bsc#1213880 * bsc#1214187 * bsc#1214333 * jsc#MSQA-698 Cross-References: * CVE-2023-29409 CVSS scores: * CVE-2023-29409 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-29409 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.2 Module 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 * SUSE Manager Server 4.2 Module 4.2 An update that solves one vulnerability, contains one feature and has 19 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.2 ### Description: This update fixes the following issues: spacecmd: * Version 4.2.24-1 * Update translations spacewalk-backend: * Version 4.2.29-1 * Use a constant to get the product name in python code rather than reading rhn.conf (bsc#1212943) * Only show missing /root/.curlrc error with log_level = 5 (bsc#1212507) spacewalk-web: * Version 4.2.36-1 * Update translations * Fix VHM CPU and RAM display when 0 (bsc#1175823) * Fix parsing error when showing notification message details (bsc#1211469) How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Recommended update for SUSE Manager Server 4.2 ### Description: This update fixes the following issues: hub-xmlrpc-api: * Security fix: * CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880) * There are no direct source changes. The CVE on hub-xmlrpc-api is fixed rebuilding the sources with the patched Go version. spacecmd: * Version 4.2.24-1 * Update translations spacewalk-backend: * Version 4.2.29-1 * Use a constant to get the product name in python code rather than reading rhn.conf (bsc#1212943) * Only show missing /root/.curlrc error with log_level = 5 (bsc#1212507) spacewalk-java: * Version 4.2.55-1 * Set swap memory value if available * Set primary FQDN to hostname if none is set (bsc#1209156, bsc#1214333) * Version 4.2.54-1 * Consider venv-salt-minion package update as a Salt update to prevent backtraces on upgrading salt with itself (bsc#1211884) * Version 4.2.53-1 * Fix "more then one method candidate found" for API function (bsc#1211100) * Fixed a bug that caused the tab Autoinstallation to hide when clicking on Power Management Management/Operations on SSM -> Provisioning * Update copyright year (bsc#1212106) * Disable jinja processing for the roster file (bsc#1211650) * Version 4.2.52-1 * Update jetty-util to version 9.4.51 * Version 4.2.51-1 * Update version of Tomcat build dependencies spacewalk-reports: * Version 4.2.8-1 * Drop Python2 compatibility (bsc#1212589) spacewalk-setup: * Version 4.2.13-1 * Drop usage of salt.ext.six in embedded_diskspace_check spacewalk-utils: * Version 4.2.20-1 * Drop Python2 compatibility spacewalk-web: * Version 4.2.36-1 * Update translation * Fix VHM CPU and RAM display when 0 (bsc#1175823) * Fix parsing error when showing notification message details (bsc#1211469) susemanager: * Version 4.2.44-1 * Require LTSS channels for SUSE Linux Enterprise 15 SP1/SP2/SP3 and SUSE Manager Proxy 4.2 (bsc#1214187) * Version 4.2.43-1 * Add missing Salt 3006.0 dependencies to bootstrap repo definitions (bsc#1212700) * Make mgr-salt-ssh to properly fix HOME environment to avoid issues with gitfs (bsc#1210994) susemanager-doc-indexes: * Typo correction for Cobbler buildiso command in Client Configuration Guide * Replaced plain text with dedicated attribute for AutoYaST * Added a note about Oracle Unbreakable Linux Network mirroring requirements in Client Configuration Guide (bsc#1212032) * Added SUSE Linux Enterprise 15 SP5 and openSUSE Leap 15.5 as supported clients in the Client Configuration Guide * Fixed missing tables of content in the Reference Guide (bsc#1208577) * Fixed instruction for Single sign-on implementation example in the Administration Guide (bsc#1210103) * Removed reference to non-exitent files in Reference Guide (bsc#1208528) susemanager-docs_en: * Typo correction for Cobbler buildiso command in Client Configuration Guide * Replaced plain text with dedicated attribute for AutoYaST * Added a note about Oracle Unbreakable Linux Network mirroring requirements in Client Configuration Guide (bsc#1212032) * Added SUSE Linux Enterprise 15 SP5 and openSUSE Leap 15.5 as supported clients in the Client Configuration Guide * Fixed missing tables of content in the Reference Guide (bsc#1208577) * Fixed instruction for Single sign-on implementation example in the Administration Guide (bsc#1210103) * Removed reference to non-exitent files in Reference Guide (bsc#1208528) susemanager-schema: * Version 4.2.29-1 * Add schema directory for susemanager-schema-4.2.29 susemanager-sls: * Version 4.2.35-1 * Do not disable salt-minion on salt-ssh managed clients * Use venv-salt-minion instead of salt for docker states (bsc#1212416) How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2023-3474=1 * SUSE Manager Server 4.2 Module 4.2 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.2-2023-3474=1 ## Package List: * SUSE Manager Proxy 4.2 Module 4.2 (noarch) * spacewalk-backend-4.2.29-150300.4.44.5 * spacewalk-base-minimal-config-4.2.36-150300.3.47.5 * spacecmd-4.2.24-150300.4.42.3 * spacewalk-base-minimal-4.2.36-150300.3.47.5 * SUSE Manager Server 4.2 Module 4.2 (ppc64le s390x x86_64) * inter-server-sync-debuginfo-0.3.0-150300.8.36.1 * susemanager-4.2.44-150300.3.59.1 * hub-xmlrpc-api-0.7-150300.3.14.2 * inter-server-sync-0.3.0-150300.8.36.1 * susemanager-tools-4.2.44-150300.3.59.1 * SUSE Manager Server 4.2 Module 4.2 (noarch) * spacewalk-java-lib-4.2.55-150300.3.73.2 * spacewalk-backend-package-push-server-4.2.29-150300.4.44.5 * spacewalk-backend-xml-export-libs-4.2.29-150300.4.44.5 * spacewalk-base-minimal-4.2.36-150300.3.47.5 * spacewalk-utils-extras-4.2.20-150300.3.27.3 * spacewalk-setup-4.2.13-150300.3.21.3 * spacewalk-backend-iss-4.2.29-150300.4.44.5 * spacewalk-backend-xmlrpc-4.2.29-150300.4.44.5 * spacewalk-html-4.2.36-150300.3.47.5 * spacewalk-java-4.2.55-150300.3.73.2 * susemanager-doc-indexes-4.2-150300.12.48.5 * spacewalk-utils-4.2.20-150300.3.27.3 * spacewalk-backend-4.2.29-150300.4.44.5 * spacewalk-base-4.2.36-150300.3.47.5 * spacewalk-backend-tools-4.2.29-150300.4.44.5 * spacewalk-backend-sql-postgresql-4.2.29-150300.4.44.5 * susemanager-sls-4.2.35-150300.3.54.3 * spacecmd-4.2.24-150300.4.42.3 * spacewalk-java-config-4.2.55-150300.3.73.2 * susemanager-schema-4.2.29-150300.3.41.5 * spacewalk-backend-server-4.2.29-150300.4.44.5 * spacewalk-base-minimal-config-4.2.36-150300.3.47.5 * spacewalk-backend-sql-4.2.29-150300.4.44.5 * spacewalk-backend-applet-4.2.29-150300.4.44.5 * spacewalk-backend-config-files-4.2.29-150300.4.44.5 * susemanager-docs_en-pdf-4.2-150300.12.48.3 * susemanager-docs_en-4.2-150300.12.48.3 * spacewalk-java-postgresql-4.2.55-150300.3.73.2 * spacewalk-backend-config-files-tool-4.2.29-150300.4.44.5 * spacewalk-backend-app-4.2.29-150300.4.44.5 * spacewalk-reports-4.2.8-150300.3.12.3 * spacewalk-backend-iss-export-4.2.29-150300.4.44.5 * uyuni-config-modules-4.2.35-150300.3.54.3 * spacewalk-taskomatic-4.2.55-150300.3.73.2 * spacewalk-backend-config-files-common-4.2.29-150300.4.44.5 ## References: * https://www.suse.com/security/cve/CVE-2023-29409.html * https://bugzilla.suse.com/show_bug.cgi?id=1175823 * https://bugzilla.suse.com/show_bug.cgi?id=1208528 * https://bugzilla.suse.com/show_bug.cgi?id=1208577 * https://bugzilla.suse.com/show_bug.cgi?id=1209156 * https://bugzilla.suse.com/show_bug.cgi?id=1210103 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1211100 * https://bugzilla.suse.com/show_bug.cgi?id=1211469 * https://bugzilla.suse.com/show_bug.cgi?id=1211650 * https://bugzilla.suse.com/show_bug.cgi?id=1211884 * https://bugzilla.suse.com/show_bug.cgi?id=1212032 * https://bugzilla.suse.com/show_bug.cgi?id=1212106 * https://bugzilla.suse.com/show_bug.cgi?id=1212416 * https://bugzilla.suse.com/show_bug.cgi?id=1212507 * https://bugzilla.suse.com/show_bug.cgi?id=1212589 * https://bugzilla.suse.com/show_bug.cgi?id=1212700 * https://bugzilla.suse.com/show_bug.cgi?id=1212943 * https://bugzilla.suse.com/show_bug.cgi?id=1213880 * https://bugzilla.suse.com/show_bug.cgi?id=1214187 * https://bugzilla.suse.com/show_bug.cgi?id=1214333 * https://jira.suse.com/browse/MSQA-698 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:27 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:27 -0000 Subject: SUSE-SU-2023:2937-1: important: Security update for python311 Message-ID: <170903702771.26348.3672029344746756050@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2023:2937-1 Rating: important References: * bsc#1203750 * bsc#1208471 Cross-References: * CVE-2007-4559 * CVE-2023-24329 CVSS scores: * CVE-2007-4559 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2023-24329 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L * CVE-2023-24329 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP4 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: python was updated to version 3.11.4: * CVE-2023-24329: Fixed blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471). * CVE-2007-4559: Fixed python tarfile module directory traversal (bsc#1203750). * Fixed a security in flaw in uu.decode() that could allow for directory traversal based on the input if no out_file was specified. * Do not expose the local on-disk location in directory indexes produced by http.client.SimpleHTTPRequestHandler. Bugfixes: * trace. **main** now uses io.open_code() for files to be executed instead of raw open(). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-2937=1 openSUSE-SLE-15.4-2023-2937=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2937=1 * Python 3 Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Python3-15-SP4-2023-2937=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2023-2937=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpython3_11-1_0-debuginfo-3.11.4-150400.9.15.3 * python311-3.11.4-150400.9.15.1 * python311-base-3.11.4-150400.9.15.3 * python311-curses-3.11.4-150400.9.15.1 * python311-devel-3.11.4-150400.9.15.3 * python311-testsuite-debuginfo-3.11.4-150400.9.15.3 * python311-doc-3.11.4-150400.9.15.2 * python311-testsuite-3.11.4-150400.9.15.3 * python311-doc-devhelp-3.11.4-150400.9.15.2 * python311-debuginfo-3.11.4-150400.9.15.1 * python311-dbm-3.11.4-150400.9.15.1 * libpython3_11-1_0-3.11.4-150400.9.15.3 * python311-core-debugsource-3.11.4-150400.9.15.3 * python311-tk-3.11.4-150400.9.15.1 * python311-idle-3.11.4-150400.9.15.1 * python311-tk-debuginfo-3.11.4-150400.9.15.1 * python311-debugsource-3.11.4-150400.9.15.1 * python311-dbm-debuginfo-3.11.4-150400.9.15.1 * python311-base-debuginfo-3.11.4-150400.9.15.3 * python311-tools-3.11.4-150400.9.15.3 * python311-curses-debuginfo-3.11.4-150400.9.15.1 * openSUSE Leap 15.4 (x86_64) * python311-base-32bit-debuginfo-3.11.4-150400.9.15.3 * libpython3_11-1_0-32bit-debuginfo-3.11.4-150400.9.15.3 * python311-base-32bit-3.11.4-150400.9.15.3 * python311-32bit-3.11.4-150400.9.15.1 * python311-32bit-debuginfo-3.11.4-150400.9.15.1 * libpython3_11-1_0-32bit-3.11.4-150400.9.15.3 * openSUSE Leap 15.4 (aarch64_ilp32) * python311-base-64bit-debuginfo-3.11.4-150400.9.15.3 * python311-64bit-3.11.4-150400.9.15.1 * python311-base-64bit-3.11.4-150400.9.15.3 * libpython3_11-1_0-64bit-3.11.4-150400.9.15.3 * python311-64bit-debuginfo-3.11.4-150400.9.15.1 * libpython3_11-1_0-64bit-debuginfo-3.11.4-150400.9.15.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libpython3_11-1_0-debuginfo-3.11.4-150400.9.15.3 * python311-3.11.4-150400.9.15.1 * python311-base-3.11.4-150400.9.15.3 * python311-curses-3.11.4-150400.9.15.1 * python311-devel-3.11.4-150400.9.15.3 * python311-testsuite-debuginfo-3.11.4-150400.9.15.3 * python311-doc-3.11.4-150400.9.15.2 * python311-testsuite-3.11.4-150400.9.15.3 * python311-doc-devhelp-3.11.4-150400.9.15.2 * python311-debuginfo-3.11.4-150400.9.15.1 * python311-dbm-3.11.4-150400.9.15.1 * libpython3_11-1_0-3.11.4-150400.9.15.3 * python311-core-debugsource-3.11.4-150400.9.15.3 * python311-tk-3.11.4-150400.9.15.1 * python311-idle-3.11.4-150400.9.15.1 * python311-tk-debuginfo-3.11.4-150400.9.15.1 * python311-debugsource-3.11.4-150400.9.15.1 * python311-base-debuginfo-3.11.4-150400.9.15.3 * python311-dbm-debuginfo-3.11.4-150400.9.15.1 * python311-tools-3.11.4-150400.9.15.3 * python311-curses-debuginfo-3.11.4-150400.9.15.1 * openSUSE Leap 15.5 (x86_64) * python311-base-32bit-debuginfo-3.11.4-150400.9.15.3 * libpython3_11-1_0-32bit-debuginfo-3.11.4-150400.9.15.3 * python311-base-32bit-3.11.4-150400.9.15.3 * python311-32bit-3.11.4-150400.9.15.1 * python311-32bit-debuginfo-3.11.4-150400.9.15.1 * libpython3_11-1_0-32bit-3.11.4-150400.9.15.3 * Python 3 Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-tk-3.11.4-150400.9.15.1 * python311-doc-3.11.4-150400.9.15.2 * python311-idle-3.11.4-150400.9.15.1 * python311-tk-debuginfo-3.11.4-150400.9.15.1 * python311-dbm-3.11.4-150400.9.15.1 * libpython3_11-1_0-debuginfo-3.11.4-150400.9.15.3 * python311-3.11.4-150400.9.15.1 * python311-debugsource-3.11.4-150400.9.15.1 * python311-base-3.11.4-150400.9.15.3 * libpython3_11-1_0-3.11.4-150400.9.15.3 * python311-base-debuginfo-3.11.4-150400.9.15.3 * python311-dbm-debuginfo-3.11.4-150400.9.15.1 * python311-curses-3.11.4-150400.9.15.1 * python311-debuginfo-3.11.4-150400.9.15.1 * python311-tools-3.11.4-150400.9.15.3 * python311-doc-devhelp-3.11.4-150400.9.15.2 * python311-devel-3.11.4-150400.9.15.3 * python311-curses-debuginfo-3.11.4-150400.9.15.1 * python311-core-debugsource-3.11.4-150400.9.15.3 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-tk-3.11.4-150400.9.15.1 * python311-doc-3.11.4-150400.9.15.2 * python311-idle-3.11.4-150400.9.15.1 * python311-tk-debuginfo-3.11.4-150400.9.15.1 * python311-dbm-3.11.4-150400.9.15.1 * libpython3_11-1_0-debuginfo-3.11.4-150400.9.15.3 * python311-3.11.4-150400.9.15.1 * python311-debugsource-3.11.4-150400.9.15.1 * python311-base-3.11.4-150400.9.15.3 * libpython3_11-1_0-3.11.4-150400.9.15.3 * python311-base-debuginfo-3.11.4-150400.9.15.3 * python311-dbm-debuginfo-3.11.4-150400.9.15.1 * python311-curses-3.11.4-150400.9.15.1 * python311-debuginfo-3.11.4-150400.9.15.1 * python311-tools-3.11.4-150400.9.15.3 * python311-doc-devhelp-3.11.4-150400.9.15.2 * python311-devel-3.11.4-150400.9.15.3 * python311-curses-debuginfo-3.11.4-150400.9.15.1 * python311-core-debugsource-3.11.4-150400.9.15.3 ## References: * https://www.suse.com/security/cve/CVE-2007-4559.html * https://www.suse.com/security/cve/CVE-2023-24329.html * https://bugzilla.suse.com/show_bug.cgi?id=1203750 * https://bugzilla.suse.com/show_bug.cgi?id=1208471 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:31 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:31 -0000 Subject: SUSE-SU-2023:2929-1: important: Security update for samba Message-ID: <170903703162.26348.12026663458328931687@smelt2.prg2.suse.org> # Security update for samba Announcement ID: SUSE-SU-2023:2929-1 Rating: important References: * bsc#1212375 * bsc#1213170 * bsc#1213171 * bsc#1213172 * bsc#1213173 * bsc#1213174 * bsc#1213384 * bsc#1213386 Cross-References: * CVE-2020-25720 * CVE-2022-2127 * CVE-2023-3347 * CVE-2023-34966 * CVE-2023-34967 * CVE-2023-34968 CVSS scores: * CVE-2022-2127 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2127 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3347 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2023-3347 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2023-34966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34967 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-34967 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-34968 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-34968 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves six vulnerabilities and has two security fixes can now be installed. ## Description: This update for samba fixes the following issues: samba was updated to version 4.17.9: * CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174). * CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173). * CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172). * CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171). * CVE-2023-3347: Fixed issue where SMB2 packet signing not enforced (bsc#1213170). * CVE-2020-25720: Fixed issue where creating child permission allowed full write to all attributes (bsc#1213386). Bugfixes: * Fixed trust relationship failure (bsc#1213384). * Backported --pidl-developer fixes. * Fixed smbd_scavenger crash when service smbd is stopped. * Fixed issue where vfs_fruit might cause a failing open for delete. * Fixed named crashes on DLZ zone update. * Fixed issue where winbind recurses into itself via rpcd_lsad. * Fixed cli_list looping 100% CPU against pre-lanman2 servers. * Fixed smbclient leaks fds with showacls. * Fixed aes256 smb3 encryption algorithms not allowed in smb3_sid_parse(). * Fixed winbindd getting stuck on NT_STATUS_RPC_SEC_PKG_ERROR. * Fixed smbget memory leak if failed to download files recursively. * Fixed log flood: smbd_calculate_access_mask_fsp: Access denied: message level should be lower. * Fixed floating point exception (FPE) via cli_pull_send at source3/libsmb/clireadwrite.c. * Fixed test_tstream_more_tcp_user_timeout_spin fails intermittently on Rackspace GitLab runners. * Reduce flapping of ridalloc test. * Fixed unreliable large_ldap test. * Fixed filename parser not checking veto files smb.conf parameter. * Fixed mdssvc may crash when initializing. * Fixed broken large directory optimization for non-lcomp path elements * Fixed streams_depot failing to create streams. * Fixed shadow_copy2 and streams_depot issues. * Fixed wbinfo -u fails on ad dc with >1000 users. * Fixed winbindd idmap child contacting the domain controller without a need. * Fixed idmap_autorid may fail to map sids of trusted domains for the first time. * Fixed idmap_hash doesn't use ID_TYPE_BOTH for reverse mappings. * Fixed net ads search -P doesn't work against servers in other domains. * Fixed DS ACEs might be inherited to unrelated object classes. * Fixed temporary smbXsrv_tcon_global.tdb can't be parsed. * Fixed setting veto files = /.*/ breaking listing directories (bsc#1212375). * Fixed dsgetdcname assuming local system uses IPv4. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2023-2929=1 openSUSE-SLE-15.5-2023-2929=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2929=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2023-2929=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * samba-ldb-ldap-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy-python3-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-python3-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * ctdb-pcp-pmda-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-test-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-ldb-ldap-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-debugsource-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * ctdb-pcp-pmda-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-test-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-gpupdate-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * ctdb-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * ctdb-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-tool-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * openSUSE Leap 15.5 (x86_64) * samba-client-libs-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-devel-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * openSUSE Leap 15.5 (noarch) * samba-doc-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * openSUSE Leap 15.5 (aarch64 x86_64) * samba-ceph-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-ceph-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * openSUSE Leap 15.5 (aarch64_ilp32) * samba-libs-python3-64bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-64bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-64bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-devel-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-64bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-64bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-64bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-64bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * samba-ldb-ldap-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy-python3-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-python3-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-ldb-ldap-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-debugsource-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy0-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-gpupdate-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * libsamba-policy-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-tool-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * Basesystem Module 15-SP5 (aarch64 x86_64) * samba-ceph-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-ceph-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * Basesystem Module 15-SP5 (x86_64) * samba-client-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-libs-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-winbind-libs-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-client-libs-32bit-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * samba-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * samba-debugsource-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * ctdb-debuginfo-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 * ctdb-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2020-25720.html * https://www.suse.com/security/cve/CVE-2022-2127.html * https://www.suse.com/security/cve/CVE-2023-3347.html * https://www.suse.com/security/cve/CVE-2023-34966.html * https://www.suse.com/security/cve/CVE-2023-34967.html * https://www.suse.com/security/cve/CVE-2023-34968.html * https://bugzilla.suse.com/show_bug.cgi?id=1212375 * https://bugzilla.suse.com/show_bug.cgi?id=1213170 * https://bugzilla.suse.com/show_bug.cgi?id=1213171 * https://bugzilla.suse.com/show_bug.cgi?id=1213172 * https://bugzilla.suse.com/show_bug.cgi?id=1213173 * https://bugzilla.suse.com/show_bug.cgi?id=1213174 * https://bugzilla.suse.com/show_bug.cgi?id=1213384 * https://bugzilla.suse.com/show_bug.cgi?id=1213386 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:34 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:34 -0000 Subject: SUSE-SU-2023:2930-1: important: Security update for samba Message-ID: <170903703438.26348.8337107962720354812@smelt2.prg2.suse.org> # Security update for samba Announcement ID: SUSE-SU-2023:2930-1 Rating: important References: * bsc#1213171 * bsc#1213172 * bsc#1213173 * bsc#1213174 * bsc#1213384 Cross-References: * CVE-2022-2127 * CVE-2023-34966 * CVE-2023-34967 * CVE-2023-34968 CVSS scores: * CVE-2022-2127 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2127 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-34967 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-34967 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-34968 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-34968 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * Basesystem Module 15-SP4 * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174). * CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173). * CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172). * CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171). Bugfixes: * Fixed trust relationship failure (bsc#1213384). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-2930=1 openSUSE-SLE-15.4-2023-2930=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2023-2930=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2023-2930=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-2930=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-2930=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-2930=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-2930=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2930=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2023-2930=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * samba-devel-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * ctdb-pcp-pmda-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-dsdb-modules-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy-python3-devel-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * ctdb-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-dsdb-modules-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy-devel-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-gpupdate-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * ctdb-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-python3-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ldb-ldap-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-test-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ldb-ldap-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * ctdb-pcp-pmda-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-tool-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-test-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-python3-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * openSUSE Leap 15.4 (x86_64) * libsamba-policy0-python3-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-devel-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * openSUSE Leap 15.4 (noarch) * samba-doc-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * openSUSE Leap 15.4 (aarch64 x86_64) * samba-ceph-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ceph-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * samba-winbind-libs-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-devel-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-64bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-64bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * samba-devel-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-dsdb-modules-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy-python3-devel-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-dsdb-modules-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy-devel-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-gpupdate-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-python3-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ldb-ldap-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ldb-ldap-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-tool-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-python3-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-python3-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * Basesystem Module 15-SP4 (aarch64 x86_64) * samba-ceph-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ceph-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * Basesystem Module 15-SP4 (x86_64) * samba-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-winbind-libs-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-client-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-devel-32bit-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ctdb-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debugsource-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * ctdb-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 * samba-debuginfo-4.15.13+git.663.9c654e06cdb-150400.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2127.html * https://www.suse.com/security/cve/CVE-2023-34966.html * https://www.suse.com/security/cve/CVE-2023-34967.html * https://www.suse.com/security/cve/CVE-2023-34968.html * https://bugzilla.suse.com/show_bug.cgi?id=1213171 * https://bugzilla.suse.com/show_bug.cgi?id=1213172 * https://bugzilla.suse.com/show_bug.cgi?id=1213173 * https://bugzilla.suse.com/show_bug.cgi?id=1213174 * https://bugzilla.suse.com/show_bug.cgi?id=1213384 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:35 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:35 -0000 Subject: SUSE-SU-2023:2941-1: moderate: Security update for poppler Message-ID: <170903703579.26348.8852066684661288119@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2023:2941-1 Rating: moderate References: * bsc#1199272 Cross-References: * CVE-2022-27337 CVSS scores: * CVE-2022-27337 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-27337 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2022-27337: Fixed a logic error in the Hints::Hints function which can cause denial of service (bsc#1199272). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2941=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-2941=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2941=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-2941=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-2941=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-2941=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-2941=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * openSUSE Leap 15.4 (x86_64) * libpoppler89-32bit-0.79.0-150200.3.11.1 * libpoppler89-32bit-debuginfo-0.79.0-150200.3.11.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * poppler-debugsource-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * poppler-debugsource-0.79.0-150200.3.11.1 * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * SUSE Manager Proxy 4.2 (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.11.1 * poppler-tools-0.79.0-150200.3.11.1 * libpoppler89-0.79.0-150200.3.11.1 * libpoppler-devel-0.79.0-150200.3.11.1 * libpoppler-cpp0-0.79.0-150200.3.11.1 * typelib-1_0-Poppler-0_18-0.79.0-150200.3.11.1 * libpoppler-glib-devel-0.79.0-150200.3.11.1 * libpoppler-glib8-0.79.0-150200.3.11.1 * poppler-debugsource-0.79.0-150200.3.11.1 * poppler-tools-debuginfo-0.79.0-150200.3.11.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.11.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2022-27337.html * https://bugzilla.suse.com/show_bug.cgi?id=1199272 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:30:37 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:30:37 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903703733.26348.2279805311581267656@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:33:38 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:33:38 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903721857.27170.13096696268304952828@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:34:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:34:14 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903725464.28257.5458968638180684017@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:36:40 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:36:40 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903740080.26348.3372414478240313336@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:39:42 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:39:42 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170903758235.27170.16123717018487958475@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:41:53 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:41:53 -0000 Subject: SUSE-SU-2023:3661-1: important: Security update for gcc12 Message-ID: <170903771332.29276.3778146592735948377@smelt2.prg2.suse.org> # Security update for gcc12 Announcement ID: SUSE-SU-2023:3661-1 Rating: important References: * bsc#1214052 Cross-References: * CVE-2023-4039 CVSS scores: * CVE-2023-4039 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4039 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * Basesystem Module 15-SP4 * Basesystem Module 15-SP5 * Development Tools Module 15-SP4 * Development Tools Module 15-SP5 * Legacy Module 15-SP4 * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE CaaS Platform 4.0 * SUSE Enterprise Storage 7 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP4 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for gcc12 fixes the following issues: * CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2023-3661=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2023-3661=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-3661=1 * SUSE Linux Enterprise Server 15 SP1 zypper in -t patch SUSE-SLE-INSTALLER-15-SP1-2023-3661=1 * SUSE Linux Enterprise Server 15 SP2 zypper in -t patch SUSE-SLE-INSTALLER-15-SP2-2023-3661=1 * SUSE Linux Enterprise Server 15 SP3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP3-2023-3661=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2023-3661=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3661=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-3661=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3661=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2023-3661=1 * Basesystem Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2023-3661=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3661=1 * Development Tools Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2023-3661=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2023-3661=1 * Legacy Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP4-2023-3661=1 * SUSE Package Hub 15 15-SP4 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-3661=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-3661=1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3661=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-3661=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-3661=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-3661=1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3661=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-3661=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-3661=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3661=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-3661=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-3661=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-3661=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-3661=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-3661=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-3661=1 * SUSE CaaS Platform 4.0 To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-3661=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3661=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-3661=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-ada-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-testresults-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libgo21-12.3.0+git1204-150000.1.16.1 * gcc12-go-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libada12-debuginfo-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-obj-c++-12.3.0+git1204-150000.1.16.1 * gcc12-objc-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgo21-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-ada-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libada12-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * gcc12-objc-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-obj-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * gcc12-go-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (x86_64) * libgo21-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgdruntime3-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libgdruntime3-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-ada-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-obj-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-d-32bit-12.3.0+git1204-150000.1.16.1 * libgo21-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-objc-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-go-32bit-12.3.0+git1204-150000.1.16.1 * libgphobos3-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * libgphobos3-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libada12-32bit-12.3.0+git1204-150000.1.16.1 * libada12-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (aarch64 s390x x86_64) * gcc12-d-debuginfo-12.3.0+git1204-150000.1.16.1 * libgdruntime3-debuginfo-12.3.0+git1204-150000.1.16.1 * libgphobos3-12.3.0+git1204-150000.1.16.1 * libgphobos3-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-d-12.3.0+git1204-150000.1.16.1 * libgdruntime3-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (s390x x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (ppc64le x86_64) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * openSUSE Leap 15.4 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP1 (aarch64 ppc64le s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP2 (aarch64 ppc64le s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 (aarch64 ppc64le s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Manager Proxy 4.3 (x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP4 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP4 (ppc64le x86_64) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP4 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP5 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP5 (ppc64le x86_64) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * Basesystem Module 15-SP5 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * Development Tools Module 15-SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * Development Tools Module 15-SP4 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * Development Tools Module 15-SP4 (x86_64) * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * gcc12-testresults-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * Development Tools Module 15-SP5 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * Development Tools Module 15-SP5 (x86_64) * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * Legacy Module 15-SP4 (s390x) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * SUSE Package Hub 15 15-SP4 (aarch64 ppc64le s390x x86_64) * gcc12-objc-12.3.0+git1204-150000.1.16.1 * gcc12-ada-debuginfo-12.3.0+git1204-150000.1.16.1 * libgo21-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-ada-12.3.0+git1204-150000.1.16.1 * libgo21-12.3.0+git1204-150000.1.16.1 * gcc12-go-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-obj-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libada12-12.3.0+git1204-150000.1.16.1 * libada12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-go-12.3.0+git1204-150000.1.16.1 * gcc12-obj-c++-12.3.0+git1204-150000.1.16.1 * gcc12-objc-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Package Hub 15 15-SP4 (aarch64 s390x x86_64) * gcc12-d-debuginfo-12.3.0+git1204-150000.1.16.1 * libgdruntime3-debuginfo-12.3.0+git1204-150000.1.16.1 * libgphobos3-12.3.0+git1204-150000.1.16.1 * libgphobos3-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-d-12.3.0+git1204-150000.1.16.1 * libgdruntime3-12.3.0+git1204-150000.1.16.1 * SUSE Package Hub 15 15-SP4 (x86_64) * gcc12-go-32bit-12.3.0+git1204-150000.1.16.1 * libgo21-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgdruntime3-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgphobos3-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgphobos3-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-ada-32bit-12.3.0+git1204-150000.1.16.1 * libada12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-obj-c++-32bit-12.3.0+git1204-150000.1.16.1 * libada12-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-objc-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-d-32bit-12.3.0+git1204-150000.1.16.1 * libgdruntime3-32bit-12.3.0+git1204-150000.1.16.1 * libgo21-32bit-12.3.0+git1204-150000.1.16.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libgo21-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-ada-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-ada-12.3.0+git1204-150000.1.16.1 * libgo21-12.3.0+git1204-150000.1.16.1 * gcc12-go-debuginfo-12.3.0+git1204-150000.1.16.1 * libada12-12.3.0+git1204-150000.1.16.1 * libada12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * gcc12-go-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-testresults-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (ppc64le x86_64) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (ppc64le) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (ppc64le x86_64) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (s390x x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Manager Proxy 4.2 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Manager Server 4.2 (ppc64le x86_64) * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Manager Server 4.2 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Enterprise Storage 7 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Enterprise Storage 7 (aarch64) * libhwasan0-12.3.0+git1204-150000.1.16.1 * libhwasan0-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE Enterprise Storage 7 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * SUSE CaaS Platform 4.0 (x86_64) * libgomp1-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-12.3.0+git1204-150000.1.16.1 * libquadmath0-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libtsan2-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 * gcc12-c++-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libgomp1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-12.3.0+git1204-150000.1.16.1 * gcc12-c++-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-12.3.0+git1204-150000.1.16.1 * libgomp1-12.3.0+git1204-150000.1.16.1 * liblsan0-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-12.3.0+git1204-150000.1.16.1 * libobjc4-12.3.0+git1204-150000.1.16.1 * libatomic1-32bit-12.3.0+git1204-150000.1.16.1 * libasan8-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 * libatomic1-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-12.3.0+git1204-150000.1.16.1 * gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * libobjc4-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 * libgfortran5-12.3.0+git1204-150000.1.16.1 * libstdc++6-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libitm1-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libquadmath0-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 * libstdc++6-locale-12.3.0+git1204-150000.1.16.1 * gcc12-PIE-12.3.0+git1204-150000.1.16.1 * libatomic1-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debugsource-12.3.0+git1204-150000.1.16.1 * cross-nvptx-gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * cpp12-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-12.3.0+git1204-150000.1.16.1 * libitm1-debuginfo-12.3.0+git1204-150000.1.16.1 * libobjc4-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-debuginfo-12.3.0+git1204-150000.1.16.1 * libubsan1-32bit-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 * libubsan1-12.3.0+git1204-150000.1.16.1 * libgomp1-debuginfo-12.3.0+git1204-150000.1.16.1 * gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 * liblsan0-12.3.0+git1204-150000.1.16.1 * gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 * gcc12-12.3.0+git1204-150000.1.16.1 * cpp12-12.3.0+git1204-150000.1.16.1 * libgfortran5-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * libasan8-debuginfo-12.3.0+git1204-150000.1.16.1 * libstdc++6-32bit-debuginfo-12.3.0+git1204-150000.1.16.1 * cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 * libasan8-12.3.0+git1204-150000.1.16.1 * gcc12-locale-12.3.0+git1204-150000.1.16.1 * libgfortran5-debuginfo-12.3.0+git1204-150000.1.16.1 * SUSE CaaS Platform 4.0 (noarch) * gcc12-info-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libstdc++6-12.3.0+git1204-150000.1.16.1 * libstdc++6-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-debuginfo-12.3.0+git1204-150000.1.16.1 * libgcc_s1-12.3.0+git1204-150000.1.16.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4039.html * https://bugzilla.suse.com/show_bug.cgi?id=1214052 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:44:06 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:44:06 -0000 Subject: SUSE-SU-2023:3662-1: important: Security update for gcc7 Message-ID: <170903784611.29562.4565960994783577822@smelt2.prg2.suse.org> # Security update for gcc7 Announcement ID: SUSE-SU-2023:3662-1 Rating: important References: * bsc#1071995 * bsc#1084842 * bsc#1114592 * bsc#1124644 * bsc#1128794 * bsc#1129389 * bsc#1131264 * bsc#1141897 * bsc#1142649 * bsc#1146475 * bsc#1148517 * bsc#1149145 * bsc#1150164 * bsc#1160086 * bsc#1161913 * bsc#1167939 * bsc#1172798 * bsc#1178577 * bsc#1178614 * bsc#1178624 * bsc#1178675 * bsc#1181618 * bsc#1195517 * bsc#1196861 * bsc#1204505 * bsc#1205145 * bsc#1214052 * jsc#SLE-12209 * jsc#SLE-6738 Cross-References: * CVE-2019-14250 * CVE-2019-15847 * CVE-2020-13844 * CVE-2023-4039 CVSS scores: * CVE-2019-14250 ( SUSE ): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2019-14250 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-14250 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2019-15847 ( SUSE ): 6.2 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2019-15847 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2019-15847 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-13844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-13844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-4039 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4039 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * Toolchain Module 12 An update that solves four vulnerabilities, contains two features and has 23 security fixes can now be installed. ## Description: This update for gcc7 fixes the following issues: Security issues fixed: * CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052). * CVE-2019-15847: Fixed POWER9 DARN miscompilation. (bsc#1149145) * CVE-2019-14250: Includes fix for LTO linker plugin heap overflow. (bsc#1142649) Update to GCC 7.5.0 release. Other changes: * Fixed KASAN kernel compile. (bsc#1205145) * Fixed ICE with C++17 code. (bsc#1204505) * Fixed altivec.h redefining bool in C++ which makes bool unusable (bsc#1195517): * Adjust gnats idea of the target, fixing the build of gprbuild. [bsc#1196861] * Do not handle exceptions in std::thread (jsc#CAR-1182) * add -fpatchable-function-entry feature to gcc-7. * Fixed glibc namespace violation with getauxval. (bsc#1167939) * Backport aarch64 Straight Line Speculation mitigation [bsc#1172798, CVE-2020-13844] * Enable fortran for the nvptx offload compiler. * Update README.First-for.SuSE.packagers * Avoid assembler errors with AVX512 gather and scatter instructions when using -masm=intel. * Backport the aarch64 -moutline-atomics feature and accumulated fixes but not its default enabling. (jsc#SLE-12209, bsc#1167939) * Fixed memcpy miscompilation on aarch64. (bsc#1178624, bsc#1178577) * Fixed debug line info for try/catch. (bsc#1178614) * Fixed corruption of pass private ->aux via DF. (gcc#94148) * Fixed debug information issue with inlined functions and passed by reference arguments. [gcc#93888] * Fixed register allocation issue with exception handling code on s390x. (bsc#1161913) * Backport PR target/92692 to fix miscompilation of some atomic code on aarch64. (bsc#1150164) * Fixed miscompilation in vectorized code for s390x. (bsc#1160086) [gcc#92950] * Fixed miscompilation with thread-safe local static initialization. [gcc#85887] * Fixed debug info created for array definitions that complete an earlier declaration. [bsc#1146475] * Fixed vector shift miscompilation on s390. (bsc#1141897) * Add gcc7 -flive-patching patch. [bsc#1071995, fate#323487] * Strip -flto from $optflags. * Disables switch jump-tables when retpolines are used. (bsc#1131264, jsc#SLE-6738) * Fixed ICE compiling tensorflow on aarch64. (bsc#1129389) * Fixed for aarch64 FMA steering pass use-after-free. (bsc#1128794) * Fixed ICE compiling tensorflow. (bsc#1129389) * Fixed s390x FP load-and-test issue. (bsc#1124644) * Adjust gnat manual entries in the info directory. (bsc#1114592) * Fixed to no longer try linking -lieee with -mieee-fp. (bsc#1084842) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Toolchain Module 12 zypper in -t patch SUSE-SLE-Module-Toolchain-12-2023-3662=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3662=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3662=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-3662=1 ## Package List: * Toolchain Module 12 (aarch64 ppc64le s390x x86_64) * cpp7-7.5.0+r278197-13.1 * cpp7-debuginfo-7.5.0+r278197-13.1 * gcc7-locale-7.5.0+r278197-13.1 * gcc7-debugsource-7.5.0+r278197-13.1 * gcc7-c++-debuginfo-7.5.0+r278197-13.1 * gcc7-7.5.0+r278197-13.1 * libstdc++6-devel-gcc7-7.5.0+r278197-13.1 * gcc7-c++-7.5.0+r278197-13.1 * gcc7-fortran-debuginfo-7.5.0+r278197-13.1 * gcc7-debuginfo-7.5.0+r278197-13.1 * gcc7-fortran-7.5.0+r278197-13.1 * Toolchain Module 12 (noarch) * gcc7-info-7.5.0+r278197-13.1 * Toolchain Module 12 (s390x x86_64) * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-13.1 * gcc7-fortran-32bit-7.5.0+r278197-13.1 * gcc7-32bit-7.5.0+r278197-13.1 * gcc7-c++-32bit-7.5.0+r278197-13.1 * Toolchain Module 12 (x86_64) * gcc7-ada-32bit-7.5.0+r278197-13.1 * gcc7-ada-7.5.0+r278197-13.1 * libada7-debuginfo-7.5.0+r278197-13.1 * cross-nvptx-gcc7-7.5.0+r278197-13.1 * gcc7-ada-debuginfo-7.5.0+r278197-13.1 * libada7-32bit-debuginfo-7.5.0+r278197-13.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-13.1 * libada7-7.5.0+r278197-13.1 * libada7-32bit-7.5.0+r278197-13.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * libubsan0-debuginfo-7.5.0+r278197-13.1 * libubsan0-7.5.0+r278197-13.1 * gcc7-debugsource-7.5.0+r278197-13.1 * libasan4-debuginfo-7.5.0+r278197-13.1 * libgfortran4-7.5.0+r278197-13.1 * libgfortran4-debuginfo-7.5.0+r278197-13.1 * libasan4-7.5.0+r278197-13.1 * gcc7-debuginfo-7.5.0+r278197-13.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * libcilkrts5-32bit-7.5.0+r278197-13.1 * libcilkrts5-debuginfo-7.5.0+r278197-13.1 * libcilkrts5-7.5.0+r278197-13.1 * libubsan0-32bit-7.5.0+r278197-13.1 * libgfortran4-32bit-7.5.0+r278197-13.1 * libasan4-32bit-7.5.0+r278197-13.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * libubsan0-debuginfo-7.5.0+r278197-13.1 * libubsan0-7.5.0+r278197-13.1 * gcc7-debugsource-7.5.0+r278197-13.1 * libasan4-debuginfo-7.5.0+r278197-13.1 * libgfortran4-7.5.0+r278197-13.1 * libgfortran4-debuginfo-7.5.0+r278197-13.1 * libasan4-7.5.0+r278197-13.1 * gcc7-debuginfo-7.5.0+r278197-13.1 * SUSE Linux Enterprise Server 12 SP5 (s390x x86_64) * libubsan0-32bit-7.5.0+r278197-13.1 * libasan4-32bit-7.5.0+r278197-13.1 * libgfortran4-32bit-7.5.0+r278197-13.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * libcilkrts5-32bit-7.5.0+r278197-13.1 * libcilkrts5-7.5.0+r278197-13.1 * libcilkrts5-debuginfo-7.5.0+r278197-13.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * libubsan0-debuginfo-7.5.0+r278197-13.1 * libubsan0-7.5.0+r278197-13.1 * gcc7-debugsource-7.5.0+r278197-13.1 * libasan4-debuginfo-7.5.0+r278197-13.1 * libgfortran4-7.5.0+r278197-13.1 * libgfortran4-debuginfo-7.5.0+r278197-13.1 * libasan4-7.5.0+r278197-13.1 * gcc7-debuginfo-7.5.0+r278197-13.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * libcilkrts5-32bit-7.5.0+r278197-13.1 * libcilkrts5-debuginfo-7.5.0+r278197-13.1 * libcilkrts5-7.5.0+r278197-13.1 * libubsan0-32bit-7.5.0+r278197-13.1 * libgfortran4-32bit-7.5.0+r278197-13.1 * libasan4-32bit-7.5.0+r278197-13.1 ## References: * https://www.suse.com/security/cve/CVE-2019-14250.html * https://www.suse.com/security/cve/CVE-2019-15847.html * https://www.suse.com/security/cve/CVE-2020-13844.html * https://www.suse.com/security/cve/CVE-2023-4039.html * https://bugzilla.suse.com/show_bug.cgi?id=1071995 * https://bugzilla.suse.com/show_bug.cgi?id=1084842 * https://bugzilla.suse.com/show_bug.cgi?id=1114592 * https://bugzilla.suse.com/show_bug.cgi?id=1124644 * https://bugzilla.suse.com/show_bug.cgi?id=1128794 * https://bugzilla.suse.com/show_bug.cgi?id=1129389 * https://bugzilla.suse.com/show_bug.cgi?id=1131264 * https://bugzilla.suse.com/show_bug.cgi?id=1141897 * https://bugzilla.suse.com/show_bug.cgi?id=1142649 * https://bugzilla.suse.com/show_bug.cgi?id=1146475 * https://bugzilla.suse.com/show_bug.cgi?id=1148517 * https://bugzilla.suse.com/show_bug.cgi?id=1149145 * https://bugzilla.suse.com/show_bug.cgi?id=1150164 * https://bugzilla.suse.com/show_bug.cgi?id=1160086 * https://bugzilla.suse.com/show_bug.cgi?id=1161913 * https://bugzilla.suse.com/show_bug.cgi?id=1167939 * https://bugzilla.suse.com/show_bug.cgi?id=1172798 * https://bugzilla.suse.com/show_bug.cgi?id=1178577 * https://bugzilla.suse.com/show_bug.cgi?id=1178614 * https://bugzilla.suse.com/show_bug.cgi?id=1178624 * https://bugzilla.suse.com/show_bug.cgi?id=1178675 * https://bugzilla.suse.com/show_bug.cgi?id=1181618 * https://bugzilla.suse.com/show_bug.cgi?id=1195517 * https://bugzilla.suse.com/show_bug.cgi?id=1196861 * https://bugzilla.suse.com/show_bug.cgi?id=1204505 * https://bugzilla.suse.com/show_bug.cgi?id=1205145 * https://bugzilla.suse.com/show_bug.cgi?id=1214052 * https://jira.suse.com/browse/SLE-12209 * https://jira.suse.com/browse/SLE-6738 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:51:28 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:51:28 -0000 Subject: SUSE-SU-2023:1838-1: moderate: Security update for python-crcmod, python-cryptography, python-cryptography-vectors Message-ID: <170903828814.30145.1338334343698953356@smelt2.prg2.suse.org> # Security update for python-crcmod, python-cryptography, python-cryptography- vectors Announcement ID: SUSE-SU-2023:1838-1 Rating: moderate References: * bsc#1177083 * bsc#1181995 * jsc#ECO-3329 * jsc#PM-2475 * jsc#PM-2730 * jsc#SLE-18312 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP2 * Public Cloud Module 15-SP1 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.0 * SUSE Manager Proxy 4.1 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.0 * SUSE Manager Retail Branch Server 4.1 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.0 * SUSE Manager Server 4.1 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that contains four features and has two security fixes can now be installed. ## Description: This update for python-crcmod, python-cryptography, python-cryptography-vectors contains the following fixes: Changes in python-crcmod: * Include in SLE-15 (bsc#1177083, jsc#PM-2730, jsc#SLE-18312) * Include in SLE-15 (bsc#1181995, jsc#ECO-3329, jsc#PM-2475) * Cleanup spec file * Use fdupes * Do not bundle html doc * singlespec auto-conversion * Include in SLE 12 (FATE #316168) * Initial release Changes in python-cryptography: \- Update in SLE-15 (bsc#1177083, jsc#PM-2730, jsc#SLE-18312) * Refresh patches for new version * Using the Fernet class to symmetrically encrypt multi gigabyte values. (bsc#1182066, CVE-2020-36242) could result in an integer overflow and buffer overflow. * update to 2.9.2 * 2.9.2 - 2020-04-22 * Updated the macOS wheel to fix an issue where it would not run on macOS versions older than 10.15. * 2.9.1 - 2020-04-21 * Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1g. * 2.9 - 2020-04-02 * BACKWARDS INCOMPATIBLE: Support for Python 3.4 has been removed due to low usage and maintenance burden. * BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.0.1 has been removed. Users on older version of OpenSSL will need to upgrade. * BACKWARDS INCOMPATIBLE: Support for LibreSSL 2.6.x has been removed. * Removed support for calling public_bytes() with no arguments, as per our deprecation policy. You must now pass encoding and format. * BACKWARDS INCOMPATIBLE: Reversed the order in which rfc4514_string() returns the RDNs as required by RFC 4514. * Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1f. * Added support for parsing single_extensions in an OCSP response. * NameAttribute values can now be empty strings. Changes in python-cryptography-vectors: \- Update in SLE-15 (bsc#1177083, jsc#PM-2730, jsc#SLE-18312) * update to 2.9.2: * updated vectors for the cryptography 2.9.2 testing ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-1838=1 * Public Cloud Module 15-SP1 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2023-1838=1 * Public Cloud Module 15-SP2 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2023-1838=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2023-1838=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2023-1838=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python3-aliyun-python-sdk-address-purification-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-netana-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-ess-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-resourcemanager-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-eci-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-risk-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-status-3.7-150100.3.7.4 * python3-aliyun-python-sdk-iot-8.21.1-150100.3.7.5 * python3-aliyun-python-sdk-aligreen-console-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-imageaudit-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-ossadmin-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-videosearch-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-baas-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-hbr-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-arms4finance-2.0.2-150100.3.7.5 * python3-aliyun-python-sdk-foas-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-adb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-linkface-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-nls-cloud-meta-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-retailcloud-2.0.12-150100.3.7.4 * python3-aliyun-python-sdk-paistudio-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-rtc-1.2.5-150100.3.7.4 * python3-aliyun-python-sdk-live-3.9.5-150100.3.7.5 * python3-aliyun-python-sdk-ccs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-iqa-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudmarketing-2.7.16-150100.3.7.5 * python3-aliyun-python-sdk-pts-2.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ecs-4.23.9-150100.3.7.5 * python3-aliyun-python-sdk-ocr-1.0.9-150100.3.7.4 * python3-aliyun-python-sdk-domain-3.14.4-150100.3.7.5 * python3-aliyun-python-sdk-welfare-inner-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ots-4.0.1-150100.3.7.4 * python3-aliyun-python-sdk-sas-api-2.1.1-150100.3.7.4 * python3-aliyun-python-sdk-cms-7.0.18-150100.3.7.5 * python3-aliyun-python-sdk-cr-4.1.2-150100.3.7.5 * python3-aliyun-python-sdk-dbs-1.0.29-150100.3.7.5 * python3-aliyun-python-sdk-dypnsapi-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-cams-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-dataworks-public-3.2.6-150100.3.7.5 * python3-aliyun-python-sdk-faas-2.7.11-150100.3.7.5 * python3-aliyun-python-sdk-objectdet-1.0.10-150100.3.7.4 * python3-aliyun-python-sdk-goodstech-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-mopen-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-smc-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-xspace-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-dybaseapi-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-market-2.0.24-150100.3.7.5 * python3-aliyun-python-sdk-cusanalytic_sc_online-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-core-2.13.30-150100.3.7.5 * python3-aliyun-python-sdk-pvtz-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-workorder-3.0.0-150100.3.7.4 * python3-aliyun-python-sdk-tesladam-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-ram-3.2.0-150100.3.7.4 * python3-aliyun-python-sdk-facebody-1.2.15-150100.3.7.5 * python3-aliyun-python-sdk-vod-2.15.12-150100.3.7.4 * python3-aliyun-python-sdk-kms-2.14.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudphoto-1.1.19-150100.3.7.5 * python3-aliyun-python-sdk-snsuapi-1.7.1-150100.3.7.4 * python3-aliyun-python-sdk-companyreg-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-ocs-0.0.4-150100.3.7.4 * python3-aliyun-python-sdk-yundun-ds-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-teslastream-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nlp-automl-0.0.9-150100.3.7.5 * python3-aliyun-python-sdk-afs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-teslamaxcompute-1.5.5-150100.3.7.4 * python3-aliyun-python-sdk-imageenhan-1.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ccc-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-hiknoengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-alinlp-1.0.16-150100.3.7.5 * python3-aliyun-python-sdk-voicenavigator-1.1.1-150100.3.7.4 * python3-aliyun-python-sdk-opensearch-0.9.0-150100.3.7.4 * python3-aliyun-python-sdk-brinekingdom-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-openanalytics-open-2.0.2-150100.3.7.4 * python3-aliyun-python-sdk-cloudwf-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-das-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-dds-3.5.0-150100.3.7.5 * python3-aliyun-python-sdk-oms-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-imageseg-1.1.8-150100.3.7.5 * python3-aliyun-python-sdk-industry-brain-5.0.52-150100.3.7.5 * python3-aliyun-python-sdk-jarvis-public-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-vpc-3.0.12-150100.3.7.4 * python3-aliyun-python-sdk-mts-2.7.6-150100.3.7.5 * python3-aliyun-python-sdk-alimt-3.0.30-150100.3.7.5 * python3-aliyun-python-sdk-schedulerx2-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-dbfs-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-democenter-1.1.0-150100.3.7.5 * python3-aliyun-python-sdk-dyvmsapi-3.0.2-150100.3.7.5 * python3-aliyun-python-sdk-bss-0.0.4-150100.3.7.5 * python3-aliyun-python-sdk-onsmqtt-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-tag-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nas-3.10.0-150100.3.7.5 * python3-aliyun-python-sdk-r-kvstore-2.13.0-150100.3.7.4 * python3-aliyun-python-sdk-ros-3.6.0-150100.3.7.4 * python3-aliyun-python-sdk-petadata-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-saf-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-unimkt-1.0.24-150100.3.7.4 * python3-aliyun-python-sdk-lubancloud-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-ubsms-2.0.5-150100.3.7.4 * python3-aliyun-python-sdk-domain-intl-1.6.0-150100.3.7.5 * python3-aliyun-python-sdk-codeup-0.0.8-150100.3.7.5 * python3-aliyun-python-sdk-cloudauth-2.0.26-150100.3.7.5 * python3-aliyun-python-sdk-highddos-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-hsm-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-videoenhan-1.0.7-150100.3.7.4 * python3-aliyun-python-sdk-videorecog-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-visionai-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-quickbi-public-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-csb-1.2.9-150100.3.7.5 * python3-aliyun-python-sdk-multimediaai-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-alidns-2.6.20-150100.3.7.5 * python3-aliyun-python-sdk-hpc-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-airec-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-sae-1.5.0.0-150100.3.7.4 * python3-aliyun-python-sdk-actiontrail-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-cas-20180713_0114-150100.3.7.5 * python3-aliyun-python-sdk-httpdns-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cdn-3.6.1-150100.3.7.5 * python3-aliyun-python-sdk-gpdb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-eas-0.0.3-150100.3.7.5 * python3-aliyun-python-sdk-productcatalog-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-imagesearch-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-emr-3.3.2-150100.3.7.5 * python3-aliyun-python-sdk-ens-1.3.3-150100.3.7.5 * python3-aliyun-python-sdk-edas-3.15.2-150100.3.7.5 * python3-aliyun-python-sdk-ehpc-1.14.1-150100.3.7.5 * python3-aliyun-python-sdk-ons-3.1.6-150100.3.7.4 * python3-aliyun-python-sdk-crm-2.2.1-150100.3.7.5 * python3-aliyun-python-sdk-webplus-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-imm-1.23.0-150100.3.7.5 * python3-aliyun-python-sdk-dysmsapi-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-devops-rdc-1.9.0-150100.3.7.5 * python3-aliyun-python-sdk-imageprocess-1.0.10-150100.3.7.5 * python3-aliyun-python-sdk-clickhouse-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-bssopenapi-1.6.2-150100.3.7.5 * python3-aliyun-python-sdk-appmallsservice-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cloudgame-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-hbase-2.9.2-150100.3.7.5 * python3-aliyun-python-sdk-rdc-1.1-150100.3.7.4 * python3-aliyun-python-sdk-waf-openapi-1.1.4-150100.3.7.4 * python3-aliyun-python-sdk-ivpd-1.0.6.1-150100.3.7.5 * python3-aliyun-python-sdk-sts-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-aliyuncvc-1.0.10.2-150100.3.7.5 * python3-aliyun-python-sdk-cs-4.8.1-150100.3.7.5 * python3-aliyun-python-sdk-smartag-1.5.4-150100.3.7.4 * python3-aliyun-python-sdk-reid-1.1.8.5-150100.3.7.4 * python3-aliyun-python-sdk-trademark-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-viapiutils-1.0-150100.3.7.4 * python3-aliyun-python-sdk-linkwan-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-fnf-1.8.0-150100.3.7.5 * python3-aliyun-python-sdk-imagerecog-1.0.13-150100.3.7.5 * python3-aliyun-python-sdk-acms-open-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudapi-4.9.2-150100.3.7.5 * python3-aliyun-python-sdk-cloudesl-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-vcs-2.0.4-150100.3.7.4 * python3-aliyun-python-sdk-sas-1.1.3-150100.3.7.4 * python3-aliyun-python-sdk-imgsearch-1.1.6-150100.3.7.5 * python3-aliyun-python-sdk-visionai-poc-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-yundun-2.1.4-150100.3.7.4 * python3-aliyun-python-sdk-dcdn-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ivision-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-polardb-1.8.3-150100.3.7.4 * python3-aliyun-python-sdk-scdn-2.2.3-150100.3.7.4 * python3-aliyun-python-sdk-amqp-open-1.1.1-150100.3.5.5 * python3-aliyun-python-sdk-geoip-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-cspro-1.3.9-150100.3.7.5 * python3-aliyun-python-sdk-ft-5.6.7-150100.3.7.5 * python3-aliyun-python-sdk-vs-1.10.2-150100.3.7.4 * python3-aliyun-python-sdk-cassandra-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-hivisengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-aas-2.1.1-150100.3.5.5 * python3-aliyun-python-sdk-aegis-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-chatbot-1.2.1-150100.3.7.5 * python3-aliyun-python-sdk-arms-2.5.22-150100.3.7.5 * python3-aliyun-python-sdk-cbn-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-drds-20201028-150100.3.7.5 * python3-aliyun-python-sdk-elasticsearch-3.0.20-150100.3.7.5 * python3-aliyun-python-sdk-ledgerdb-0.7.0-150100.3.7.5 * python3-aliyun-python-sdk-push-3.13.6-150100.3.7.4 * python3-aliyun-python-sdk-videoseg-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-xtrace-0.2.2-150100.3.7.4 * python3-aliyun-python-sdk-dyplsapi-1.3.0-150100.3.7.5 * python3-aliyun-python-sdk-outboundbot-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-linkedmall-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-oos-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-jarvis-1.2.4-150100.3.7.5 * python3-aliyun-python-sdk-slb-3.3.3-150100.3.7.4 * python3-aliyun-python-sdk-dts-5.1.9-150100.3.7.5 * python3-aliyun-python-sdk-dms-enterprise-1.12.0-150100.3.7.5 * python3-aliyun-python-sdk-green-3.6.3-150100.3.7.5 * python3-aliyun-python-sdk-rds-2.5.8-150100.3.7.4 * python3-aliyun-python-sdk-gts-phd-1-150100.3.7.5 * python3-aliyun-python-sdk-jaq-2.0.7-150100.3.7.5 * python3-aliyun-python-sdk-uis-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-openanalytics-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-qualitycheck-3.0.9-150100.3.7.4 * python3-aliyun-python-sdk-sddp-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-acm-1.0.1-150100.3.7.5 * Public Cloud Module 15-SP1 (aarch64 ppc64le s390x x86_64) * python3-crcmod-1.7-150100.3.3.4 * python2-crcmod-1.7-150100.3.3.4 * Public Cloud Module 15-SP1 (noarch) * python3-aliyun-python-sdk-address-purification-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-netana-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-ess-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-resourcemanager-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-eci-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-polardbx-20201028-150100.3.3.4 * python3-aliyun-python-sdk-risk-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-status-3.7-150100.3.7.4 * python3-aliyun-python-sdk-iot-8.21.1-150100.3.7.5 * python3-aliyun-python-sdk-servicemesh-1.0.5-150100.3.3.4 * python3-aliyun-python-sdk-aligreen-console-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-imageaudit-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-ossadmin-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-videosearch-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ddoscoo-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-baas-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-hbr-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-cdrs-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-arms4finance-2.0.2-150100.3.7.5 * python3-aliyun-python-sdk-foas-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-adb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-linkface-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-nls-cloud-meta-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-retailcloud-2.0.12-150100.3.7.4 * python3-aliyun-python-sdk-paistudio-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-rtc-1.2.5-150100.3.7.4 * python3-aliyun-python-sdk-live-3.9.5-150100.3.7.5 * python3-aliyun-python-sdk-ccs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-iqa-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudmarketing-2.7.16-150100.3.7.5 * python3-oss2-2.14.0-150100.3.3.4 * python3-aliyun-python-sdk-pts-2.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ecs-4.23.9-150100.3.7.5 * python3-aliyun-python-sdk-ocr-1.0.9-150100.3.7.4 * python3-aliyun-python-sdk-domain-3.14.4-150100.3.7.5 * python3-aliyun-python-sdk-welfare-inner-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ots-4.0.1-150100.3.7.4 * python3-aliyun-python-sdk-sas-api-2.1.1-150100.3.7.4 * python3-aliyun-python-sdk-cms-7.0.18-150100.3.7.5 * python3-aliyun-python-sdk-cr-4.1.2-150100.3.7.5 * python3-aliyun-python-sdk-dbs-1.0.29-150100.3.7.5 * python3-aliyun-python-sdk-dypnsapi-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-cams-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-dataworks-public-3.2.6-150100.3.7.5 * python3-aliyun-python-sdk-faas-2.7.11-150100.3.7.5 * python3-aliyun-python-sdk-objectdet-1.0.10-150100.3.7.4 * python3-aliyun-python-sdk-goodstech-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-mopen-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-smc-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-xspace-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-dybaseapi-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-market-2.0.24-150100.3.7.5 * python3-aliyun-python-sdk-cusanalytic_sc_online-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-core-2.13.30-150100.3.7.5 * python3-aliyun-python-sdk-pvtz-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-workorder-3.0.0-150100.3.7.4 * python3-aliyun-python-sdk-tesladam-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-ram-3.2.0-150100.3.7.4 * python3-aliyun-python-sdk-facebody-1.2.15-150100.3.7.5 * python3-aliyun-python-sdk-vod-2.15.12-150100.3.7.4 * python3-aliyun-python-sdk-kms-2.14.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudphoto-1.1.19-150100.3.7.5 * python3-aliyun-python-sdk-snsuapi-1.7.1-150100.3.7.4 * python3-aliyun-python-sdk-tdsr-0.9.2-150100.3.3.4 * python3-aliyun-python-sdk-companyreg-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-ocs-0.0.4-150100.3.7.4 * python3-aliyun-python-sdk-yundun-ds-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-teslastream-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nlp-automl-0.0.9-150100.3.7.5 * python3-aliyun-python-sdk-afs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-privatelink-1.0.2-150100.3.3.4 * python3-aliyun-python-sdk-teslamaxcompute-1.5.5-150100.3.7.4 * python3-aliyun-python-sdk-emap-1.0-150100.3.3.5 * python3-aliyun-python-sdk-et-industry-openapi-3.6-150100.3.3.5 * python3-aliyun-python-sdk-imageenhan-1.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ccc-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-hiknoengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-teambition-aliyun-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-alinlp-1.0.16-150100.3.7.5 * python3-aliyun-python-sdk-voicenavigator-1.1.1-150100.3.7.4 * python3-aliyun-python-sdk-opensearch-0.9.0-150100.3.7.4 * python3-aliyun-python-sdk-brinekingdom-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-openanalytics-open-2.0.2-150100.3.7.4 * python3-aliyun-python-sdk-cloudwf-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-das-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-mpaas-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dds-3.5.0-150100.3.7.5 * python3-aliyun-python-sdk-oms-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-imageseg-1.1.8-150100.3.7.5 * python3-aliyun-python-sdk-industry-brain-5.0.52-150100.3.7.5 * python3-aliyun-python-sdk-jarvis-public-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-vpc-3.0.12-150100.3.7.4 * python3-aliyun-python-sdk-mts-2.7.6-150100.3.7.5 * python3-aliyun-python-sdk-alimt-3.0.30-150100.3.7.5 * python3-aliyun-python-sdk-schedulerx2-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-dbfs-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-democenter-1.1.0-150100.3.7.5 * python3-aliyun-python-sdk-dyvmsapi-3.0.2-150100.3.7.5 * python3-aliyun-python-sdk-bss-0.0.4-150100.3.7.5 * python3-aliyun-python-sdk-onsmqtt-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-tag-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nas-3.10.0-150100.3.7.5 * python3-aliyun-python-sdk-r-kvstore-2.13.0-150100.3.7.4 * python3-aliyun-python-sdk-ros-3.6.0-150100.3.7.4 * python3-aliyun-python-sdk-petadata-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-saf-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-unimkt-1.0.24-150100.3.7.4 * python3-aliyun-python-sdk-lubancloud-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-ubsms-2.0.5-150100.3.7.4 * python3-aliyun-python-sdk-domain-intl-1.6.0-150100.3.7.5 * python3-aliyun-python-sdk-codeup-0.0.8-150100.3.7.5 * python3-aliyun-python-sdk-cloudauth-2.0.26-150100.3.7.5 * python3-aliyun-python-sdk-highddos-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-hsm-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-videoenhan-1.0.7-150100.3.7.4 * python3-aliyun-python-sdk-videorecog-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-visionai-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-quickbi-public-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-csb-1.2.9-150100.3.7.5 * python3-aliyun-python-sdk-multimediaai-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-alidns-2.6.20-150100.3.7.5 * python3-aliyun-python-sdk-hpc-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-airec-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-dg-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-sae-1.5.0.0-150100.3.7.4 * python3-aliyun-python-sdk-actiontrail-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-cas-20180713_0114-150100.3.7.5 * python3-aliyun-python-sdk-httpdns-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cdn-3.6.1-150100.3.7.5 * python3-aliyun-python-sdk-gpdb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-eas-0.0.3-150100.3.7.5 * python3-aliyun-python-sdk-productcatalog-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-emas-appmonitor-1.2.0-150100.3.3.5 * python3-aliyun-python-sdk-imagesearch-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-emr-3.3.2-150100.3.7.5 * python3-aliyun-python-sdk-ens-1.3.3-150100.3.7.5 * python3-aliyun-python-sdk-edas-3.15.2-150100.3.7.5 * python3-aliyun-python-sdk-ehpc-1.14.1-150100.3.7.5 * python3-aliyun-python-sdk-ons-3.1.6-150100.3.7.4 * python3-aliyun-python-sdk-crm-2.2.1-150100.3.7.5 * python3-aliyun-python-sdk-webplus-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-imm-1.23.0-150100.3.7.5 * python3-aliyun-python-sdk-dysmsapi-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-devops-rdc-1.9.0-150100.3.7.5 * python3-aliyun-python-sdk-imageprocess-1.0.10-150100.3.7.5 * python3-aliyun-python-sdk-clickhouse-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-bssopenapi-1.6.2-150100.3.7.5 * python3-aliyun-python-sdk-appmallsservice-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cloudgame-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-hbase-2.9.2-150100.3.7.5 * python3-aliyun-python-sdk-rdc-1.1-150100.3.7.4 * python3-aliyun-python-sdk-waf-openapi-1.1.4-150100.3.7.4 * python3-aliyun-python-sdk-ivpd-1.0.6.1-150100.3.7.5 * python3-aliyun-python-sdk-sts-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-aliyuncvc-1.0.10.2-150100.3.7.5 * python3-aliyun-python-sdk-cs-4.8.1-150100.3.7.5 * python3-aliyun-python-sdk-smartag-1.5.4-150100.3.7.4 * python3-aliyun-python-sdk-reid-1.1.8.5-150100.3.7.4 * python3-aliyun-python-sdk-hitsdb-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-trademark-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-viapiutils-1.0-150100.3.7.4 * python3-aliyun-python-sdk-linkwan-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-fnf-1.8.0-150100.3.7.5 * python3-aliyun-python-sdk-imagerecog-1.0.13-150100.3.7.5 * python3-aliyun-python-sdk-eais-2.0.0-150100.3.3.5 * python3-aliyun-python-sdk-acms-open-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudapi-4.9.2-150100.3.7.5 * python3-aliyun-python-sdk-cloudesl-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-vcs-2.0.4-150100.3.7.4 * python3-aliyun-python-sdk-sas-1.1.3-150100.3.7.4 * python3-aliyun-python-sdk-imgsearch-1.1.6-150100.3.7.5 * python3-aliyun-python-sdk-visionai-poc-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-idsp-1.4-150100.3.3.5 * python3-aliyun-python-sdk-yundun-2.1.4-150100.3.7.4 * python3-aliyun-python-sdk-dcdn-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ivision-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-polardb-1.8.3-150100.3.7.4 * python3-aliyun-python-sdk-scdn-2.2.3-150100.3.7.4 * python3-aliyun-python-sdk-amqp-open-1.1.1-150100.3.5.5 * python3-aliyun-python-sdk-metering-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-geoip-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-config-1.0.3-150100.3.3.5 * python3-aliyun-python-sdk-cspro-1.3.9-150100.3.7.5 * python3-aliyun-python-sdk-ft-5.6.7-150100.3.7.5 * python3-aliyun-python-sdk-vs-1.10.2-150100.3.7.4 * python3-aliyun-python-sdk-cassandra-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-hivisengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-sls-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-aas-2.1.1-150100.3.5.5 * python3-aliyun-python-sdk-aegis-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-chatbot-1.2.1-150100.3.7.5 * python3-aliyun-python-sdk-arms-2.5.22-150100.3.7.5 * python3-aliyun-python-sdk-cbn-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-drds-20201028-150100.3.7.5 * python3-aliyun-python-sdk-elasticsearch-3.0.20-150100.3.7.5 * python3-aliyun-python-sdk-ledgerdb-0.7.0-150100.3.7.5 * python3-aliyun-python-sdk-push-3.13.6-150100.3.7.4 * python3-aliyun-python-sdk-videoseg-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-xtrace-0.2.2-150100.3.7.4 * python3-aliyun-python-sdk-dyplsapi-1.3.0-150100.3.7.5 * python3-aliyun-python-sdk-sgw-1.0.0-150100.3.3.4 * python3-aliyun-python-sdk-outboundbot-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-linkedmall-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-oos-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-jarvis-1.2.4-150100.3.7.5 * python3-aliyun-python-sdk-slb-3.3.3-150100.3.7.4 * python3-aliyun-python-sdk-dts-5.1.9-150100.3.7.5 * python3-aliyun-python-sdk-gdb-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dms-enterprise-1.12.0-150100.3.7.5 * python3-aliyun-python-sdk-green-3.6.3-150100.3.7.5 * python3-aliyun-python-sdk-rds-2.5.8-150100.3.7.4 * python3-aliyun-python-sdk-idrsservice-3.7.3-150100.3.3.5 * python3-aliyun-python-sdk-gts-phd-1-150100.3.7.5 * python3-aliyun-python-sdk-jaq-2.0.7-150100.3.7.5 * python3-aliyun-python-sdk-uis-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-openanalytics-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-qualitycheck-3.0.9-150100.3.7.4 * python3-aliyun-python-sdk-smarthosting-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-sddp-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-safconsole-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-acm-1.0.1-150100.3.7.5 * Public Cloud Module 15-SP2 (aarch64 ppc64le s390x) * python2-crcmod-1.7-150100.3.3.4 * Public Cloud Module 15-SP2 (noarch) * python3-aliyun-python-sdk-address-purification-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-netana-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-ess-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-resourcemanager-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-eci-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-polardbx-20201028-150100.3.3.4 * python3-aliyun-python-sdk-risk-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-status-3.7-150100.3.7.4 * python3-aliyun-python-sdk-iot-8.21.1-150100.3.7.5 * python3-aliyun-python-sdk-servicemesh-1.0.5-150100.3.3.4 * python3-aliyun-python-sdk-aligreen-console-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-imageaudit-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-ossadmin-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-videosearch-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ddoscoo-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-baas-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-hbr-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-cdrs-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-arms4finance-2.0.2-150100.3.7.5 * python3-aliyun-python-sdk-foas-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-adb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-linkface-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-nls-cloud-meta-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-retailcloud-2.0.12-150100.3.7.4 * python3-aliyun-python-sdk-paistudio-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-rtc-1.2.5-150100.3.7.4 * python3-aliyun-python-sdk-live-3.9.5-150100.3.7.5 * python3-aliyun-python-sdk-ccs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-iqa-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudmarketing-2.7.16-150100.3.7.5 * python3-aliyun-python-sdk-pts-2.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ecs-4.23.9-150100.3.7.5 * python3-aliyun-python-sdk-ocr-1.0.9-150100.3.7.4 * python3-aliyun-python-sdk-domain-3.14.4-150100.3.7.5 * python3-aliyun-python-sdk-welfare-inner-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ots-4.0.1-150100.3.7.4 * python3-aliyun-python-sdk-sas-api-2.1.1-150100.3.7.4 * python3-aliyun-python-sdk-cms-7.0.18-150100.3.7.5 * python3-aliyun-python-sdk-cr-4.1.2-150100.3.7.5 * python3-aliyun-python-sdk-dbs-1.0.29-150100.3.7.5 * python3-aliyun-python-sdk-dypnsapi-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-cams-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-dataworks-public-3.2.6-150100.3.7.5 * python3-aliyun-python-sdk-faas-2.7.11-150100.3.7.5 * python3-aliyun-python-sdk-objectdet-1.0.10-150100.3.7.4 * python3-aliyun-python-sdk-goodstech-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-mopen-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-smc-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-xspace-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-dybaseapi-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-market-2.0.24-150100.3.7.5 * python3-aliyun-python-sdk-cusanalytic_sc_online-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-core-2.13.30-150100.3.7.5 * python3-aliyun-python-sdk-pvtz-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-workorder-3.0.0-150100.3.7.4 * python3-aliyun-python-sdk-tesladam-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-ram-3.2.0-150100.3.7.4 * python3-aliyun-python-sdk-facebody-1.2.15-150100.3.7.5 * python3-aliyun-python-sdk-vod-2.15.12-150100.3.7.4 * python3-aliyun-python-sdk-kms-2.14.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudphoto-1.1.19-150100.3.7.5 * python3-aliyun-python-sdk-snsuapi-1.7.1-150100.3.7.4 * python3-aliyun-python-sdk-tdsr-0.9.2-150100.3.3.4 * python3-aliyun-python-sdk-companyreg-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-ocs-0.0.4-150100.3.7.4 * python3-aliyun-python-sdk-yundun-ds-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-teslastream-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nlp-automl-0.0.9-150100.3.7.5 * python3-aliyun-python-sdk-afs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-privatelink-1.0.2-150100.3.3.4 * python3-aliyun-python-sdk-teslamaxcompute-1.5.5-150100.3.7.4 * python3-aliyun-python-sdk-emap-1.0-150100.3.3.5 * python3-aliyun-python-sdk-et-industry-openapi-3.6-150100.3.3.5 * python3-aliyun-python-sdk-imageenhan-1.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ccc-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-hiknoengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-teambition-aliyun-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-alinlp-1.0.16-150100.3.7.5 * python3-aliyun-python-sdk-voicenavigator-1.1.1-150100.3.7.4 * python3-aliyun-python-sdk-opensearch-0.9.0-150100.3.7.4 * python3-aliyun-python-sdk-brinekingdom-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-openanalytics-open-2.0.2-150100.3.7.4 * python3-aliyun-python-sdk-cloudwf-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-das-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-mpaas-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dds-3.5.0-150100.3.7.5 * python3-aliyun-python-sdk-oms-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-imageseg-1.1.8-150100.3.7.5 * python3-aliyun-python-sdk-industry-brain-5.0.52-150100.3.7.5 * python3-aliyun-python-sdk-jarvis-public-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-vpc-3.0.12-150100.3.7.4 * python3-aliyun-python-sdk-mts-2.7.6-150100.3.7.5 * python3-aliyun-python-sdk-alimt-3.0.30-150100.3.7.5 * python3-aliyun-python-sdk-schedulerx2-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-dbfs-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-democenter-1.1.0-150100.3.7.5 * python3-aliyun-python-sdk-dyvmsapi-3.0.2-150100.3.7.5 * python3-aliyun-python-sdk-bss-0.0.4-150100.3.7.5 * python3-aliyun-python-sdk-onsmqtt-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-tag-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nas-3.10.0-150100.3.7.5 * python3-aliyun-python-sdk-r-kvstore-2.13.0-150100.3.7.4 * python3-aliyun-python-sdk-ros-3.6.0-150100.3.7.4 * python3-aliyun-python-sdk-petadata-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-saf-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-unimkt-1.0.24-150100.3.7.4 * python3-aliyun-python-sdk-lubancloud-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-ubsms-2.0.5-150100.3.7.4 * python3-aliyun-python-sdk-domain-intl-1.6.0-150100.3.7.5 * python3-aliyun-python-sdk-codeup-0.0.8-150100.3.7.5 * python3-aliyun-python-sdk-cloudauth-2.0.26-150100.3.7.5 * python3-aliyun-python-sdk-highddos-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-hsm-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-videoenhan-1.0.7-150100.3.7.4 * python3-aliyun-python-sdk-videorecog-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-visionai-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-quickbi-public-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-csb-1.2.9-150100.3.7.5 * python3-aliyun-python-sdk-multimediaai-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-alidns-2.6.20-150100.3.7.5 * python3-aliyun-python-sdk-hpc-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-airec-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-dg-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-sae-1.5.0.0-150100.3.7.4 * python3-aliyun-python-sdk-actiontrail-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-cas-20180713_0114-150100.3.7.5 * python3-aliyun-python-sdk-httpdns-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cdn-3.6.1-150100.3.7.5 * python3-aliyun-python-sdk-gpdb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-eas-0.0.3-150100.3.7.5 * python3-aliyun-python-sdk-productcatalog-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-emas-appmonitor-1.2.0-150100.3.3.5 * python3-aliyun-python-sdk-imagesearch-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-emr-3.3.2-150100.3.7.5 * python3-aliyun-python-sdk-ens-1.3.3-150100.3.7.5 * python3-aliyun-python-sdk-edas-3.15.2-150100.3.7.5 * python3-aliyun-python-sdk-ehpc-1.14.1-150100.3.7.5 * python3-aliyun-python-sdk-ons-3.1.6-150100.3.7.4 * python3-aliyun-python-sdk-crm-2.2.1-150100.3.7.5 * python3-aliyun-python-sdk-webplus-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-imm-1.23.0-150100.3.7.5 * python3-aliyun-python-sdk-dysmsapi-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-devops-rdc-1.9.0-150100.3.7.5 * python3-aliyun-python-sdk-imageprocess-1.0.10-150100.3.7.5 * python3-aliyun-python-sdk-clickhouse-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-bssopenapi-1.6.2-150100.3.7.5 * python3-aliyun-python-sdk-appmallsservice-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cloudgame-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-hbase-2.9.2-150100.3.7.5 * python3-aliyun-python-sdk-rdc-1.1-150100.3.7.4 * python3-aliyun-python-sdk-waf-openapi-1.1.4-150100.3.7.4 * python3-aliyun-python-sdk-ivpd-1.0.6.1-150100.3.7.5 * python3-aliyun-python-sdk-sts-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-aliyuncvc-1.0.10.2-150100.3.7.5 * python3-aliyun-python-sdk-cs-4.8.1-150100.3.7.5 * python3-aliyun-python-sdk-smartag-1.5.4-150100.3.7.4 * python3-aliyun-python-sdk-reid-1.1.8.5-150100.3.7.4 * python3-aliyun-python-sdk-hitsdb-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-trademark-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-viapiutils-1.0-150100.3.7.4 * python3-aliyun-python-sdk-linkwan-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-fnf-1.8.0-150100.3.7.5 * python3-aliyun-python-sdk-imagerecog-1.0.13-150100.3.7.5 * python3-aliyun-python-sdk-eais-2.0.0-150100.3.3.5 * python3-aliyun-python-sdk-acms-open-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudapi-4.9.2-150100.3.7.5 * python3-aliyun-python-sdk-cloudesl-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-vcs-2.0.4-150100.3.7.4 * python3-aliyun-python-sdk-sas-1.1.3-150100.3.7.4 * python3-aliyun-python-sdk-imgsearch-1.1.6-150100.3.7.5 * python3-aliyun-python-sdk-visionai-poc-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-idsp-1.4-150100.3.3.5 * python3-aliyun-python-sdk-yundun-2.1.4-150100.3.7.4 * python3-aliyun-python-sdk-dcdn-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ivision-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-polardb-1.8.3-150100.3.7.4 * python3-aliyun-python-sdk-scdn-2.2.3-150100.3.7.4 * python3-aliyun-python-sdk-amqp-open-1.1.1-150100.3.5.5 * python3-aliyun-python-sdk-metering-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-geoip-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-config-1.0.3-150100.3.3.5 * python3-aliyun-python-sdk-cspro-1.3.9-150100.3.7.5 * python3-aliyun-python-sdk-ft-5.6.7-150100.3.7.5 * python3-aliyun-python-sdk-vs-1.10.2-150100.3.7.4 * python3-aliyun-python-sdk-cassandra-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-hivisengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-sls-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-aas-2.1.1-150100.3.5.5 * python3-aliyun-python-sdk-aegis-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-chatbot-1.2.1-150100.3.7.5 * python3-aliyun-python-sdk-arms-2.5.22-150100.3.7.5 * python3-aliyun-python-sdk-cbn-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-drds-20201028-150100.3.7.5 * python3-aliyun-python-sdk-elasticsearch-3.0.20-150100.3.7.5 * python3-aliyun-python-sdk-ledgerdb-0.7.0-150100.3.7.5 * python3-aliyun-python-sdk-push-3.13.6-150100.3.7.4 * python3-aliyun-python-sdk-videoseg-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-xtrace-0.2.2-150100.3.7.4 * python3-aliyun-python-sdk-dyplsapi-1.3.0-150100.3.7.5 * python3-aliyun-python-sdk-sgw-1.0.0-150100.3.3.4 * python3-aliyun-python-sdk-outboundbot-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-linkedmall-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-oos-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-jarvis-1.2.4-150100.3.7.5 * python3-aliyun-python-sdk-slb-3.3.3-150100.3.7.4 * python3-aliyun-python-sdk-dts-5.1.9-150100.3.7.5 * python3-aliyun-python-sdk-gdb-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dms-enterprise-1.12.0-150100.3.7.5 * python3-aliyun-python-sdk-green-3.6.3-150100.3.7.5 * python3-aliyun-python-sdk-rds-2.5.8-150100.3.7.4 * python3-aliyun-python-sdk-idrsservice-3.7.3-150100.3.3.5 * python3-aliyun-python-sdk-gts-phd-1-150100.3.7.5 * python3-aliyun-python-sdk-jaq-2.0.7-150100.3.7.5 * python3-aliyun-python-sdk-uis-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-openanalytics-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-qualitycheck-3.0.9-150100.3.7.4 * python3-aliyun-python-sdk-smarthosting-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-sddp-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-safconsole-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-acm-1.0.1-150100.3.7.5 * Public Cloud Module 15-SP3 (aarch64) * python2-crcmod-1.7-150100.3.3.4 * Public Cloud Module 15-SP3 (noarch) * python3-aliyun-python-sdk-address-purification-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-netana-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-ess-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-resourcemanager-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-eci-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-polardbx-20201028-150100.3.3.4 * python3-aliyun-python-sdk-risk-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-status-3.7-150100.3.7.4 * python3-aliyun-python-sdk-iot-8.21.1-150100.3.7.5 * python3-aliyun-python-sdk-servicemesh-1.0.5-150100.3.3.4 * python3-aliyun-python-sdk-aligreen-console-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-imageaudit-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-ossadmin-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-videosearch-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ddoscoo-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-baas-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-hbr-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-cdrs-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-arms4finance-2.0.2-150100.3.7.5 * python3-aliyun-python-sdk-foas-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-adb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-linkface-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-nls-cloud-meta-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-retailcloud-2.0.12-150100.3.7.4 * python3-aliyun-python-sdk-paistudio-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-rtc-1.2.5-150100.3.7.4 * python3-aliyun-python-sdk-live-3.9.5-150100.3.7.5 * python3-aliyun-python-sdk-ccs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-iqa-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudmarketing-2.7.16-150100.3.7.5 * python3-aliyun-python-sdk-pts-2.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ecs-4.23.9-150100.3.7.5 * python3-aliyun-python-sdk-ocr-1.0.9-150100.3.7.4 * python3-aliyun-python-sdk-domain-3.14.4-150100.3.7.5 * python3-aliyun-python-sdk-welfare-inner-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ots-4.0.1-150100.3.7.4 * python3-aliyun-python-sdk-sas-api-2.1.1-150100.3.7.4 * python3-aliyun-python-sdk-cms-7.0.18-150100.3.7.5 * python3-aliyun-python-sdk-cr-4.1.2-150100.3.7.5 * python3-aliyun-python-sdk-dbs-1.0.29-150100.3.7.5 * python3-aliyun-python-sdk-dypnsapi-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-cams-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-dataworks-public-3.2.6-150100.3.7.5 * python3-aliyun-python-sdk-faas-2.7.11-150100.3.7.5 * python3-aliyun-python-sdk-objectdet-1.0.10-150100.3.7.4 * python3-aliyun-python-sdk-goodstech-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-mopen-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-smc-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-xspace-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-dybaseapi-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-market-2.0.24-150100.3.7.5 * python3-aliyun-python-sdk-cusanalytic_sc_online-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-core-2.13.30-150100.3.7.5 * python3-aliyun-python-sdk-pvtz-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-workorder-3.0.0-150100.3.7.4 * python3-aliyun-python-sdk-tesladam-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-ram-3.2.0-150100.3.7.4 * python3-aliyun-python-sdk-facebody-1.2.15-150100.3.7.5 * python3-aliyun-python-sdk-vod-2.15.12-150100.3.7.4 * python3-aliyun-python-sdk-kms-2.14.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudphoto-1.1.19-150100.3.7.5 * python3-aliyun-python-sdk-snsuapi-1.7.1-150100.3.7.4 * python3-aliyun-python-sdk-tdsr-0.9.2-150100.3.3.4 * python3-aliyun-python-sdk-companyreg-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-ocs-0.0.4-150100.3.7.4 * python3-aliyun-python-sdk-yundun-ds-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-teslastream-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nlp-automl-0.0.9-150100.3.7.5 * python3-aliyun-python-sdk-afs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-privatelink-1.0.2-150100.3.3.4 * python3-aliyun-python-sdk-teslamaxcompute-1.5.5-150100.3.7.4 * python3-aliyun-python-sdk-emap-1.0-150100.3.3.5 * python3-aliyun-python-sdk-et-industry-openapi-3.6-150100.3.3.5 * python3-aliyun-python-sdk-imageenhan-1.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ccc-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-hiknoengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-teambition-aliyun-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-alinlp-1.0.16-150100.3.7.5 * python3-aliyun-python-sdk-voicenavigator-1.1.1-150100.3.7.4 * python3-aliyun-python-sdk-opensearch-0.9.0-150100.3.7.4 * python3-aliyun-python-sdk-brinekingdom-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-openanalytics-open-2.0.2-150100.3.7.4 * python3-aliyun-python-sdk-cloudwf-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-das-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-mpaas-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dds-3.5.0-150100.3.7.5 * python3-aliyun-python-sdk-oms-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-imageseg-1.1.8-150100.3.7.5 * python3-aliyun-python-sdk-industry-brain-5.0.52-150100.3.7.5 * python3-aliyun-python-sdk-jarvis-public-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-vpc-3.0.12-150100.3.7.4 * python3-aliyun-python-sdk-mts-2.7.6-150100.3.7.5 * python3-aliyun-python-sdk-alimt-3.0.30-150100.3.7.5 * python3-aliyun-python-sdk-schedulerx2-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-dbfs-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-democenter-1.1.0-150100.3.7.5 * python3-aliyun-python-sdk-dyvmsapi-3.0.2-150100.3.7.5 * python3-aliyun-python-sdk-bss-0.0.4-150100.3.7.5 * python3-aliyun-python-sdk-onsmqtt-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-tag-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nas-3.10.0-150100.3.7.5 * python3-aliyun-python-sdk-r-kvstore-2.13.0-150100.3.7.4 * python3-aliyun-python-sdk-ros-3.6.0-150100.3.7.4 * python3-aliyun-python-sdk-petadata-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-saf-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-unimkt-1.0.24-150100.3.7.4 * python3-aliyun-python-sdk-lubancloud-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-ubsms-2.0.5-150100.3.7.4 * python3-aliyun-python-sdk-domain-intl-1.6.0-150100.3.7.5 * python3-aliyun-python-sdk-codeup-0.0.8-150100.3.7.5 * python3-aliyun-python-sdk-cloudauth-2.0.26-150100.3.7.5 * python3-aliyun-python-sdk-highddos-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-hsm-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-videoenhan-1.0.7-150100.3.7.4 * python3-aliyun-python-sdk-videorecog-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-visionai-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-quickbi-public-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-csb-1.2.9-150100.3.7.5 * python3-aliyun-python-sdk-multimediaai-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-alidns-2.6.20-150100.3.7.5 * python3-aliyun-python-sdk-hpc-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-airec-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-dg-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-sae-1.5.0.0-150100.3.7.4 * python3-aliyun-python-sdk-actiontrail-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-cas-20180713_0114-150100.3.7.5 * python3-aliyun-python-sdk-httpdns-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cdn-3.6.1-150100.3.7.5 * python3-aliyun-python-sdk-gpdb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-eas-0.0.3-150100.3.7.5 * python3-aliyun-python-sdk-productcatalog-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-emas-appmonitor-1.2.0-150100.3.3.5 * python3-aliyun-python-sdk-imagesearch-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-emr-3.3.2-150100.3.7.5 * python3-aliyun-python-sdk-ens-1.3.3-150100.3.7.5 * python3-aliyun-python-sdk-edas-3.15.2-150100.3.7.5 * python3-aliyun-python-sdk-ehpc-1.14.1-150100.3.7.5 * python3-aliyun-python-sdk-ons-3.1.6-150100.3.7.4 * python3-aliyun-python-sdk-crm-2.2.1-150100.3.7.5 * python3-aliyun-python-sdk-webplus-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-imm-1.23.0-150100.3.7.5 * python3-aliyun-python-sdk-dysmsapi-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-devops-rdc-1.9.0-150100.3.7.5 * python3-aliyun-python-sdk-imageprocess-1.0.10-150100.3.7.5 * python3-aliyun-python-sdk-clickhouse-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-bssopenapi-1.6.2-150100.3.7.5 * python3-aliyun-python-sdk-appmallsservice-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cloudgame-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-hbase-2.9.2-150100.3.7.5 * python3-aliyun-python-sdk-rdc-1.1-150100.3.7.4 * python3-aliyun-python-sdk-waf-openapi-1.1.4-150100.3.7.4 * python3-aliyun-python-sdk-ivpd-1.0.6.1-150100.3.7.5 * python3-aliyun-python-sdk-sts-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-aliyuncvc-1.0.10.2-150100.3.7.5 * python3-aliyun-python-sdk-cs-4.8.1-150100.3.7.5 * python3-aliyun-python-sdk-smartag-1.5.4-150100.3.7.4 * python3-aliyun-python-sdk-reid-1.1.8.5-150100.3.7.4 * python3-aliyun-python-sdk-hitsdb-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-trademark-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-viapiutils-1.0-150100.3.7.4 * python3-aliyun-python-sdk-linkwan-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-fnf-1.8.0-150100.3.7.5 * python3-aliyun-python-sdk-imagerecog-1.0.13-150100.3.7.5 * python3-aliyun-python-sdk-eais-2.0.0-150100.3.3.5 * python3-aliyun-python-sdk-acms-open-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudapi-4.9.2-150100.3.7.5 * python3-aliyun-python-sdk-cloudesl-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-vcs-2.0.4-150100.3.7.4 * python3-aliyun-python-sdk-sas-1.1.3-150100.3.7.4 * python3-aliyun-python-sdk-imgsearch-1.1.6-150100.3.7.5 * python3-aliyun-python-sdk-visionai-poc-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-idsp-1.4-150100.3.3.5 * python3-aliyun-python-sdk-yundun-2.1.4-150100.3.7.4 * python3-aliyun-python-sdk-dcdn-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ivision-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-polardb-1.8.3-150100.3.7.4 * python3-aliyun-python-sdk-scdn-2.2.3-150100.3.7.4 * python3-aliyun-python-sdk-amqp-open-1.1.1-150100.3.5.5 * python3-aliyun-python-sdk-metering-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-geoip-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-config-1.0.3-150100.3.3.5 * python3-aliyun-python-sdk-cspro-1.3.9-150100.3.7.5 * python3-aliyun-python-sdk-ft-5.6.7-150100.3.7.5 * python3-aliyun-python-sdk-vs-1.10.2-150100.3.7.4 * python3-aliyun-python-sdk-cassandra-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-hivisengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-sls-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-aas-2.1.1-150100.3.5.5 * python3-aliyun-python-sdk-aegis-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-chatbot-1.2.1-150100.3.7.5 * python3-aliyun-python-sdk-arms-2.5.22-150100.3.7.5 * python3-aliyun-python-sdk-cbn-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-drds-20201028-150100.3.7.5 * python3-aliyun-python-sdk-elasticsearch-3.0.20-150100.3.7.5 * python3-aliyun-python-sdk-ledgerdb-0.7.0-150100.3.7.5 * python3-aliyun-python-sdk-push-3.13.6-150100.3.7.4 * python3-aliyun-python-sdk-videoseg-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-xtrace-0.2.2-150100.3.7.4 * python3-aliyun-python-sdk-dyplsapi-1.3.0-150100.3.7.5 * python3-aliyun-python-sdk-sgw-1.0.0-150100.3.3.4 * python3-aliyun-python-sdk-outboundbot-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-linkedmall-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-oos-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-jarvis-1.2.4-150100.3.7.5 * python3-aliyun-python-sdk-slb-3.3.3-150100.3.7.4 * python3-aliyun-python-sdk-dts-5.1.9-150100.3.7.5 * python3-aliyun-python-sdk-gdb-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dms-enterprise-1.12.0-150100.3.7.5 * python3-aliyun-python-sdk-green-3.6.3-150100.3.7.5 * python3-aliyun-python-sdk-rds-2.5.8-150100.3.7.4 * python3-aliyun-python-sdk-idrsservice-3.7.3-150100.3.3.5 * python3-aliyun-python-sdk-gts-phd-1-150100.3.7.5 * python3-aliyun-python-sdk-jaq-2.0.7-150100.3.7.5 * python3-aliyun-python-sdk-uis-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-openanalytics-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-qualitycheck-3.0.9-150100.3.7.4 * python3-aliyun-python-sdk-smarthosting-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-sddp-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-safconsole-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-acm-1.0.1-150100.3.7.5 * Public Cloud Module 15-SP4 (noarch) * python3-aliyun-python-sdk-address-purification-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-netana-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-ess-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-resourcemanager-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-eci-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-polardbx-20201028-150100.3.3.4 * python3-aliyun-python-sdk-risk-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-status-3.7-150100.3.7.4 * python3-aliyun-python-sdk-iot-8.21.1-150100.3.7.5 * python3-aliyun-python-sdk-servicemesh-1.0.5-150100.3.3.4 * python3-aliyun-python-sdk-aligreen-console-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-imageaudit-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-ossadmin-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-videosearch-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ddoscoo-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-baas-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-hbr-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-cdrs-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-arms4finance-2.0.2-150100.3.7.5 * python3-aliyun-python-sdk-foas-2.3.3-150100.3.7.5 * python3-aliyun-python-sdk-adb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-linkface-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-nls-cloud-meta-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-retailcloud-2.0.12-150100.3.7.4 * python3-aliyun-python-sdk-paistudio-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-rtc-1.2.5-150100.3.7.4 * python3-aliyun-python-sdk-live-3.9.5-150100.3.7.5 * python3-aliyun-python-sdk-ccs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-iqa-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudmarketing-2.7.16-150100.3.7.5 * python3-oss2-2.14.0-150100.3.3.4 * python3-aliyun-python-sdk-pts-2.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ecs-4.23.9-150100.3.7.5 * python3-aliyun-python-sdk-ocr-1.0.9-150100.3.7.4 * python3-aliyun-python-sdk-domain-3.14.4-150100.3.7.5 * python3-aliyun-python-sdk-welfare-inner-1.1.0-150100.3.7.4 * python3-aliyun-python-sdk-ots-4.0.1-150100.3.7.4 * python3-aliyun-python-sdk-sas-api-2.1.1-150100.3.7.4 * python3-aliyun-python-sdk-cms-7.0.18-150100.3.7.5 * python3-aliyun-python-sdk-cr-4.1.2-150100.3.7.5 * python3-aliyun-python-sdk-dbs-1.0.29-150100.3.7.5 * python3-aliyun-python-sdk-dypnsapi-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-cams-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-dataworks-public-3.2.6-150100.3.7.5 * python3-aliyun-python-sdk-faas-2.7.11-150100.3.7.5 * python3-aliyun-python-sdk-objectdet-1.0.10-150100.3.7.4 * python3-aliyun-python-sdk-goodstech-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-mopen-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-smc-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-xspace-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-dybaseapi-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-market-2.0.24-150100.3.7.5 * python3-aliyun-python-sdk-cusanalytic_sc_online-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-core-2.13.30-150100.3.7.5 * python3-aliyun-python-sdk-pvtz-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-workorder-3.0.0-150100.3.7.4 * python3-aliyun-python-sdk-tesladam-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-ram-3.2.0-150100.3.7.4 * python3-aliyun-python-sdk-facebody-1.2.15-150100.3.7.5 * python3-aliyun-python-sdk-vod-2.15.12-150100.3.7.4 * python3-aliyun-python-sdk-kms-2.14.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudphoto-1.1.19-150100.3.7.5 * python3-aliyun-python-sdk-snsuapi-1.7.1-150100.3.7.4 * python3-aliyun-python-sdk-tdsr-0.9.2-150100.3.3.4 * python3-aliyun-python-sdk-companyreg-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-ocs-0.0.4-150100.3.7.4 * python3-aliyun-python-sdk-yundun-ds-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-teslastream-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nlp-automl-0.0.9-150100.3.7.5 * python3-aliyun-python-sdk-afs-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-privatelink-1.0.2-150100.3.3.4 * python3-aliyun-python-sdk-teslamaxcompute-1.5.5-150100.3.7.4 * python3-aliyun-python-sdk-emap-1.0-150100.3.3.5 * python3-aliyun-python-sdk-et-industry-openapi-3.6-150100.3.3.5 * python3-aliyun-python-sdk-imageenhan-1.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ccc-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-hiknoengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-teambition-aliyun-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-alinlp-1.0.16-150100.3.7.5 * python3-aliyun-python-sdk-voicenavigator-1.1.1-150100.3.7.4 * python3-aliyun-python-sdk-opensearch-0.9.0-150100.3.7.4 * python3-aliyun-python-sdk-brinekingdom-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-openanalytics-open-2.0.2-150100.3.7.4 * python3-aliyun-python-sdk-cloudwf-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-das-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-mpaas-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dds-3.5.0-150100.3.7.5 * python3-aliyun-python-sdk-oms-0.0.3-150100.3.7.4 * python3-aliyun-python-sdk-imageseg-1.1.8-150100.3.7.5 * python3-aliyun-python-sdk-industry-brain-5.0.52-150100.3.7.5 * python3-aliyun-python-sdk-jarvis-public-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-vpc-3.0.12-150100.3.7.4 * python3-aliyun-python-sdk-mts-2.7.6-150100.3.7.5 * python3-aliyun-python-sdk-alimt-3.0.30-150100.3.7.5 * python3-aliyun-python-sdk-schedulerx2-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-dbfs-1.0.2-150100.3.7.5 * python3-aliyun-python-sdk-democenter-1.1.0-150100.3.7.5 * python3-aliyun-python-sdk-dyvmsapi-3.0.2-150100.3.7.5 * python3-aliyun-python-sdk-bss-0.0.4-150100.3.7.5 * python3-aliyun-python-sdk-onsmqtt-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-tag-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-nas-3.10.0-150100.3.7.5 * python3-aliyun-python-sdk-r-kvstore-2.13.0-150100.3.7.4 * python3-aliyun-python-sdk-ros-3.6.0-150100.3.7.4 * python3-aliyun-python-sdk-petadata-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-saf-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-unimkt-1.0.24-150100.3.7.4 * python3-aliyun-python-sdk-lubancloud-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-ubsms-2.0.5-150100.3.7.4 * python3-aliyun-python-sdk-domain-intl-1.6.0-150100.3.7.5 * python3-aliyun-python-sdk-codeup-0.0.8-150100.3.7.5 * python3-aliyun-python-sdk-cloudauth-2.0.26-150100.3.7.5 * python3-aliyun-python-sdk-highddos-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-hsm-1.0.1-150100.3.7.5 * python3-aliyun-python-sdk-videoenhan-1.0.7-150100.3.7.4 * python3-aliyun-python-sdk-videorecog-1.0.2-150100.3.7.4 * python3-aliyun-python-sdk-visionai-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-quickbi-public-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-csb-1.2.9-150100.3.7.5 * python3-aliyun-python-sdk-multimediaai-1.1.3-150100.3.7.5 * python3-aliyun-python-sdk-alidns-2.6.20-150100.3.7.5 * python3-aliyun-python-sdk-hpc-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-airec-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-dg-1.0.9-150100.3.3.5 * python3-aliyun-python-sdk-sae-1.5.0.0-150100.3.7.4 * python3-aliyun-python-sdk-actiontrail-2.0.3-150100.3.7.5 * python3-aliyun-python-sdk-cas-20180713_0114-150100.3.7.5 * python3-aliyun-python-sdk-httpdns-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cdn-3.6.1-150100.3.7.5 * python3-aliyun-python-sdk-gpdb-1.0.5-150100.3.7.5 * python3-aliyun-python-sdk-eas-0.0.3-150100.3.7.5 * python3-aliyun-python-sdk-productcatalog-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-emas-appmonitor-1.2.0-150100.3.3.5 * python3-aliyun-python-sdk-imagesearch-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-emr-3.3.2-150100.3.7.5 * python3-aliyun-python-sdk-ens-1.3.3-150100.3.7.5 * python3-aliyun-python-sdk-edas-3.15.2-150100.3.7.5 * python3-aliyun-python-sdk-ehpc-1.14.1-150100.3.7.5 * python3-aliyun-python-sdk-ons-3.1.6-150100.3.7.4 * python3-aliyun-python-sdk-crm-2.2.1-150100.3.7.5 * python3-aliyun-python-sdk-webplus-1.0.0-150100.3.7.4 * python3-aliyun-python-sdk-imm-1.23.0-150100.3.7.5 * python3-aliyun-python-sdk-dysmsapi-2.1.1-150100.3.7.5 * python3-aliyun-python-sdk-devops-rdc-1.9.0-150100.3.7.5 * python3-aliyun-python-sdk-imageprocess-1.0.10-150100.3.7.5 * python3-aliyun-python-sdk-clickhouse-2.0.0-150100.3.7.5 * python3-aliyun-python-sdk-bssopenapi-1.6.2-150100.3.7.5 * python3-aliyun-python-sdk-appmallsservice-1.1.1-150100.3.7.5 * python3-aliyun-python-sdk-cloudgame-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-hbase-2.9.2-150100.3.7.5 * python3-aliyun-python-sdk-rdc-1.1-150100.3.7.4 * python3-aliyun-python-sdk-waf-openapi-1.1.4-150100.3.7.4 * python3-aliyun-python-sdk-ivpd-1.0.6.1-150100.3.7.5 * python3-aliyun-python-sdk-sts-3.0.2-150100.3.7.4 * python3-aliyun-python-sdk-aliyuncvc-1.0.10.2-150100.3.7.5 * python3-aliyun-python-sdk-cs-4.8.1-150100.3.7.5 * python3-aliyun-python-sdk-smartag-1.5.4-150100.3.7.4 * python3-aliyun-python-sdk-reid-1.1.8.5-150100.3.7.4 * python3-aliyun-python-sdk-hitsdb-1.0.1-150100.3.3.5 * python3-aliyun-python-sdk-trademark-1.2.1-150100.3.7.4 * python3-aliyun-python-sdk-viapiutils-1.0-150100.3.7.4 * python3-aliyun-python-sdk-linkwan-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-fnf-1.8.0-150100.3.7.5 * python3-aliyun-python-sdk-imagerecog-1.0.13-150100.3.7.5 * python3-aliyun-python-sdk-eais-2.0.0-150100.3.3.5 * python3-aliyun-python-sdk-acms-open-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-cloudapi-4.9.2-150100.3.7.5 * python3-aliyun-python-sdk-cloudesl-2.0.4-150100.3.7.5 * python3-aliyun-python-sdk-vcs-2.0.4-150100.3.7.4 * python3-aliyun-python-sdk-sas-1.1.3-150100.3.7.4 * python3-aliyun-python-sdk-imgsearch-1.1.6-150100.3.7.5 * python3-aliyun-python-sdk-visionai-poc-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-idsp-1.4-150100.3.3.5 * python3-aliyun-python-sdk-yundun-2.1.4-150100.3.7.4 * python3-aliyun-python-sdk-dcdn-2.1.2-150100.3.7.5 * python3-aliyun-python-sdk-ivision-1.2.0-150100.3.7.5 * python3-aliyun-python-sdk-polardb-1.8.3-150100.3.7.4 * python3-aliyun-python-sdk-scdn-2.2.3-150100.3.7.4 * python3-aliyun-python-sdk-amqp-open-1.1.1-150100.3.5.5 * python3-aliyun-python-sdk-metering-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-geoip-1.0.3-150100.3.7.5 * python3-aliyun-python-sdk-config-1.0.3-150100.3.3.5 * python3-aliyun-python-sdk-cspro-1.3.9-150100.3.7.5 * python3-aliyun-python-sdk-ft-5.6.7-150100.3.7.5 * python3-aliyun-python-sdk-vs-1.10.2-150100.3.7.4 * python3-aliyun-python-sdk-cassandra-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-hivisengine-0.0.2-150100.3.7.5 * python3-aliyun-python-sdk-sls-1.0.8-150100.3.3.4 * python3-aliyun-python-sdk-aas-2.1.1-150100.3.5.5 * python3-aliyun-python-sdk-aegis-1.0.6-150100.3.7.5 * python3-aliyun-python-sdk-chatbot-1.2.1-150100.3.7.5 * python3-aliyun-python-sdk-arms-2.5.22-150100.3.7.5 * python3-aliyun-python-sdk-cbn-1.0.7-150100.3.7.5 * python3-aliyun-python-sdk-drds-20201028-150100.3.7.5 * python3-aliyun-python-sdk-elasticsearch-3.0.20-150100.3.7.5 * python3-aliyun-python-sdk-ledgerdb-0.7.0-150100.3.7.5 * python3-aliyun-python-sdk-push-3.13.6-150100.3.7.4 * python3-aliyun-python-sdk-videoseg-1.0.3-150100.3.7.4 * python3-aliyun-python-sdk-xtrace-0.2.2-150100.3.7.4 * python3-aliyun-python-sdk-dyplsapi-1.3.0-150100.3.7.5 * python3-aliyun-python-sdk-sgw-1.0.0-150100.3.3.4 * python3-aliyun-python-sdk-outboundbot-1.0.5-150100.3.7.4 * python3-aliyun-python-sdk-linkedmall-1.0.0-150100.3.7.5 * python3-aliyun-python-sdk-oos-1.4.0-150100.3.7.4 * python3-aliyun-python-sdk-jarvis-1.2.4-150100.3.7.5 * python3-aliyun-python-sdk-slb-3.3.3-150100.3.7.4 * python3-aliyun-python-sdk-dts-5.1.9-150100.3.7.5 * python3-aliyun-python-sdk-gdb-1.0.0-150100.3.3.5 * python3-aliyun-python-sdk-dms-enterprise-1.12.0-150100.3.7.5 * python3-aliyun-python-sdk-green-3.6.3-150100.3.7.5 * python3-aliyun-python-sdk-rds-2.5.8-150100.3.7.4 * python3-aliyun-python-sdk-idrsservice-3.7.3-150100.3.3.5 * python3-aliyun-python-sdk-gts-phd-1-150100.3.7.5 * python3-aliyun-python-sdk-jaq-2.0.7-150100.3.7.5 * python3-aliyun-python-sdk-uis-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-openanalytics-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-qualitycheck-3.0.9-150100.3.7.4 * python3-aliyun-python-sdk-smarthosting-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-sddp-1.0.1-150100.3.7.4 * python3-aliyun-python-sdk-safconsole-1.0.1-150100.3.3.4 * python3-aliyun-python-sdk-acm-1.0.1-150100.3.7.5 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-crcmod-1.7-150100.3.3.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1177083 * https://bugzilla.suse.com/show_bug.cgi?id=1181995 * https://jira.suse.com/browse/ECO-3329 * https://jira.suse.com/browse/PM-2475 * https://jira.suse.com/browse/PM-2730 * https://jira.suse.com/browse/SLE-18312 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:53:14 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:53:14 -0000 Subject: SUSE-SU-2023:0488-1: important: Security update for the Linux-RT Kernel Message-ID: <170903839407.30284.7600163085987091734@smelt2.prg2.suse.org> # Security update for the Linux-RT Kernel Announcement ID: SUSE-SU-2023:0488-1 Rating: important References: * bsc#1166486 * bsc#1185861 * bsc#1185863 * bsc#1186449 * bsc#1191256 * bsc#1192868 * bsc#1193629 * bsc#1194869 * bsc#1195175 * bsc#1195655 * bsc#1196058 * bsc#1199701 * bsc#1203332 * bsc#1204063 * bsc#1204356 * bsc#1204662 * bsc#1205495 * bsc#1206006 * bsc#1206036 * bsc#1206056 * bsc#1206057 * bsc#1206224 * bsc#1206258 * bsc#1206363 * bsc#1206459 * bsc#1206616 * bsc#1206640 * bsc#1206677 * bsc#1206784 * bsc#1206876 * bsc#1206877 * bsc#1206878 * bsc#1206880 * bsc#1206881 * bsc#1206882 * bsc#1206883 * bsc#1206884 * bsc#1206885 * bsc#1206886 * bsc#1206887 * bsc#1206888 * bsc#1206889 * bsc#1206890 * bsc#1206893 * bsc#1206894 * bsc#1207010 * bsc#1207034 * bsc#1207036 * bsc#1207050 * bsc#1207125 * bsc#1207134 * bsc#1207149 * bsc#1207158 * bsc#1207184 * bsc#1207186 * bsc#1207188 * bsc#1207189 * bsc#1207190 * bsc#1207237 * bsc#1207263 * bsc#1207269 * bsc#1207328 * bsc#1207497 * bsc#1207500 * bsc#1207501 * bsc#1207506 * bsc#1207507 * bsc#1207588 * bsc#1207589 * bsc#1207590 * bsc#1207591 * bsc#1207592 * bsc#1207593 * bsc#1207594 * bsc#1207602 * bsc#1207603 * bsc#1207605 * bsc#1207606 * bsc#1207607 * bsc#1207608 * bsc#1207609 * bsc#1207610 * bsc#1207611 * bsc#1207612 * bsc#1207613 * bsc#1207614 * bsc#1207615 * bsc#1207616 * bsc#1207617 * bsc#1207618 * bsc#1207619 * bsc#1207620 * bsc#1207621 * bsc#1207622 * bsc#1207623 * bsc#1207624 * bsc#1207625 * bsc#1207626 * bsc#1207627 * bsc#1207628 * bsc#1207629 * bsc#1207630 * bsc#1207631 * bsc#1207632 * bsc#1207633 * bsc#1207634 * bsc#1207635 * bsc#1207636 * bsc#1207637 * bsc#1207638 * bsc#1207639 * bsc#1207640 * bsc#1207641 * bsc#1207642 * bsc#1207643 * bsc#1207644 * bsc#1207645 * bsc#1207646 * bsc#1207647 * bsc#1207648 * bsc#1207649 * bsc#1207650 * bsc#1207651 * bsc#1207652 * bsc#1207653 * bsc#1207734 * bsc#1207768 * bsc#1207769 * bsc#1207770 * bsc#1207771 * bsc#1207773 * bsc#1207795 * bsc#1207842 * bsc#1207875 * bsc#1207878 * bsc#1207933 * bsc#1208030 * bsc#1208044 * bsc#1208085 * bsc#1208149 * bsc#1208153 * bsc#1208183 * bsc#1208428 * bsc#1208429 * jsc#PED-3210 * jsc#SLE-21132 Cross-References: * CVE-2020-24588 * CVE-2022-36280 * CVE-2022-4382 * CVE-2022-47929 * CVE-2023-0045 * CVE-2023-0122 * CVE-2023-0179 * CVE-2023-0266 * CVE-2023-0590 * CVE-2023-23454 * CVE-2023-23455 CVSS scores: * CVE-2020-24588 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2020-24588 ( NVD ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-4382 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4382 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-47929 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-47929 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0045 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0045 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-0122 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0122 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0266 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0266 ( NVD ): 7.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H * CVE-2023-0590 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0590 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23454 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23455 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23455 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Real Time Module 15-SP4 An update that solves 11 vulnerabilities, contains two features and has 133 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: * CVE-2022-36280: Fixed an out-of-bounds memory access vulnerability that was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c (bnc#1203332). * CVE-2023-0045: Fixed flush IBP in ib_prctl_set() (bsc#1207773). * CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795). * CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bnc#1207050). * CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125). * CVE-2023-23454: Fixed denial or service in cbq_classify in net/sched/sch_cbq.c (bnc#1207036). * CVE-2020-24588: Fixed injection of arbitrary network packets against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n) (bsc#1199701). * CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header bits (bsc#1207034). * CVE-2022-4382: Fixed a use-after-free flaw that was caused by a race condition among the superblock operations inside the gadgetfs code (bsc#1206258). * CVE-2023-0266: Fixed a use-after-free vulnerability inside the ALSA PCM package. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 was missing locks that could have been used in a use-after-free that could have resulted in a priviledge escalation to gain ring0 access from the system user (bsc#1207134). * CVE-2022-47929: Fixed NULL pointer dereference bug in the traffic control subsystem (bnc#1207237). The following non-security bugs were fixed: * ACPI: EC: Fix EC address space handler unregistration (bsc#1207149). * ACPI: EC: Fix ECDT probe ordering issues (bsc#1207149). * ACPI: PM: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224). * ACPI: PM: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224). * ACPI: PRM: Check whether EFI runtime is available (git-fixes). * ACPI: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224). * ACPI: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224). * ACPI: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224). * ACPI: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224). * ACPI: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224). * ACPI: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224). * ACPI: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224). * ACPI: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224). * ACPI: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224). * ACPI: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224). * ACPI: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224). * ACPICA: Allow address_space_handler Install and _REG execution as 2 separate steps (bsc#1207149). * ACPICA: include/acpi/acpixf.h: Fix indentation (bsc#1207149). * ALSA: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes). * ALSA: hda/realtek: Add Acer Predator PH315-54 (git-fixes). * ALSA: hda/realtek: Add Positivo N14KP6-TG (git-fixes). * ALSA: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes). * ALSA: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git- fixes). * ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes). * ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git- fixes). * ALSA: hda/realtek: fix mute/micmute LEDs, speaker do not work for a HP platform (git-fixes). * ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() (git-fixes). * ALSA: pci: lx6464es: fix a debug loop (git-fixes). * ARM: dts: at91: sam9x60: fix the ddr clock for sam9x60 (git-fixes). * ARM: dts: imx6qdl-gw560x: Remove incorrect 'uart-has-rtscts' (git-fixes). * ARM: dts: imx6ul-pico-dwarf: Use 'clock-frequency' (git-fixes). * ARM: dts: imx7d-pico: Use 'clock-frequency' (git-fixes). * ARM: dts: imx: Fix pca9547 i2c-mux node name (git-fixes). * ARM: dts: vf610: Fix pca9548 i2c-mux node names (git-fixes). * ARM: imx: add missing of_node_put() (git-fixes). * ASoC: Intel: boards: fix spelling in comments (git-fixes). * ASoC: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: bytcht_es8316: move comment to the right place (git-fixes). * ASoC: Intel: bytcr_rt5651: Drop reference count of ACPI device after use (git-fixes). * ASoC: Intel: bytcr_wm5102: Drop reference count of ACPI device after use (git-fixes). * ASoC: fsl-asoc-card: Fix naming of AC'97 CODEC widgets (git-fixes). * ASoC: fsl_micfil: Correct the number of steps on SX controls (git-fixes). * ASoC: fsl_ssi: Rename AC'97 streams to avoid collisions with AC'97 CODEC (git-fixes). * ASoC: topology: Return -ENOMEM on memory allocation failure (git-fixes). * Bluetooth: Fix possible deadlock in rfcomm_sk_state_change (git-fixes). * Bluetooth: hci_qca: Fix driver shutdown on closed serdev (git-fixes). * Fix page corruption caused by racy check in __free_pages (bsc#1208149). * HID: betop: check shape of output reports (git-fixes). * HID: betop: check shape of output reports (git-fixes, bsc#1207186). * HID: check empty report_list in bigben_probe() (git-fixes). * HID: check empty report_list in hid_validate_values() (git-fixes). * HID: check empty report_list in hid_validate_values() (git-fixes, bsc#1206784). * HID: intel_ish-hid: Add check for ishtp_dma_tx_map (git-fixes). * HID: playstation: sanity check DualSense calibration data (git-fixes). * HID: revert CHERRY_MOUSE_000C quirk (git-fixes). * IB/IPoIB: Fix legacy IPoIB due to wrong number of queues (git-fixes) * IB/hfi1: Fix expected receive setup error exit issues (git-fixes) * IB/hfi1: Immediately remove invalid memory from hardware (git-fixes) * IB/hfi1: Reject a zero-length user expected buffer (git-fixes) * IB/hfi1: Remove user expected buffer invalidate race (git-fixes) * IB/hfi1: Reserve user expected TIDs (git-fixes) * IB/hfi1: Restore allocated resources on failed copyout (git-fixes) * IB/mad: Do not call to function that might sleep while in atomic context (git-fixes). * KVM: x86: Check for existing Hyper-V vCPU in kvm_hv_vcpu_init() (bsc#1206616). * Move upstreamed net patch into sorted section * PCI/PM: Define pci_restore_standard_config() only for CONFIG_PM_SLEEP (bsc#1207269). * PM: AVS: qcom-cpr: Fix an error handling path in cpr_probe() (git-fixes). * RDMA/core: Fix ib block iterator counter overflow (bsc#1207878). * RDMA/core: Fix ib block iterator counter overflow (git-fixes) * RDMA/irdma: Fix potential NULL-ptr-dereference (git-fixes) * RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device (git-fixes) * RDMA/mlx5: Fix validation of max_rd_atomic caps for DC (git-fixes) * RDMA/rxe: Prevent faulty rkey generation (git-fixes) * RDMA/srp: Move large values to a new enum for gcc13 (git-fixes) * RDMA/usnic: use iommu_map_atomic() under spin_lock() (git-fixes) * Remove duplicate Git-commit tag in patch file * Revert "ARM: dts: armada-38x: Fix compatible string for gpios" (git-fixes). * Revert "ARM: dts: armada-39x: Fix compatible string for gpios" (git-fixes). * Revert "Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode" (git-fixes). * Revert "Revert "block, bfq: honor already-setup queue merges"" (git-fixes). * Revert "arm64: dts: meson-sm1-odroid-hc4: disable unused USB PHY0" (git- fixes). * Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()" (git-fixes). * SUNRPC: Do not dereference xprt->snd_task if it's a cookie (git-fixes). * SUNRPC: Use BIT() macro in rpc_show_xprt_state() (git-fixes). * USB: gadget: Fix use-after-free during usb config switch (git-fixes). * USB: misc: iowarrior: fix up header size for USB_DEVICE_ID_CODEMERCS_IOW100 (git-fixes). * USB: serial: cp210x: add SCALANCE LPE-9000 device id (git-fixes). * USB: serial: option: add Quectel EC200U modem (git-fixes). * USB: serial: option: add Quectel EM05-G (CS) modem (git-fixes). * USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes). * USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes). * USB: serial: option: add Quectel EM05CN (SG) modem (git-fixes). * USB: serial: option: add Quectel EM05CN modem (git-fixes). * arm64: Fix Freescale LPUART dependency (boo#1204063). * arm64: atomics: format whitespace consistently (git-fixes). * arm64: dts: imx8mm-beacon: Fix ecspi2 pinmux (git-fixes). * arm64: dts: imx8mm-venice-gw7901: fix USB2 controller OC polarity (git- fixes). * arm64: dts: imx8mm: Fix pad control for UART1_DTE_RX (git-fixes). * arm64: dts: imx8mq-thor96: fix no-mmc property for SDHCI (git-fixes). * arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes). * arm64: dts: meson-g12-common: Make mmc host controller interrupts level- sensitive (git-fixes). * arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes). * arm64: dts: qcom: msm8992-libra: Add CPU regulators (git-fixes). * arm64: dts: qcom: msm8992-libra: Fix the memory map (git-fixes). * arm64: dts: qcom: msm8992: Do not use sfpb mutex (git-fixes). * arm64: efi: Execute runtime services from a dedicated stack (git-fixes). * ata: libata: Fix sata_down_spd_limit() when no link speed is reported (git- fixes). * ath11k: Fix unexpected return buffer manager error for QCA6390 (git-fixes). * bcache: fix set_at_max_writeback_rate() for multiple attached devices (git- fixes). * bfq: fix use-after-free in bfq_dispatch_request (git-fixes). * bfq: fix waker_bfqq inconsistency crash (git-fixes). * blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes). * blk-mq: fix possible memleak when register 'hctx' failed (git-fixes). * blk-throttle: prevent overflow while calculating wait time (git-fixes). * blk-wbt: fix that 'rwb->wc' is always set to 1 in wbt_init() (git-fixes). * blktrace: Fix output non-blktrace event when blk_classic option enabled (git-fixes). * block, bfq: do not move oom_bfqq (git-fixes). * block, bfq: fix null pointer dereference in bfq_bio_bfqg() (git-fixes). * block, bfq: fix possible uaf for 'bfqq->bic' (git-fixes). * block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq (git-fixes). * block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes). * block, bfq: protect 'bfqd->queued' by 'bfqd->lock' (git-fixes). * block/bfq-iosched.c: use "false" rather than "BLK_RW_ASYNC" (git-fixes). * block/bfq_wf2q: correct weight to ioprio (git-fixes). * block/bio: remove duplicate append pages code (git-fixes). * block: check minor range in device_add_disk() (git-fixes). * block: clear ->slave_dir when dropping the main slave_dir reference (git- fixes). * block: do not allow splitting of a REQ_NOWAIT bio (git-fixes). * block: ensure iov_iter advances for added pages (git-fixes). * block: fix and cleanup bio_check_ro (git-fixes). * block: fix infinite loop for invalid zone append (git-fixes). * block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes). * block: mq-deadline: Fix dd_finish_request() for zoned devices (git-fixes). * block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes). * block: use bdev_get_queue() in bio.c (git-fixes). * bnx2x: fix pci device refcount leak in bnx2x_vf_is_pcie_pending() (git- fixes). * bnxt_en: Fix possible crash in bnxt_hwrm_set_coal() (git-fixes). * bnxt_en: Remove debugfs when pci_register_driver failed (git-fixes). * bnxt_en: add dynamic debug support for HWRM messages (git-fixes). * bnxt_en: fix potentially incorrect return value for ndo_rx_flow_steer (git- fixes). * bnxt_en: fix the handling of PCIE-AER (git-fixes). * bnxt_en: refactor bnxt_cancel_reservations() (git-fixes). * bpf: Fix a possible task gone issue with bpf_send_signal_thread helpers (git-fixes). * bpf: Skip task with pid=1 in send_signal_common() (git-fixes). * btrfs: add helper to delete a dir entry from a log tree (bsc#1207263). * btrfs: avoid inode logging during rename and link when possible (bsc#1207263). * btrfs: avoid logging all directory changes during renames (bsc#1207263). * btrfs: backport recent fixes for send/receive into SLE15 SP4/SP5 (bsc#1206036 bsc#1207500 ltc#201363). * btrfs: do not log unnecessary boundary keys when logging directory (bsc#1207263). * btrfs: fix assertion failure when logging directory key range item (bsc#1207263). * btrfs: fix processing of delayed data refs during backref walking (bsc#1206056 bsc#1207507 ltc#201367). * btrfs: fix processing of delayed tree block refs during backref walking (bsc#1206057 bsc#1207506 ltc#201368). * btrfs: fix race between quota enable and quota rescan ioctl (bsc#1207158). * btrfs: fix race between quota rescan and disable leading to NULL pointer deref (bsc#1207158). * btrfs: fix trace event name typo for FLUSH_DELAYED_REFS (git-fixes). * btrfs: join running log transaction when logging new name (bsc#1207263). * btrfs: move QUOTA_ENABLED check to rescan_should_stop from btrfs_qgroup_rescan_worker (bsc#1207158). * btrfs: pass the dentry to btrfs_log_new_name() instead of the inode (bsc#1207263). * btrfs: prepare extents to be logged before locking a log tree path (bsc#1207263). * btrfs: put initial index value of a directory in a constant (bsc#1207263). * btrfs: qgroup: remove duplicated check in adding qgroup relations (bsc#1207158). * btrfs: qgroup: remove outdated TODO comments (bsc#1207158). * btrfs: remove unnecessary NULL check for the new inode during rename exchange (bsc#1207263). * btrfs: remove useless path release in the fast fsync path (bsc#1207263). * btrfs: remove write and wait of struct walk_control (bsc#1207263). * btrfs: stop copying old dir items when logging a directory (bsc#1207263). * btrfs: stop doing unnecessary log updates during a rename (bsc#1207263). * btrfs: stop trying to log subdirectories created in past transactions (bsc#1207263). * btrfs: use single variable to track return value at btrfs_log_inode() (bsc#1207263). * bus: sunxi-rsb: Fix error handling in sunxi_rsb_init() (git-fixes). * can: j1939: do not wait 250 ms if the same addr was already claimed (git- fixes). * can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate (git-fixes). * ceph: flush cap releases when the session is flushed (bsc#1208428). * cifs: Fix uninitialized memory read for smb311 posix symlink create (git- fixes). * cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629). * cifs: do not include page data when checking signature (git-fixes). * cifs: do not query ifaces on smb1 mounts (git-fixes). * cifs: do not take exclusive lock for updating target hints (bsc#1193629). * cifs: fix double free on failed kerberos auth (git-fixes). * cifs: fix file info setting in cifs_open_file() (git-fixes). * cifs: fix file info setting in cifs_query_path_info() (git-fixes). * cifs: fix potential memory leaks in session setup (bsc#1193629). * cifs: fix race in assemble_neg_contexts() (bsc#1193629). * cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1193629). * cifs: handle cache lookup errors different than -ENOENT (bsc#1193629). * cifs: ignore ipc reconnect failures during dfs failover (bsc#1193629). * cifs: protect access of TCP_Server_Info::{dstaddr,hostname} (bsc#1193629). * cifs: remove duplicate code in __refresh_tcon() (bsc#1193629). * cifs: remove redundant assignment to the variable match (bsc#1193629). * cifs: remove unused function (bsc#1193629). * comedi: adv_pci1760: Fix PWM instruction handling (git-fixes). * cpufreq: Add Tegra234 to cpufreq-dt-platdev blocklist (git-fixes). * cpufreq: armada-37xx: stop using 0 as NULL pointer (git-fixes). * crypto: fixed DH and ECDH implemention for FIPS PCT (jsc#SLE-21132,bsc#1191256,bsc#1207184). * dm btree: add a defensive bounds check to insert_at() (git-fixes). * dm cache: Fix ABBA deadlock between shrink_slab and dm_cache_metadata_abort (git-fixes). * dm cache: Fix UAF in destroy() (git-fixes). * dm cache: set needs_check flag after aborting metadata (git-fixes). * dm clone: Fix UAF in clone_dtr() (git-fixes). * dm integrity: Fix UAF in dm_integrity_dtr() (git-fixes). * dm integrity: clear the journal on suspend (git-fixes). * dm integrity: flush the journal on suspend (git-fixes). * dm ioctl: fix misbehavior if list_versions races with module loading (git- fixes). * dm ioctl: prevent potential spectre v1 gadget (git-fixes). * dm raid: fix address sanitizer warning in raid_resume (git-fixes). * dm raid: fix address sanitizer warning in raid_status (git-fixes). * dm space map common: add bounds check to sm_ll_lookup_bitmap() (git-fixes). * dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata (git-fixes). * dm thin: Fix UAF in run_timer_softirq() (git-fixes). * dm thin: Use last transaction's pmd->root when commit failed (git-fixes). * dm thin: resume even if in FAIL mode (git-fixes). * dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes). * dm: fix alloc_dax error handling in alloc_dev (git-fixes). * dm: requeue IO if mapping table not yet available (git-fixes). * dmaengine: Fix double increment of client_count in dma_chan_get() (git- fixes). * dmaengine: idxd: Do not call DMX TX callbacks during workqueue disable (git- fixes). * dmaengine: idxd: Let probe fail when workqueue cannot be enabled (git- fixes). * dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init (git- fixes). * dmaengine: lgm: Move DT parsing after initialization (git-fixes). * dmaengine: tegra210-adma: fix global intr clear (git-fixes). * dmaengine: ti: k3-udma: Do conditional decrement of UDMA_CHAN_RT_PEER_BCNT_REG (git-fixes). * dmaengine: xilinx_dma: call of_node_put() when breaking out of for_each_child_of_node() (git-fixes). * docs: Fix the docs build with Sphinx 6.0 (git-fixes). * driver core: Fix test_async_probe_init saves device in wrong array (git- fixes). * drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes). * drivers: net: xgene: disable napi when register irq failed in xgene_enet_open() (git-fixes). * drivers:md:fix a potential use-after-free bug (git-fixes). * drm/amd/display: Calculate output_color_space after pixel encoding adjustment (git-fixes). * drm/amd/display: Fail atomic_check early on normalize_zpos error (git- fixes). * drm/amd/display: Fix COLOR_SPACE_YCBCR2020_TYPE matrix (git-fixes). * drm/amd/display: Fix set scaling doesn's work (git-fixes). * drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes). * drm/amd/display: Take emulated dc_sink into account for HDCP (bsc#1207734). * drm/amd/display: fix issues with driver unload (git-fixes). * drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git- fixes). * drm/amdgpu: complete gfxoff allow signal during suspend without delay (git- fixes). * drm/amdgpu: disable runtime pm on several sienna cichlid cards(v2) (git- fixes). * drm/amdgpu: drop experimental flag on aldebaran (git-fixes). * drm/hyperv: Add error message for fb size greater than allocated (git- fixes). * drm/i915/adlp: Fix typo for reference clock (git-fixes). * drm/i915/display: Check source height is > 0 (git-fixes). * drm/i915/gt: Reset twice (git-fixes). * drm/i915/selftest: fix intel_selftest_modify_policy argument types (git- fixes). * drm/i915: Fix VBT DSI DVO port handling (git-fixes). * drm/i915: Fix potential bit_17 double-free (git-fixes). * drm/i915: Initialize the obj flags for shmem objects (git-fixes). * drm/i915: re-disable RC6p on Sandy Bridge (git-fixes). * drm/panfrost: fix GENERIC_ATOMIC64 dependency (git-fixes). * drm/vc4: hdmi: make CEC adapter name unique (git-fixes). * drm/virtio: exbuf->fence_fd unmodified on interrupted wait (git-fixes). * drm: Add orientation quirk for Lenovo ideapad D330-10IGL (git-fixes). * efi: Accept version 2 of memory attributes table (git-fixes). * efi: fix potential NULL deref in efi_mem_reserve_persistent (git-fixes). * efi: rt-wrapper: Add missing include (git-fixes). * efi: tpm: Avoid READ_ONCE() for accessing the event log (git-fixes). * exit: Add and use make_task_dead (bsc#1207328). * exit: Allow oops_limit to be disabled (bsc#1207328). * exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328). * exit: Move force_uaccess back into do_exit (bsc#1207328). * exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328). * exit: Put an upper limit on how often we can oops (bsc#1207328). * exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328). * exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328). * ext4,f2fs: fix readahead of verity data (bsc#1207648). * ext4: Fixup pages without buffers (bsc#1205495). * ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619). * ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878). * ext4: add helper to check quota inums (bsc#1207618). * ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617). * ext4: add missing validation of fast-commit record lengths (bsc#1207626). * ext4: allocate extended attribute value in vmalloc area (bsc#1207635). * ext4: avoid crash when inline data creation follows DIO write (bsc#1206883). * ext4: avoid resizing to a partial cluster size (bsc#1206880). * ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634). * ext4: continue to expand file system when the target size does not reach (bsc#1206882). * ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592). * ext4: correct max_inline_xattr_value_size computing (bsc#1206878). * ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878). * ext4: disable fast-commit of encrypted dir operations (bsc#1207623). * ext4: do not allow journal inode to have encrypt flag (bsc#1207621). * ext4: do not increase iversion counter for ea_inodes (bsc#1207605). * ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603). * ext4: do not set up encryption key during jbd2 transaction (bsc#1207624). * ext4: drop ineligible txn start stop APIs (bsc#1207588). * ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606). * ext4: factor out ext4_fc_get_tl() (bsc#1207615). * ext4: fast commit may miss file actions (bsc#1207591). * ext4: fast commit may not fallback for ineligible commit (bsc#1207590). * ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886). * ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 (bsc#1206881). * ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620). * ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594). * ext4: fix deadlock due to mbcache entry corruption (bsc#1207653). * ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631). * ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608). * ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630). * ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593). * ext4: fix extent status tree race in writeback error recovery path (bsc#1206877). * ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636). * ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894). * ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625). * ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609). * ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884). * ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628). * ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611). * ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612). * ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616). * ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637). * ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627). * ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890). * ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893). * ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888). * ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622). * ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878). * ext4: fix warning in 'ext4_da_release_space' (bsc#1206887). * ext4: goto right label 'failed_mount3a' (bsc#1207610). * ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629). * ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633). * ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614). * ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602). * ext4: make ext4_lazyinit_thread freezable (bsc#1206885). * ext4: place buffer head allocation before handle start (bsc#1207607). * ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889). * ext4: simplify updating of fast commit stats (bsc#1207589). * ext4: update 'state->fc_regions_size' after successful memory allocation (bsc#1207613). * ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876). * extcon: usbc-tusb320: fix kernel-doc warning (git-fixes). * fbcon: Check font dimension limits (git-fixes). * fbdev: omapfb: avoid stack overflow warning (git-fixes). * fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes). * firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region (git-fixes). * firmware: arm_scmi: Harden shared memory access in fetch_notification (git- fixes). * firmware: arm_scmi: Harden shared memory access in fetch_response (git- fixes). * fpga: stratix10-soc: Fix return value check in s10_ops_write_init() (git- fixes). * fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632). * fs: remove __sync_filesystem (git-fixes). * fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429). * ftrace/x86: Add back ftrace_expected for ftrace bug reports (git-fixes). * ftrace: Clean comments related to FTRACE_OPS_FL_PER_CPU (git-fixes). * genirq: Provide new interfaces for affinity hints (bsc#1208153). * git_sort: add usb-linus branch for gregkh/usb * gsmi: fix null-deref in gsmi_get_variable (git-fixes). * hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap() (git-fixes). * i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes). * i2c: mv64xxx: Add atomic_xfer method to driver (git-fixes). * i2c: mv64xxx: Remove shutdown method from driver (git-fixes). * i2c: mxs: suppress probe-deferral error message (git-fixes). * i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes). * i40e: Disallow ip4 and ip6 l4_4_bytes (git-fixes). * i40e: Fix error handling in i40e_init_module() (git-fixes). * i40e: Fix not setting default xps_cpus after reset (git-fixes). * igb: Allocate MSI-X vector when testing (git-fixes). * iio: adc: berlin2-adc: Add missing of_node_put() in error path (git-fixes). * iio: adc: stm32-dfsdm: fill module aliases (git-fixes). * iio: hid: fix the retval in accel_3d_capture_sample (git-fixes). * iio: hid: fix the retval in gyro_3d_capture_sample (git-fixes). * iio: imu: fxos8700: fix ACCEL measurement range selection (git-fixes). * iio: imu: fxos8700: fix IMU data bits returned to user space (git-fixes). * iio: imu: fxos8700: fix MAGN sensor scale and unit (git-fixes). * iio: imu: fxos8700: fix failed initialization ODR mode assignment (git- fixes). * iio: imu: fxos8700: fix incomplete ACCEL and MAGN channels readback (git- fixes). * iio: imu: fxos8700: fix incorrect ODR mode readback (git-fixes). * iio: imu: fxos8700: fix map label of channel type to MAGN sensor (git- fixes). * iio: imu: fxos8700: fix swapped ACCEL and MAGN channels readback (git- fixes). * iio: imu: fxos8700: remove definition FXOS8700_CTRL_ODR_MIN (git-fixes). * iio:adc:twl6030: Enable measurement of VAC (git-fixes). * iio:adc:twl6030: Enable measurements of VUSB, VBAT and others (git-fixes). * ipmi:ssif: Add 60ms time internal between write retries (bsc#1206459). * ipmi:ssif: Add a timer between request retries (bsc#1206459). * ipmi:ssif: Increase the message retry time (bsc#1206459). * ipmi:ssif: Remove rtc_us_timer (bsc#1206459). * ipmi:ssif: resend_msg() cannot fail (bsc#1206459). * ipmi_ssif: Rename idle state and check (bsc#1206459). * ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network (git-fixes). * ixgbevf: Fix resource leak in ixgbevf_init_module() (git-fixes). * jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590). * jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646). * jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641). * jbd2: fix potential buffer head reference count leak (bsc#1207644). * jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645). * jbd2: use the correct print format (git-fixes). * jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643). * kABI workaround for struct acpi_ec (bsc#1207149). * kABI: Preserve TRACE_EVENT_FL values (git-fixes). * kabi/severities: add mlx5 internal symbols * kasan: no need to unset panic_on_warn in end_report() (bsc#1207328). * l2tp: Do not sleep and disable BH under writer-side sk_callback_lock (git- fixes). * loop: Fix the max_loop commandline argument treatment when it is set to 0 (git-fixes). * mbcache: Avoid nesting of cache->c_list_lock under bit locks (bsc#1207647). * mbcache: Fixup kABI of mb_cache_entry (bsc#1207653). * md/bitmap: Fix bitmap chunk size overflow issues (git-fixes). * md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes). * md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d (git-fixes). * md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes). * md: Notify sysfs sync_completed in md_reap_sync_thread() (git-fixes). * md: fix a crash in mempool_free (git-fixes). * md: protect md_unregister_thread from reentrancy (git-fixes). * mei: me: add meteor lake point M DID (git-fixes). * memory: atmel-sdramc: Fix missing clk_disable_unprepare in atmel_ramc_probe() (git-fixes). * memory: mvebu-devbus: Fix missing clk_disable_unprepare in mvebu_devbus_probe() (git-fixes). * memory: tegra: Remove clients SID override programming (git-fixes). * misc: fastrpc: Do not remove map on creater_process and device_release (git- fixes). * misc: fastrpc: Fix use-after-free race condition for maps (git-fixes). * mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769). * mm: compaction: kABI: avoid pglist_data kABI breakage (bsc#1207010). * mm: compaction: support triggering of proactive compaction by user (bsc#1207010). * mmc: sdhci-esdhc-imx: correct the tuning start tap and step setting (git- fixes). * mmc: sunxi-mmc: Fix clock refcount imbalance during unbind (git-fixes). * module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662). * mt76: fix use-after-free by removing a non-RCU wcid pointer (git-fixes). * mt76: mt7921: avoid unnecessary spin_lock/spin_unlock in mt7921_mcu_tx_done_event (git-fixes). * nbd: Fix hung on disconnect request if socket is closed before (git-fixes). * nbd: Fix hung when signal interrupts nbd_start_device_ioctl() (git-fixes). * nbd: call genl_unregister_family() first in nbd_cleanup() (git-fixes). * nbd: fix io hung while disconnecting device (git-fixes). * nbd: fix race between nbd_alloc_config() and module removal (git-fixes). * net/mlx4: Check retval of mlx4_bitmap_init (git-fixes). * net/mlx5: Dynamically resize flow counters query buffer (bsc#1195175). * net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1207842). * net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes). * net/x25: Fix to not accept on connected socket (git-fixes). * net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes). * net: cxgb3_main: disable napi when bind qsets failed in cxgb_up() (git- fixes). * net: ena: Fix error handling in ena_init() (git-fixes). * net: liquidio: release resources when liquidio driver open failed (git- fixes). * net: liquidio: simplify if expression (git-fixes). * net: macvlan: Use built-in RCU list checking (git-fixes). * net: macvlan: fix memory leaks of macvlan_common_newlink (git-fixes). * net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153). * net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875). * net: mana: Fix accessing freed irq affinity_hint (bsc#1208153). * net: mdio: validate parameter addr in mdiobus_get_phy() (git-fixes). * net: nfc: Fix use-after-free in local_cleanup() (git-fixes). * net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git- fixes). * net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices (git- fixes). * net: phy: meson-gxl: Add generic dummy stubs for MMD register access (git- fixes). * net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git- fixes). * net: tun: Fix memory leaks of napi_get_frags (git-fixes). * net: tun: Fix use-after-free in tun_detach() (git-fixes). * net: tun: call napi_schedule_prep() to ensure we own a napi (git-fixes). * net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git- fixes). * net: usb: sr9700: Handle negative len (git-fixes). * net: wan: Add checks for NULL for utdm in undo_uhdlc_init and unmap_si_regs (git-fixes). * netrom: Fix use-after-free caused by accept on already connected socket (git-fixes). * netrom: Fix use-after-free of a listening socket (git-fixes). * nilfs2: fix general protection fault in nilfs_btree_insert() (git-fixes). * null_blk: fix ida error handling in null_add_dev() (git-fixes). * nvdimm: disable namespace on error (bsc#1166486). * objtool: Add a missing comma to avoid string concatenation (bsc#1207328). * ocfs2: clear dinode links count in case of error (bsc#1207650). * ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649). * ocfs2: fix crash when mount with quota enabled (bsc#1207640). * ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652). * ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651). * ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770). * ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768). * ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771). * octeontx2-af: Fix reference count issue in rvu_sdp_init() (jsc#SLE-24682). * octeontx2-af: debugsfs: fix pci device refcount leak (git-fixes). * octeontx2-pf: Add check for devm_kcalloc (git-fixes). * octeontx2-pf: Fix potential memory leak in otx2_init_tc() (jsc#SLE-24682). * of/address: Return an error when no valid dma-ranges are found (git-fixes). * panic: Consolidate open-coded panic_on_warn checks (bsc#1207328). * panic: Introduce warn_limit (bsc#1207328). * panic: unset panic_on_warn inside panic() (bsc#1207328). * phy: Revert "phy: qualcomm: usb28nm: Add MDM9607 init sequence" (git-fixes). * phy: phy-can-transceiver: Skip warning if no "max-bitrate" (git-fixes). * phy: rockchip-inno-usb2: Fix missing clk_disable_unprepare() in rockchip_usb2phy_power_on() (git-fixes). * phy: ti: fix Kconfig warning and operator precedence (git-fixes). * pinctrl: amd: Add dynamic debugging for active GPIOs (git-fixes). * pinctrl: aspeed: Fix confusing types in return value (git-fixes). * pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git- fixes). * pinctrl: mediatek: Fix the drive register definition of some Pins (git- fixes). * pinctrl: rockchip: fix mux route data for rk3568 (git-fixes). * pinctrl: single: fix potential NULL dereference (git-fixes). * platform/x86: asus-nb-wmi: Add alternate mapping for KEY_SCREENLOCK (git- fixes). * platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git- fixes). * platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes). * platform/x86: touchscreen_dmi: Add info for the CSL Panther Tab HD (git- fixes). * powerpc/64s/radix: Fix RWX mapping with relocated kernel (bsc#1194869). * powerpc/64s/radix: Fix crash with unaligned relocated kernel (bsc#1194869). * powerpc/64s: Fix local irq disable when PMIs are disabled (bsc#1195655 ltc#1195655 git-fixes). * powerpc/kexec_file: Count hot-pluggable memory in FDT estimate (bsc#1194869). * powerpc/kexec_file: Fix division by zero in extra size estimation (bsc#1194869). * powerpc/vmlinux.lds: Add an explicit symbol for the SRWX boundary (bsc#1194869). * powerpc/vmlinux.lds: Ensure STRICT_ALIGN_SIZE is at least page aligned (bsc#1194869). * powerpc: move __end_rodata to cover arch read-only sections (bsc#1194869). * qlcnic: fix sleep-in-atomic-context bugs caused by msleep (git-fixes). * quota: Check next/prev free block number after reading from quota file (bsc#1206640). * quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639). * r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes). * r8169: move rtl_wol_enable_rx() and rtl_prepare_power_down() (git-fixes). * regulator: da9211: Use irq handler when ready (git-fixes). * rpm/mkspec-dtb: add riscv64 dtb-renesas subpackage * s390/qeth: fix various format strings (git-fixes). * sched, cpuset: Fix dl_cpu_busy() panic due to empty (git-fixes) * sched/core: Fix arch_scale_freq_tick() on tickless systems (git-fixes) * sched/core: Introduce sched_asym_cpucap_active() (git-fixes) * sched/deadline: Merge dl_task_can_attach() and dl_cpu_busy() (git-fixes) * sched/tracing: Report TASK_RTLOCK_WAIT tasks as (git-fixes) * sched/uclamp: Make asym_fits_capacity() use util_fits_cpu() (git-fixes) * sched: Avoid double preemption in __cond_resched_ _lock_ () (git-fixes) * scsi: Revert "scsi: core: map PQ=1, PDT=other values to SCSI_SCAN_TARGET_PRESENT" (git-fixes). * scsi: core: Fix a race between scsi_done() and scsi_timeout() (git-fixes). * scsi: efct: Fix possible memleak in efct_device_init() (git-fixes). * scsi: elx: libefc: Fix second parameter type in state callbacks (git-fixes). * scsi: fcoe: Fix possible name leak when device_register() fails (git-fixes). * scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails (git- fixes). * scsi: hpsa: Fix allocation size for scsi_host_alloc() (git-fixes). * scsi: hpsa: Fix error handling in hpsa_add_sas_host() (git-fixes). * scsi: hpsa: Fix possible memory leak in hpsa_add_sas_device() (git-fixes). * scsi: hpsa: Fix possible memory leak in hpsa_init_one() (git-fixes). * scsi: ipr: Fix WARNING in ipr_init() (git-fixes). * scsi: mpi3mr: Refer CONFIG_SCSI_MPI3MR in Makefile (git-fixes). * scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add() (git-fixes). * scsi: mpt3sas: Remove scsi_dma_map() error messages (git-fixes). * scsi: scsi_debug: Fix a warning in resp_report_zones() (git-fixes). * scsi: scsi_debug: Fix a warning in resp_verify() (git-fixes). * scsi: scsi_debug: Fix a warning in resp_write_scat() (git-fixes). * scsi: scsi_debug: Fix possible name leak in sdebug_add_host_helper() (git- fixes). * scsi: snic: Fix possible UAF in snic_tgt_create() (git-fixes). * scsi: storvsc: Correct reporting of Hyper-V I/O size limits (git-fixes). * scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM (bsc#1206006). * scsi: tracing: Fix compile error in trace_array calls when TRACING is disabled (git-fixes). * scsi: ufs: Stop using the clock scaling lock in the error handler (git- fixes). * scsi: ufs: core: Enable link lost interrupt (git-fixes). * sctp: fail if no bound addresses can be used for a given scope (bsc#1206677). * selftests/vm: remove ARRAY_SIZE define from individual tests (git-fixes). * selftests: Provide local define of __cpuid_count() (git-fixes). * selftests: forwarding: lib: quote the sysctl values (git-fixes). * selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes). * selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes). * selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes). * selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes). * serial: 8250_dma: Fix DMA Rx rearm race (git-fixes). * serial: atmel: fix incorrect baudrate setup (git-fixes). * serial: pch_uart: Pass correct sg to dma_unmap_sg() (git-fixes). * sfc: fix potential memleak in __ef100_hard_start_xmit() (git-fixes). * signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes). * soc: imx8m: Fix incorrect check for of_clk_get_by_name() (git-fixes). * spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes). * spi: spidev: remove debug messages that access spidev->spi without locking (git-fixes). * staging: mt7621-dts: change some node hex addresses to lower case (git- fixes). * staging: vchiq_arm: fix enum vchiq_status return types (git-fixes). * swim3: add missing major.h include (git-fixes). * sysctl: add a new register_sysctl_init() interface (bsc#1207328). * tcp: prohibit TCP_REPAIR_OPTIONS if data was already sent (git-fixes). * thermal/core: Remove duplicate information when an error occurs (git-fixes). * thunderbolt: Do not call PM runtime functions in tb_retimer_scan() (git- fixes). * thunderbolt: Do not report errors if on-board retimers are found (git- fixes). * thunderbolt: Use correct function to calculate maximum USB3 link rate (git- fixes). * tick/nohz: Use WARN_ON_ONCE() to prevent console saturation. * tick/sched: Fix non-kernel-doc comment (git-fixes). * tomoyo: fix broken dependency on *.conf.default (git-fixes). * tools: fix ARRAY_SIZE defines in tools and selftests hdrs (git-fixes). * trace_events_hist: add check for return value of 'create_hist_field' (git- fixes). * tracing/hist: Fix issue of losting command info in error_log (git-fixes). * tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx' (git- fixes). * tracing/hist: Fix wrong return value in parse_action_params() (git-fixes). * tracing/osnoise: Make osnoise_main to sleep for microseconds (git-fixes). * tracing/perf: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes). * tracing/probes: Handle system names with hyphens (git-fixes). * tracing: Add '__rel_loc' using trace event macros (git-fixes). * tracing: Add DYNAMIC flag for dynamic events (git-fixes). * tracing: Add trace_event helper macros __string_len() and __assign_str_len() (git-fixes). * tracing: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes). * tracing: Do not use out-of-sync va_list in event printing (git-fixes). * tracing: Ensure trace buffer is at least 4096 bytes large (git-fixes). * tracing: Fix a kmemleak false positive in tracing_map (git-fixes). * tracing: Fix complicated dependency of CONFIG_TRACER_MAX_TRACE (git-fixes). * tracing: Fix infinite loop in tracing_read_pipe on overflowed print_trace_line (git-fixes). * tracing: Fix issue of missing one synthetic field (git-fixes). * tracing: Fix mismatched comment in __string_len (git-fixes). * tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes). * tracing: Fix possible memory leak in __create_synth_event() error path (git- fixes). * tracing: Fix race where histograms can be called before the event (git- fixes). * tracing: Fix sleeping function called from invalid context on RT kernel (git-fixes). * tracing: Fix tp_printk option related with tp_printk_stop_on_boot (git- fixes). * tracing: Fix warning on variable 'struct trace_array' (git-fixes). * tracing: Have TRACE_DEFINE_ENUM affect trace event types as well (git- fixes). * tracing: Have syscall trace events use trace_event_buffer_lock_reserve() (git-fixes). * tracing: Have type enum modifications copy the strings (git-fixes). * tracing: Make sure trace_printk() can output as soon as it can be used (git- fixes). * tracing: Make tp_printk work on syscall tracepoints (git-fixes). * tracing: Use alignof__(struct {type b;}) instead of offsetof() (git-fixes). * tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate (git-fixes). * tty: fix possible null-ptr-defer in spk_ttyio_release (git-fixes). * tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer (git-fixes). * ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328). * usb-storage: apply IGNORE_UAS only for HIKSEMI MD202 on RTL9210 (git-fixes). * usb: acpi: add helper to check port lpm capability using acpi _DSM (git- fixes). * usb: cdns3: remove fetched trb from cache before dequeuing (git-fixes). * usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes). * usb: core: hub: disable autosuspend for TI TUSB8041 (git-fixes). * usb: dwc3: qcom: enable vbus override when in OTG dr-mode (git-fixes). * usb: fotg210-udc: Fix ages old endianness issues (git-fixes). * usb: gadget: f_fs: Ensure ep0req is dequeued before free_request (git- fixes). * usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait (git- fixes). * usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait (git-fixes). * usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes). * usb: gadget: f_hid: fix refcount leak on error path (git-fixes). * usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() (git- fixes). * usb: gadget: f_uac2: Fix incorrect increment of bNumEndpoints (git-fixes). * usb: gadget: g_webcam: Send color matching descriptor per frame (git-fixes). * usb: gadget: udc: core: Print error code in usb_gadget_probe_driver() (git- fixes). * usb: gadget: udc: core: Revise comments for USB ep enable/disable (git- fixes). * usb: gadget: udc: core: Use pr_fmt() to prefix messages (git-fixes). * usb: gadget: udc: core: remove usage of list iterator past the loop body (git-fixes). * usb: host: ehci-fsl: Fix module alias (git-fixes). * usb: typec: altmodes/displayport: Add pin assignment helper (git-fixes). * usb: typec: altmodes/displayport: Fix pin assignment calculation (git- fixes). * usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes). * usb: typec: tcpm: Fix altmode re-registration causes sysfs create fail (git- fixes). * usb: xhci: Check endpoint is valid before dereferencing it (git-fixes). * vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (git-fixes). * vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642). * vfs: make sync_filesystem return errors from ->sync_fs (git-fixes). * virtio-blk: modify the value type of num in virtio_queue_rq() (git-fixes). * virtio-net: correctly enable callback during start_xmit (git-fixes). * virtio_pci: modify ENOENT to EINVAL (git-fixes). * w1: fix WARNING after calling w1_process() (git-fixes). * w1: fix deadloop in __w1_remove_master_device() (git-fixes). * wait: Fix __wait_event_hrtimeout for RT/DL tasks (git-fixes) * watchdog-diag288_wdt-fix-__diag288-inline-assembly.patch * watchdog/hpwdt: Enable HP_WATCHDOG for ARM64 systems. (jsc#PED-3210) * watchdog: diag288_wdt: do not use stack buffers for hardware data (bsc#1207497). * watchdog: diag288_wdt: fix __diag288() inline assembly (bsc#1207497). * wifi: brcmfmac: fix regression for Broadcom PCIe wifi devices (git-fixes). * wifi: mac80211: sdata can be NULL during AMPDU start (git-fixes). * wifi: mt76: mt7921: add mt7921_mutex_acquire at mt7921_sta_set_decap_offload (git-fixes). * wifi: mt76: mt7921e: fix race issue between reset and suspend/resume (git- fixes). * wifi: mt76: sdio: fix the deadlock caused by sdio->stat_work (git-fixes). * wifi: mt76: sdio: poll sta stat when device transmits data (git-fixes). * wifi: rndis_wlan: Prevent buffer overflow in rndis_query_oid (git-fixes). * writeback: avoid use-after-free after removing device (bsc#1207638). * x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes). * x86/asm: Fix an assembler warning with current binutils (git-fixes). * x86/boot: Avoid using Intel mnemonics in AT&T syntax asm (git-fixes). * x86/hyperv: Remove unregister syscore call from Hyper-V cleanup (git-fixes). * x86/hyperv: Restore VP assist page after cpu offlining/onlining (git-fixes). * x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git- fixes). * x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git- fixes). * x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes). * x86/microcode/intel: Do not retry microcode reloading on the APs (git- fixes). * x86: ACPI: cstate: Optimize C3 entry on AMD CPUs (git-fixes). * xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git- fixes). * xfs: estimate post-merge refcounts correctly (bsc#1208183). * xfs: fix incorrect error-out in xfs_remove (git-fixes). * xfs: fix incorrect i_nlink caused by inode racing (git-fixes). * xfs: fix maxlevels comparisons in the btree staging code (git-fixes). * xfs: fix memory leak in xfs_errortag_init (git-fixes). * xfs: get rid of assert from xfs_btree_islastblock (git-fixes). * xfs: get root inode correctly at bulkstat (git-fixes). * xfs: hoist refcount record merge predicates (bsc#1208183). * xfs: initialize the check_owner object fully (git-fixes). * xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes). * xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes). * xfs: return errors in xfs_fs_sync_fs (git-fixes). * xfs: xfstest fails with error missing kernel patch (git-fixes bsc#1207501 ltc#201370). * xhci-pci: set the dma max_seg_size (git-fixes). * xhci: Fix null pointer dereference when host dies (git-fixes). * zram: Delete patch for regression addressed (bsc#1207933). * zram: do not lookup algorithm in backends table (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2023-488=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-488=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-488=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2023-488=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2023-488=1 * SUSE Real Time Module 15-SP4 zypper in -t patch SUSE-SLE-Module-RT-15-SP4-2023-488=1 ## Package List: * openSUSE Leap Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.11.1 * openSUSE Leap Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt-debugsource-5.14.21-150400.15.11.1 * openSUSE Leap 15.4 (x86_64) * kernel-rt_debug-debugsource-5.14.21-150400.15.11.1 * kernel-rt-debugsource-5.14.21-150400.15.11.1 * kernel-rt-devel-debuginfo-5.14.21-150400.15.11.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt_debug-devel-5.14.21-150400.15.11.1 * kernel-rt-devel-5.14.21-150400.15.11.1 * dlm-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt_debug-debuginfo-5.14.21-150400.15.11.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.11.1 * dlm-kmp-rt-5.14.21-150400.15.11.1 * kernel-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-syms-rt-5.14.21-150400.15.11.1 * ocfs2-kmp-rt-5.14.21-150400.15.11.1 * gfs2-kmp-rt-5.14.21-150400.15.11.1 * cluster-md-kmp-rt-5.14.21-150400.15.11.1 * gfs2-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * openSUSE Leap 15.4 (noarch) * kernel-devel-rt-5.14.21-150400.15.11.1 * kernel-source-rt-5.14.21-150400.15.11.1 * openSUSE Leap 15.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.11.1 * kernel-rt_debug-5.14.21-150400.15.11.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.11.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt-debugsource-5.14.21-150400.15.11.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.11.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt-debugsource-5.14.21-150400.15.11.1 * SUSE Linux Enterprise Live Patching 15-SP4 (x86_64) * kernel-livepatch-5_14_21-150400_15_11-rt-1-150400.1.3.1 * kernel-livepatch-SLE15-SP4-RT_Update_3-debugsource-1-150400.1.3.1 * kernel-livepatch-5_14_21-150400_15_11-rt-debuginfo-1-150400.1.3.1 * SUSE Real Time Module 15-SP4 (x86_64) * kernel-rt_debug-debugsource-5.14.21-150400.15.11.1 * kernel-rt-debugsource-5.14.21-150400.15.11.1 * kernel-rt-devel-debuginfo-5.14.21-150400.15.11.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt_debug-devel-5.14.21-150400.15.11.1 * kernel-rt-devel-5.14.21-150400.15.11.1 * dlm-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-rt_debug-debuginfo-5.14.21-150400.15.11.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150400.15.11.1 * dlm-kmp-rt-5.14.21-150400.15.11.1 * kernel-rt-debuginfo-5.14.21-150400.15.11.1 * kernel-syms-rt-5.14.21-150400.15.11.1 * ocfs2-kmp-rt-5.14.21-150400.15.11.1 * gfs2-kmp-rt-5.14.21-150400.15.11.1 * cluster-md-kmp-rt-5.14.21-150400.15.11.1 * gfs2-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150400.15.11.1 * SUSE Real Time Module 15-SP4 (noarch) * kernel-devel-rt-5.14.21-150400.15.11.1 * kernel-source-rt-5.14.21-150400.15.11.1 * SUSE Real Time Module 15-SP4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.11.1 * kernel-rt_debug-5.14.21-150400.15.11.1 ## References: * https://www.suse.com/security/cve/CVE-2020-24588.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-4382.html * https://www.suse.com/security/cve/CVE-2022-47929.html * https://www.suse.com/security/cve/CVE-2023-0045.html * https://www.suse.com/security/cve/CVE-2023-0122.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-0266.html * https://www.suse.com/security/cve/CVE-2023-0590.html * https://www.suse.com/security/cve/CVE-2023-23454.html * https://www.suse.com/security/cve/CVE-2023-23455.html * https://bugzilla.suse.com/show_bug.cgi?id=1166486 * https://bugzilla.suse.com/show_bug.cgi?id=1185861 * https://bugzilla.suse.com/show_bug.cgi?id=1185863 * https://bugzilla.suse.com/show_bug.cgi?id=1186449 * https://bugzilla.suse.com/show_bug.cgi?id=1191256 * https://bugzilla.suse.com/show_bug.cgi?id=1192868 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1195175 * https://bugzilla.suse.com/show_bug.cgi?id=1195655 * https://bugzilla.suse.com/show_bug.cgi?id=1196058 * https://bugzilla.suse.com/show_bug.cgi?id=1199701 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1204063 * https://bugzilla.suse.com/show_bug.cgi?id=1204356 * https://bugzilla.suse.com/show_bug.cgi?id=1204662 * https://bugzilla.suse.com/show_bug.cgi?id=1205495 * https://bugzilla.suse.com/show_bug.cgi?id=1206006 * https://bugzilla.suse.com/show_bug.cgi?id=1206036 * https://bugzilla.suse.com/show_bug.cgi?id=1206056 * https://bugzilla.suse.com/show_bug.cgi?id=1206057 * https://bugzilla.suse.com/show_bug.cgi?id=1206224 * https://bugzilla.suse.com/show_bug.cgi?id=1206258 * https://bugzilla.suse.com/show_bug.cgi?id=1206363 * https://bugzilla.suse.com/show_bug.cgi?id=1206459 * https://bugzilla.suse.com/show_bug.cgi?id=1206616 * https://bugzilla.suse.com/show_bug.cgi?id=1206640 * https://bugzilla.suse.com/show_bug.cgi?id=1206677 * https://bugzilla.suse.com/show_bug.cgi?id=1206784 * https://bugzilla.suse.com/show_bug.cgi?id=1206876 * https://bugzilla.suse.com/show_bug.cgi?id=1206877 * https://bugzilla.suse.com/show_bug.cgi?id=1206878 * https://bugzilla.suse.com/show_bug.cgi?id=1206880 * https://bugzilla.suse.com/show_bug.cgi?id=1206881 * https://bugzilla.suse.com/show_bug.cgi?id=1206882 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1206885 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1206888 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1206890 * https://bugzilla.suse.com/show_bug.cgi?id=1206893 * https://bugzilla.suse.com/show_bug.cgi?id=1206894 * https://bugzilla.suse.com/show_bug.cgi?id=1207010 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207036 * https://bugzilla.suse.com/show_bug.cgi?id=1207050 * https://bugzilla.suse.com/show_bug.cgi?id=1207125 * https://bugzilla.suse.com/show_bug.cgi?id=1207134 * https://bugzilla.suse.com/show_bug.cgi?id=1207149 * https://bugzilla.suse.com/show_bug.cgi?id=1207158 * https://bugzilla.suse.com/show_bug.cgi?id=1207184 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207188 * https://bugzilla.suse.com/show_bug.cgi?id=1207189 * https://bugzilla.suse.com/show_bug.cgi?id=1207190 * https://bugzilla.suse.com/show_bug.cgi?id=1207237 * https://bugzilla.suse.com/show_bug.cgi?id=1207263 * https://bugzilla.suse.com/show_bug.cgi?id=1207269 * https://bugzilla.suse.com/show_bug.cgi?id=1207328 * https://bugzilla.suse.com/show_bug.cgi?id=1207497 * https://bugzilla.suse.com/show_bug.cgi?id=1207500 * https://bugzilla.suse.com/show_bug.cgi?id=1207501 * https://bugzilla.suse.com/show_bug.cgi?id=1207506 * https://bugzilla.suse.com/show_bug.cgi?id=1207507 * https://bugzilla.suse.com/show_bug.cgi?id=1207588 * https://bugzilla.suse.com/show_bug.cgi?id=1207589 * https://bugzilla.suse.com/show_bug.cgi?id=1207590 * https://bugzilla.suse.com/show_bug.cgi?id=1207591 * https://bugzilla.suse.com/show_bug.cgi?id=1207592 * https://bugzilla.suse.com/show_bug.cgi?id=1207593 * https://bugzilla.suse.com/show_bug.cgi?id=1207594 * https://bugzilla.suse.com/show_bug.cgi?id=1207602 * https://bugzilla.suse.com/show_bug.cgi?id=1207603 * https://bugzilla.suse.com/show_bug.cgi?id=1207605 * https://bugzilla.suse.com/show_bug.cgi?id=1207606 * https://bugzilla.suse.com/show_bug.cgi?id=1207607 * https://bugzilla.suse.com/show_bug.cgi?id=1207608 * https://bugzilla.suse.com/show_bug.cgi?id=1207609 * https://bugzilla.suse.com/show_bug.cgi?id=1207610 * https://bugzilla.suse.com/show_bug.cgi?id=1207611 * https://bugzilla.suse.com/show_bug.cgi?id=1207612 * https://bugzilla.suse.com/show_bug.cgi?id=1207613 * https://bugzilla.suse.com/show_bug.cgi?id=1207614 * https://bugzilla.suse.com/show_bug.cgi?id=1207615 * https://bugzilla.suse.com/show_bug.cgi?id=1207616 * https://bugzilla.suse.com/show_bug.cgi?id=1207617 * https://bugzilla.suse.com/show_bug.cgi?id=1207618 * https://bugzilla.suse.com/show_bug.cgi?id=1207619 * https://bugzilla.suse.com/show_bug.cgi?id=1207620 * https://bugzilla.suse.com/show_bug.cgi?id=1207621 * https://bugzilla.suse.com/show_bug.cgi?id=1207622 * https://bugzilla.suse.com/show_bug.cgi?id=1207623 * https://bugzilla.suse.com/show_bug.cgi?id=1207624 * https://bugzilla.suse.com/show_bug.cgi?id=1207625 * https://bugzilla.suse.com/show_bug.cgi?id=1207626 * https://bugzilla.suse.com/show_bug.cgi?id=1207627 * https://bugzilla.suse.com/show_bug.cgi?id=1207628 * https://bugzilla.suse.com/show_bug.cgi?id=1207629 * https://bugzilla.suse.com/show_bug.cgi?id=1207630 * https://bugzilla.suse.com/show_bug.cgi?id=1207631 * https://bugzilla.suse.com/show_bug.cgi?id=1207632 * https://bugzilla.suse.com/show_bug.cgi?id=1207633 * https://bugzilla.suse.com/show_bug.cgi?id=1207634 * https://bugzilla.suse.com/show_bug.cgi?id=1207635 * https://bugzilla.suse.com/show_bug.cgi?id=1207636 * https://bugzilla.suse.com/show_bug.cgi?id=1207637 * https://bugzilla.suse.com/show_bug.cgi?id=1207638 * https://bugzilla.suse.com/show_bug.cgi?id=1207639 * https://bugzilla.suse.com/show_bug.cgi?id=1207640 * https://bugzilla.suse.com/show_bug.cgi?id=1207641 * https://bugzilla.suse.com/show_bug.cgi?id=1207642 * https://bugzilla.suse.com/show_bug.cgi?id=1207643 * https://bugzilla.suse.com/show_bug.cgi?id=1207644 * https://bugzilla.suse.com/show_bug.cgi?id=1207645 * https://bugzilla.suse.com/show_bug.cgi?id=1207646 * https://bugzilla.suse.com/show_bug.cgi?id=1207647 * https://bugzilla.suse.com/show_bug.cgi?id=1207648 * https://bugzilla.suse.com/show_bug.cgi?id=1207649 * https://bugzilla.suse.com/show_bug.cgi?id=1207650 * https://bugzilla.suse.com/show_bug.cgi?id=1207651 * https://bugzilla.suse.com/show_bug.cgi?id=1207652 * https://bugzilla.suse.com/show_bug.cgi?id=1207653 * https://bugzilla.suse.com/show_bug.cgi?id=1207734 * https://bugzilla.suse.com/show_bug.cgi?id=1207768 * https://bugzilla.suse.com/show_bug.cgi?id=1207769 * https://bugzilla.suse.com/show_bug.cgi?id=1207770 * https://bugzilla.suse.com/show_bug.cgi?id=1207771 * https://bugzilla.suse.com/show_bug.cgi?id=1207773 * https://bugzilla.suse.com/show_bug.cgi?id=1207795 * https://bugzilla.suse.com/show_bug.cgi?id=1207842 * https://bugzilla.suse.com/show_bug.cgi?id=1207875 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1207933 * https://bugzilla.suse.com/show_bug.cgi?id=1208030 * https://bugzilla.suse.com/show_bug.cgi?id=1208044 * https://bugzilla.suse.com/show_bug.cgi?id=1208085 * https://bugzilla.suse.com/show_bug.cgi?id=1208149 * https://bugzilla.suse.com/show_bug.cgi?id=1208153 * https://bugzilla.suse.com/show_bug.cgi?id=1208183 * https://bugzilla.suse.com/show_bug.cgi?id=1208428 * https://bugzilla.suse.com/show_bug.cgi?id=1208429 * https://jira.suse.com/browse/PED-3210 * https://jira.suse.com/browse/SLE-21132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:54:35 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:54:35 -0000 Subject: SUSE-SU-2023:1863-1: important: Security update for shim Message-ID: <170903847553.30382.4041278995468175900@smelt2.prg2.suse.org> # Security update for shim Announcement ID: SUSE-SU-2023:1863-1 Rating: important References: * bsc#1185232 * bsc#1185261 * bsc#1185441 * bsc#1185621 * bsc#1187071 * bsc#1187260 * bsc#1193282 * bsc#1193315 * bsc#1198458 * bsc#1201066 * bsc#1202120 * bsc#1205588 * jsc#PED-127 * jsc#PED-1273 Cross-References: * CVE-2022-28737 CVSS scores: * CVE-2022-28737 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-28737 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE OpenStack Cloud 9 * SUSE OpenStack Cloud Crowbar 9 An update that solves one vulnerability, contains two features and has 11 security fixes can now be installed. ## Description: This update for shim fixes the following issues: * Updated shim signature after shim 15.7 be signed back: signature- sles.x86_64.asc, signature-sles.aarch64.asc (bsc#1198458) * Add POST_PROCESS_PE_FLAGS=-N to the build command in shim.spec to disable the NX compatibility flag when using post-process-pe because grub2 is not ready. (bsc#1205588) * Enable the NX compatibility flag by default. (jsc#PED-127) Update to 15.7 (bsc#1198458) (jsc#PED-127): * Make SBAT variable payload introspectable * Reference MokListRT instead of MokList * Add a link to the test plan in the readme. * [V3] Enable TDX measurement to RTMR register * Discard load-options that start with a NUL * Fixed load_cert_file bugs * Add -malign-double to IA32 compiler flags * pe: Fix image section entry-point validation * make-archive: Build reproducible tarball * mok: remove MokListTrusted from PCR 7 Other fixes: * Support enhance shim measurement to TD RTMR. (jsc#PED-1273) * shim-install: ensure grub.cfg created is not overwritten after installing grub related files * Add logic to shim.spec to only set sbat policy when efivarfs is writeable. (bsc#1201066) * Add logic to shim.spec for detecting --set-sbat-policy option before using mokutil to set sbat policy. (bsc#1202120) * Change the URL in SBAT section to mail:security at suse.de. (bsc#1193282) Update to 15.6 (bsc#1198458): * MokManager: removed Locate graphic output protocol fail error message * shim: implement SBAT verification for the shim_lock protocol * post-process-pe: Fix a missing return code check * Update github actions matrix to be more useful * post-process-pe: Fix format string warnings on 32-bit platforms * Allow MokListTrusted to be enabled by default * Re-add ARM AArch64 support * Use ASCII as fallback if Unicode Box Drawing characters fail * make: don't treat cert.S specially * shim: use SHIM_DEVEL_VERBOSE when built in devel mode * Break out of the inner sbat loop if we find the entry. * Support loading additional certificates * Add support for NX (W^X) mitigations. * Fix preserve_sbat_uefi_variable() logic * SBAT Policy latest should be a one-shot * pe: Fix a buffer overflow when SizeOfRawData > VirtualSize * pe: Perform image verification earlier when loading grub * Update advertised sbat generation number for shim * Update SBAT generation requirements for 05/24/22 * Also avoid CVE-2022-28737 in verify_image() by @vathpela Update to 15.5 (bsc#1198458): * Broken ia32 relocs and an unimportant submodule change. * mok: allocate MOK config table as BootServicesData * Don't call QueryVariableInfo() on EFI 1.10 machines (bsc#1187260) * Relax the check for import_mok_state() (bsc#1185261) * SBAT.md: trivial changes * shim: another attempt to fix load options handling * Add tests for our load options parsing. * arm/aa64: fix the size of .rela* sections * mok: fix potential buffer overrun in import_mok_state * mok: relax the maximum variable size check * Don't unhook ExitBootServices when EBS protection is disabled * fallback: find_boot_option() needs to return the index for the boot entry in optnum * httpboot: Ignore case when checking HTTP headers * Fallback allocation errors * shim: avoid BOOTx64.EFI in message on other architectures * str: remove duplicate parameter check * fallback: add compile option FALLBACK_NONINTERACTIVE * Test mok mirror * Modify sbat.md to help with readability. * csv: detect end of csv file correctly * Specify that the .sbat section is ASCII not UTF-8 * tests: add "include-fixed" GCC directory to include directories * pe: simplify generate_hash() * Don't make shim abort when TPM log event fails (RHBZ #2002265) * Fallback to default loader if parsed one does not exist * fallback: Fix for BootOrder crash when index returned * Better console checks * docs: update SBAT UEFI variable name * Don't parse load options if invoked from removable media path * fallback: fix fallback not passing arguments of the first boot option * shim: Don't stop forever at "Secure Boot not enabled" notification * Allocate mokvar table in runtime memory. * Remove post-process-pe on 'make clean' * pe: missing perror argument * CVE-2022-28737: Fixed a buffer overflow when SizeOfRawData > VirtualSize (bsc#1198458) * Add mokutil command to post script for setting sbat policy to latest mode when the SbatPolicy-605dab50-e046-4300-abb6-3dd810dd8b23 is not created. (bsc#1198458) * Updated vendor dbx binary and script (bsc#1198458) * Updated dbx-cert.tar.xz and vendor-dbx-sles.bin for adding SLES-UEFI-SIGN- Certificate-2021-05.crt to vendor dbx list. * Updated dbx-cert.tar.xz and vendor-dbx-opensuse.bin for adding openSUSE- UEFI-SIGN-Certificate-2021-05.crt to vendor dbx list. * Updated vendor-dbx.bin for adding SLES-UEFI-SIGN-Certificate-2021-05.crt and openSUSE-UEFI-SIGN-Certificate-2021-05.crt for testing environment. * Updated generate-vendor-dbx.sh script for generating a vendor-dbx.bin file which includes all .der for testing environment. * avoid buffer overflow when copying data to the MOK config table (bsc#1185232) * Disable exporting vendor-dbx to MokListXRT since writing a large RT variable could crash some machines (bsc#1185261) * ignore the odd LoadOptions length (bsc#1185232) * shim-install: reset def_shim_efi to "shim.efi" if the given file doesn't exist * relax the maximum variable size check for u-boot (bsc#1185621) * handle ignore_db and user_insecure_mode correctly (bsc#1185441, bsc#1187071) * Split the keys in vendor-dbx.bin to vendor-dbx-sles and vendor-dbx-opensuse for shim-sles and shim-opensuse to reduce the size of MokListXRT (bsc#1185261) * Also update generate-vendor-dbx.sh in dbx-cert.tar.xz ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE OpenStack Cloud 9 zypper in -t patch SUSE-OpenStack-Cloud-9-2023-1863=1 * SUSE OpenStack Cloud Crowbar 9 zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2023-1863=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 zypper in -t patch SUSE-SLE-SAP-12-SP4-2023-1863=1 * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 zypper in -t patch SUSE-SLE-SERVER-12-SP4-ESPOS-2023-1863=1 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2023-1863=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-1863=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-1863=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-1863=1 ## Package List: * SUSE OpenStack Cloud 9 (x86_64) * shim-15.7-25.24.1 * SUSE OpenStack Cloud Crowbar 9 (x86_64) * shim-15.7-25.24.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 (x86_64) * shim-15.7-25.24.1 * SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (x86_64) * shim-15.7-25.24.1 * SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (x86_64) * shim-15.7-25.24.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * shim-15.7-25.24.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * shim-15.7-25.24.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * shim-15.7-25.24.1 ## References: * https://www.suse.com/security/cve/CVE-2022-28737.html * https://bugzilla.suse.com/show_bug.cgi?id=1185232 * https://bugzilla.suse.com/show_bug.cgi?id=1185261 * https://bugzilla.suse.com/show_bug.cgi?id=1185441 * https://bugzilla.suse.com/show_bug.cgi?id=1185621 * https://bugzilla.suse.com/show_bug.cgi?id=1187071 * https://bugzilla.suse.com/show_bug.cgi?id=1187260 * https://bugzilla.suse.com/show_bug.cgi?id=1193282 * https://bugzilla.suse.com/show_bug.cgi?id=1193315 * https://bugzilla.suse.com/show_bug.cgi?id=1198458 * https://bugzilla.suse.com/show_bug.cgi?id=1201066 * https://bugzilla.suse.com/show_bug.cgi?id=1202120 * https://bugzilla.suse.com/show_bug.cgi?id=1205588 * https://jira.suse.com/browse/PED-127 * https://jira.suse.com/browse/PED-1273 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 12:57:22 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 12:57:22 -0000 Subject: SUSE-SU-2023:4624-1: important: Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t Message-ID: <170903864277.30755.15163023294014348362@smelt2.prg2.suse.org> # Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t Announcement ID: SUSE-SU-2023:4624-1 Rating: important References: Cross-References: * CVE-2023-44487 CVSS scores: * CVE-2023-44487 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-44487 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for kubevirt, virt-api-container, virt-controller-container, virt- exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator- container, virt-pr-helper-container fixes the following issues: Update to version 1.1.0 * Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.1.0 Update to version 1.0.1 * Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.0.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2023-4624=1 openSUSE-SLE-15.5-2023-4624=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2023-4624=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2023-4624=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kubevirt-container-disk-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virt-controller-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virtctl-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virt-operator-debuginfo-1.1.0-150500.8.6.1 * kubevirt-container-disk-1.1.0-150500.8.6.1 * kubevirt-virt-exportserver-1.1.0-150500.8.6.1 * obs-service-kubevirt_containers_meta-1.1.0-150500.8.6.1 * kubevirt-virt-handler-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virt-exportproxy-1.1.0-150500.8.6.1 * kubevirt-virt-exportserver-debuginfo-1.1.0-150500.8.6.1 * kubevirt-tests-1.1.0-150500.8.6.1 * kubevirt-tests-debuginfo-1.1.0-150500.8.6.1 * kubevirt-pr-helper-conf-1.1.0-150500.8.6.1 * kubevirt-virt-exportproxy-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virt-api-1.1.0-150500.8.6.1 * kubevirt-virt-handler-1.1.0-150500.8.6.1 * kubevirt-manifests-1.1.0-150500.8.6.1 * kubevirt-virt-launcher-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virtctl-1.1.0-150500.8.6.1 * kubevirt-virt-launcher-1.1.0-150500.8.6.1 * kubevirt-virt-controller-1.1.0-150500.8.6.1 * kubevirt-virt-api-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virt-operator-1.1.0-150500.8.6.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kubevirt-virtctl-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virtctl-1.1.0-150500.8.6.1 * kubevirt-manifests-1.1.0-150500.8.6.1 * Containers Module 15-SP5 (x86_64) * kubevirt-virtctl-debuginfo-1.1.0-150500.8.6.1 * kubevirt-virtctl-1.1.0-150500.8.6.1 * kubevirt-manifests-1.1.0-150500.8.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-44487.html -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 13:04:48 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 13:04:48 -0000 Subject: SUSE-SU-2023:0174-1: low: Security update for glib2 Message-ID: <170903908816.12543.11793636212662039020@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2023:0174-1 Rating: low References: * bsc#1183533 Cross-References: * CVE-2021-28153 CVSS scores: * CVE-2021-28153 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2021-28153 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Enterprise Storage 7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2021-28153: Fixed an issue where symlink targets would be incorrectly created as empty files (bsc#1183533). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-174=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2023-174=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-ESPOS-2023-174=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2023-174=1 * SUSE Linux Enterprise Real Time 15 SP3 zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-174=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-174=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2023-174=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2023-174=1 * SUSE Manager Proxy 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-174=1 * SUSE Manager Retail Branch Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.2-2023-174=1 * SUSE Manager Server 4.2 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-174=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2023-174=1 * SUSE Enterprise Storage 7 zypper in -t patch SUSE-Storage-7-2023-174=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-174=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-174=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2023-174=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * glib2-tests-debuginfo-2.62.6-150200.3.10.1 * glib2-tests-2.62.6-150200.3.10.1 * libgio-fam-debuginfo-2.62.6-150200.3.10.1 * libgio-fam-2.62.6-150200.3.10.1 * openSUSE Leap 15.4 (x86_64) * libgio-fam-32bit-2.62.6-150200.3.10.1 * libgio-fam-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (aarch64 x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Real Time 15 SP3 (x86_64) * glib2-tools-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Real Time 15 SP3 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Manager Proxy 4.2 (x86_64) * glib2-tools-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * SUSE Manager Proxy 4.2 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Manager Retail Branch Server 4.2 (x86_64) * glib2-tools-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * SUSE Manager Retail Branch Server 4.2 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Manager Server 4.2 (ppc64le s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Manager Server 4.2 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Manager Server 4.2 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Enterprise Storage 7.1 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Enterprise Storage 7.1 (x86_64) * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Enterprise Storage 7 (aarch64 x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgthread-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * glib2-devel-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * glib2-devel-debuginfo-2.62.6-150200.3.10.1 * SUSE Enterprise Storage 7 (noarch) * glib2-lang-2.62.6-150200.3.10.1 * SUSE Enterprise Storage 7 (x86_64) * libglib-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-2.62.6-150200.3.10.1 * libglib-2_0-0-32bit-2.62.6-150200.3.10.1 * libgmodule-2_0-0-32bit-2.62.6-150200.3.10.1 * libgio-2_0-0-32bit-2.62.6-150200.3.10.1 * libgobject-2_0-0-32bit-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libgobject-2_0-0-debuginfo-2.62.6-150200.3.10.1 * glib2-tools-2.62.6-150200.3.10.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-2.62.6-150200.3.10.1 * glib2-debugsource-2.62.6-150200.3.10.1 * libgmodule-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.10.1 * libgobject-2_0-0-2.62.6-150200.3.10.1 * libgio-2_0-0-2.62.6-150200.3.10.1 * glib2-tools-debuginfo-2.62.6-150200.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2021-28153.html * https://bugzilla.suse.com/show_bug.cgi?id=1183533 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 13:10:32 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 13:10:32 -0000 Subject: SUSE-SU-2023:2760-2: moderate: Security update for dnsdist Message-ID: <170903943269.13027.8133259695231590644@smelt2.prg2.suse.org> # Security update for dnsdist Announcement ID: SUSE-SU-2023:2760-2 Rating: moderate References: * bsc#1054799 * bsc#1054802 * bsc#1114511 Cross-References: * CVE-2016-7069 * CVE-2017-7557 * CVE-2018-14663 CVSS scores: * CVE-2016-7069 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2017-7557 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2018-14663 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for dnsdist fixes the following issues: * update to 1.8.0 * Implements dnsdist in SLE15 (jsc#PED-3402) * Security fix: fixes a possible record smugging with a crafted DNS query with trailing data (CVE-2018-14663, bsc#1114511) * update to 1.2.0 (bsc#1054799, bsc#1054802) This release also addresses two security issues of low severity, CVE-2016-7069 and CVE-2017-7557. The first issue can lead to a denial of service on 32-bit if a backend sends crafted answers, and the second to an alteration of dnsdist?s ACL if the API is enabled, writable and an authenticated user is tricked into visiting a crafted website. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2760=1 * openSUSE Leap 15.4 zypper in -t patch openSUSE-SLE-15.4-2023-2760=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2760=1 ## Package List: * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libluajit-5_1-2-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-debugsource-1.8.0-150400.9.3.1 * dnsdist-debuginfo-1.8.0-150400.9.3.1 * dnsdist-1.8.0-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libluajit-5_1-2-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-debugsource-1.8.0-150400.9.3.1 * luajit-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * luajit-debugsource-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * libluajit-5_1-2-debuginfo-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-debuginfo-1.8.0-150400.9.3.1 * luajit-debuginfo-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * luajit-devel-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-1.8.0-150400.9.3.1 * openSUSE Leap 15.4 (x86_64) * libluajit-5_1-2-32bit-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * libluajit-5_1-2-32bit-debuginfo-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libluajit-5_1-2-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-debugsource-1.8.0-150400.9.3.1 * luajit-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * luajit-debugsource-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * libluajit-5_1-2-debuginfo-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-debuginfo-1.8.0-150400.9.3.1 * luajit-debuginfo-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * luajit-devel-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * dnsdist-1.8.0-150400.9.3.1 * openSUSE Leap 15.5 (x86_64) * libluajit-5_1-2-32bit-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 * libluajit-5_1-2-32bit-debuginfo-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 ## References: * https://www.suse.com/security/cve/CVE-2016-7069.html * https://www.suse.com/security/cve/CVE-2017-7557.html * https://www.suse.com/security/cve/CVE-2018-14663.html * https://bugzilla.suse.com/show_bug.cgi?id=1054799 * https://bugzilla.suse.com/show_bug.cgi?id=1054802 * https://bugzilla.suse.com/show_bug.cgi?id=1114511 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0639-1: important: Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) Message-ID: <170905140226.27534.3958227828896960376@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0639-1 Rating: important References: * bsc#1218733 Cross-References: * CVE-2023-51780 CVSS scores: * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_13_27 fixes one issue. The following security issue was fixed: * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-639=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-639=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-3-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-3-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_27-rt-3-150500.2.1 * kernel-livepatch-5_14_21-150500_13_27-rt-debuginfo-3-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_8-debugsource-3-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 16:30:03 -0000 Subject: SUSE-SU-2023:2824-1: important: Security update for libqt5-qtbase Message-ID: <170905140371.27534.13650447109803380282@smelt2.prg2.suse.org> # Security update for libqt5-qtbase Announcement ID: SUSE-SU-2023:2824-1 Rating: important References: * bsc#1211798 Cross-References: * CVE-2023-32763 CVSS scores: * CVE-2023-32763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-32763 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Desktop Applications Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libqt5-qtbase fixes the following issues: * CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-2824=1 SUSE-2023-2824=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-2824=1 * Desktop Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2023-2824=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-32bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-xdgdesktopportal-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (noarch) * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libQt5Network-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Bootstrap-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test5-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core5-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGLExtensions-devel-static-64bit-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-64bit-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-examples-64bit-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5Sql5-sqlite-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 * libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-5.15.8+kde185-150500.4.3.1 * libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libQt5Core-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 * libQt5OpenGL5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 * libQt5Test5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Gui5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5DBus5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Network5-5.15.8+kde185-150500.4.3.1 * libQt5Test5-5.15.8+kde185-150500.4.3.1 * libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Core5-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-common-devel-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 * libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-5.15.8+kde185-150500.4.3.1 * libQt5Widgets5-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Xml5-debuginfo-5.15.8+kde185-150500.4.3.1 * Basesystem Module 15-SP5 (noarch) * libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 * libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 * Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-unixODBC-debuginfo-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 * libQt5Sql5-postgresql-debuginfo-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-debugsource-5.15.8+kde185-150500.4.3.1 * libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-32763.html * https://bugzilla.suse.com/show_bug.cgi?id=1211798 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Feb 27 20:30:04 2024 From: null at suse.de (SLE-UPDATES) Date: Tue, 27 Feb 2024 20:30:04 -0000 Subject: SUSE-RU-2024:0640-1: moderate: Recommended update for grub2 Message-ID: <170906580480.19884.18067795446875895809@smelt2.prg2.suse.org> # Recommended update for grub2 Announcement ID: SUSE-RU-2024:0640-1 Rating: moderate References: * bsc#1174567 * bsc#1216912 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for grub2 fixes the following issues: * Make consistent check to enable relative path on btrfs (bsc#1174567) (bsc#1216912) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-640=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-640=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-640=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * grub2-debugsource-2.02-172.1 * grub2-2.02-172.1 * grub2-debuginfo-2.02-172.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64) * grub2-arm64-efi-2.02-172.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * grub2-x86_64-xen-2.02-172.1 * grub2-systemd-sleep-plugin-2.02-172.1 * grub2-snapper-plugin-2.02-172.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (x86_64) * grub2-x86_64-efi-2.02-172.1 * grub2-i386-pc-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * grub2-2.02-172.1 * grub2-debuginfo-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64) * grub2-arm64-efi-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (aarch64 s390x x86_64) * grub2-debugsource-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * grub2-x86_64-xen-2.02-172.1 * grub2-systemd-sleep-plugin-2.02-172.1 * grub2-snapper-plugin-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (ppc64le) * grub2-powerpc-ieee1275-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (s390x) * grub2-s390x-emu-2.02-172.1 * SUSE Linux Enterprise Server 12 SP5 (x86_64) * grub2-x86_64-efi-2.02-172.1 * grub2-i386-pc-2.02-172.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * grub2-2.02-172.1 * grub2-debuginfo-2.02-172.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le) * grub2-powerpc-ieee1275-2.02-172.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * grub2-x86_64-xen-2.02-172.1 * grub2-systemd-sleep-plugin-2.02-172.1 * grub2-snapper-plugin-2.02-172.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (x86_64) * grub2-debugsource-2.02-172.1 * grub2-x86_64-efi-2.02-172.1 * grub2-i386-pc-2.02-172.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1174567 * https://bugzilla.suse.com/show_bug.cgi?id=1216912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:01 -0000 Subject: SUSE-SU-2024:0649-1: important: Security update for freerdp Message-ID: <170912340165.10979.13597857837762693200@smelt2.prg2.suse.org> # Security update for freerdp Announcement ID: SUSE-SU-2024:0649-1 Rating: important References: * bsc#1219049 Cross-References: * CVE-2024-22211 CVSS scores: * CVE-2024-22211 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-22211 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for freerdp fixes the following issues: * CVE-2024-22211: Fixed am integer overflow in freerdp_bitmap_planar_context_reset() (bsc#1219049). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-649=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-649=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-649=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-649=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-649=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * freerdp-devel-2.4.0-150400.3.26.1 * freerdp-wayland-2.4.0-150400.3.26.1 * libuwac0-0-2.4.0-150400.3.26.1 * freerdp-proxy-debuginfo-2.4.0-150400.3.26.1 * freerdp-server-2.4.0-150400.3.26.1 * libfreerdp2-2.4.0-150400.3.26.1 * libuwac0-0-debuginfo-2.4.0-150400.3.26.1 * freerdp-server-debuginfo-2.4.0-150400.3.26.1 * libfreerdp2-debuginfo-2.4.0-150400.3.26.1 * freerdp-2.4.0-150400.3.26.1 * libwinpr2-2.4.0-150400.3.26.1 * libwinpr2-debuginfo-2.4.0-150400.3.26.1 * freerdp-debuginfo-2.4.0-150400.3.26.1 * freerdp-wayland-debuginfo-2.4.0-150400.3.26.1 * uwac0-0-devel-2.4.0-150400.3.26.1 * freerdp-debugsource-2.4.0-150400.3.26.1 * freerdp-proxy-2.4.0-150400.3.26.1 * winpr2-devel-2.4.0-150400.3.26.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * freerdp-devel-2.4.0-150400.3.26.1 * freerdp-wayland-2.4.0-150400.3.26.1 * libuwac0-0-2.4.0-150400.3.26.1 * freerdp-proxy-debuginfo-2.4.0-150400.3.26.1 * freerdp-server-2.4.0-150400.3.26.1 * libfreerdp2-2.4.0-150400.3.26.1 * libuwac0-0-debuginfo-2.4.0-150400.3.26.1 * freerdp-server-debuginfo-2.4.0-150400.3.26.1 * libfreerdp2-debuginfo-2.4.0-150400.3.26.1 * freerdp-2.4.0-150400.3.26.1 * libwinpr2-2.4.0-150400.3.26.1 * libwinpr2-debuginfo-2.4.0-150400.3.26.1 * freerdp-debuginfo-2.4.0-150400.3.26.1 * freerdp-wayland-debuginfo-2.4.0-150400.3.26.1 * uwac0-0-devel-2.4.0-150400.3.26.1 * freerdp-debugsource-2.4.0-150400.3.26.1 * freerdp-proxy-2.4.0-150400.3.26.1 * winpr2-devel-2.4.0-150400.3.26.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x) * freerdp-devel-2.4.0-150400.3.26.1 * freerdp-wayland-2.4.0-150400.3.26.1 * libuwac0-0-2.4.0-150400.3.26.1 * freerdp-proxy-debuginfo-2.4.0-150400.3.26.1 * freerdp-server-2.4.0-150400.3.26.1 * libfreerdp2-2.4.0-150400.3.26.1 * libuwac0-0-debuginfo-2.4.0-150400.3.26.1 * freerdp-server-debuginfo-2.4.0-150400.3.26.1 * libfreerdp2-debuginfo-2.4.0-150400.3.26.1 * freerdp-2.4.0-150400.3.26.1 * libwinpr2-2.4.0-150400.3.26.1 * libwinpr2-debuginfo-2.4.0-150400.3.26.1 * freerdp-debuginfo-2.4.0-150400.3.26.1 * freerdp-wayland-debuginfo-2.4.0-150400.3.26.1 * uwac0-0-devel-2.4.0-150400.3.26.1 * freerdp-debugsource-2.4.0-150400.3.26.1 * freerdp-proxy-2.4.0-150400.3.26.1 * winpr2-devel-2.4.0-150400.3.26.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * freerdp-devel-2.4.0-150400.3.26.1 * freerdp-proxy-debuginfo-2.4.0-150400.3.26.1 * libfreerdp2-2.4.0-150400.3.26.1 * libfreerdp2-debuginfo-2.4.0-150400.3.26.1 * freerdp-2.4.0-150400.3.26.1 * libwinpr2-2.4.0-150400.3.26.1 * libwinpr2-debuginfo-2.4.0-150400.3.26.1 * freerdp-debuginfo-2.4.0-150400.3.26.1 * freerdp-debugsource-2.4.0-150400.3.26.1 * freerdp-proxy-2.4.0-150400.3.26.1 * winpr2-devel-2.4.0-150400.3.26.1 * SUSE Linux Enterprise Workstation Extension 15 SP5 (x86_64) * freerdp-devel-2.4.0-150400.3.26.1 * freerdp-proxy-debuginfo-2.4.0-150400.3.26.1 * libfreerdp2-2.4.0-150400.3.26.1 * libfreerdp2-debuginfo-2.4.0-150400.3.26.1 * freerdp-2.4.0-150400.3.26.1 * libwinpr2-2.4.0-150400.3.26.1 * libwinpr2-debuginfo-2.4.0-150400.3.26.1 * freerdp-debuginfo-2.4.0-150400.3.26.1 * freerdp-debugsource-2.4.0-150400.3.26.1 * freerdp-proxy-2.4.0-150400.3.26.1 * winpr2-devel-2.4.0-150400.3.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22211.html * https://bugzilla.suse.com/show_bug.cgi?id=1219049 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0648-1: important: Security update for freerdp Message-ID: <170912340372.10979.3836887955567020975@smelt2.prg2.suse.org> # Security update for freerdp Announcement ID: SUSE-SU-2024:0648-1 Rating: important References: * bsc#1219049 Cross-References: * CVE-2024-22211 CVSS scores: * CVE-2024-22211 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-22211 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for freerdp fixes the following issues: * CVE-2024-22211: Fixed am integer overflow in freerdp_bitmap_planar_context_reset() (bsc#1219049). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-648=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-648=1 ## Package List: * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libfreerdp2-2.1.2-12.41.1 * libfreerdp2-debuginfo-2.1.2-12.41.1 * winpr2-devel-2.1.2-12.41.1 * freerdp-devel-2.1.2-12.41.1 * freerdp-debuginfo-2.1.2-12.41.1 * libwinpr2-2.1.2-12.41.1 * freerdp-debugsource-2.1.2-12.41.1 * libwinpr2-debuginfo-2.1.2-12.41.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libfreerdp2-2.1.2-12.41.1 * libfreerdp2-debuginfo-2.1.2-12.41.1 * freerdp-proxy-2.1.2-12.41.1 * freerdp-server-2.1.2-12.41.1 * freerdp-debuginfo-2.1.2-12.41.1 * libwinpr2-2.1.2-12.41.1 * freerdp-2.1.2-12.41.1 * freerdp-debugsource-2.1.2-12.41.1 * libwinpr2-debuginfo-2.1.2-12.41.1 ## References: * https://www.suse.com/security/cve/CVE-2024-22211.html * https://bugzilla.suse.com/show_bug.cgi?id=1219049 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:05 -0000 Subject: SUSE-OU-2024:0647-1: low: Optional update for icu Message-ID: <170912340572.10979.12341813755427002036@smelt2.prg2.suse.org> # Optional update for icu Announcement ID: SUSE-OU-2024:0647-1 Rating: low References: * bsc#1167603 Cross-References: * CVE-2020-10531 CVSS scores: * CVE-2020-10531 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-10531 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for icu fixes the following issue: * No source changes, this just synchronizes the changelog with the latest implemented changes and correspondent ids. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-647=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-647=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-647=1 * Legacy Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP5-2024-647=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-647=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-647=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-647=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-647=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-647=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-647=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-647=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-647=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Enterprise Storage 7.1 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * Legacy Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * Legacy Module 15-SP5 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * libicu60_2-bedata-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * libicu60_2-bedata-60.2-150000.3.15.4 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * libicu60_2-bedata-60.2-150000.3.15.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 * libicu60_2-bedata-60.2-150000.3.15.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libicu60_2-60.2-150000.3.15.4 * icu-debuginfo-60.2-150000.3.15.4 * libicu60_2-debuginfo-60.2-150000.3.15.4 * icu-debugsource-60.2-150000.3.15.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * libicu60_2-ledata-60.2-150000.3.15.4 ## References: * https://www.suse.com/security/cve/CVE-2020-10531.html * https://bugzilla.suse.com/show_bug.cgi?id=1167603 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:07 -0000 Subject: SUSE-FU-2024:0646-1: low: Feature update for python3.11 Message-ID: <170912340716.10979.1413124533984358956@smelt2.prg2.suse.org> # Feature update for python3.11 Announcement ID: SUSE-FU-2024:0646-1 Rating: low References: * jsc#PED-7902 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This feature update adds the following packages: * python-CherryPy * python-cheroot * python-jaraco.collections * python-jaraco.text * python-pytest-forked * python-pytest-services * python-pylons-sphinx-themes * python-scp * python-requests-unixsocket * python-waitress * python-zc.lockfile ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-646=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-646=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-646=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-646=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-646=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-646=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-646=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 * openSUSE Leap 15.5 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 * Python 3 Module 15-SP5 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python311-pytest-forked-1.6.0-150400.12.3.1 * python311-jaraco.text-3.12.0-150400.9.3.1 * python311-jaraco.collections-5.0.0-150400.9.3.1 * python311-requests-unixsocket-0.3.0-150400.7.3.1 * python311-cheroot-10.0.0-150400.9.3.1 * python311-CherryPy-18.9.0-150400.7.3.1 * python311-pytest-services-2.2.1-150400.7.3.1 * python311-pylons-sphinx-themes-1.0.13-150400.9.3.1 * python311-waitress-2.1.2-150400.12.4.1 * python311-waitress-doc-2.1.2-150400.12.4.1 * python311-zc.lockfile-3.0.post1-150400.7.3.1 * python311-scp-0.14.5-150400.12.3.1 ## References: * https://jira.suse.com/browse/PED-7902 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:08 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:08 -0000 Subject: SUSE-RU-2024:0645-1: moderate: Recommended update for product-builder Message-ID: <170912340874.10979.2057605687955219865@smelt2.prg2.suse.org> # Recommended update for product-builder Announcement ID: SUSE-RU-2024:0645-1 Rating: moderate References: * bsc#1206021 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for product-builder fixes the following issue: * PowerPC: no more -part partitions (bsc#1206021) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-645=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-645=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-645=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * product-builder-1.2.16-150400.3.6.5 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * product-builder-1.2.16-150400.3.6.5 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * product-builder-1.2.16-150400.3.6.5 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1206021 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:10 -0000 Subject: SUSE-SU-2024:0644-1: important: Security update for nodejs18 Message-ID: <170912341087.10979.7904405004271888887@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:0644-1 Rating: important References: * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21892 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * Web and Scripting Module 12 An update that solves six vulnerabilities can now be installed. ## Description: This update for nodejs18 fixes the following issues: Update to 18.19.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to LTS version 18.19.0 * deps: npm updates to 10.x * esm: * Leverage loaders when resolving subsequent loaders * import.meta.resolve unflagged * \--experimental-default-type flag to flip module defaults ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 12 zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2024-644=1 ## Package List: * Web and Scripting Module 12 (aarch64 ppc64le s390x x86_64) * nodejs18-debuginfo-18.19.1-8.18.1 * npm18-18.19.1-8.18.1 * nodejs18-18.19.1-8.18.1 * nodejs18-devel-18.19.1-8.18.1 * nodejs18-debugsource-18.19.1-8.18.1 * Web and Scripting Module 12 (noarch) * nodejs18-docs-18.19.1-8.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:14 -0000 Subject: SUSE-SU-2024:0643-1: important: Security update for nodejs20 Message-ID: <170912341469.10979.718871159196609403@smelt2.prg2.suse.org> # Security update for nodejs20 Announcement ID: SUSE-SU-2024:0643-1 Rating: important References: * bsc#1219152 * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219994 * bsc#1219995 * bsc#1219997 * bsc#1219998 * bsc#1219999 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21890 * CVE-2024-21891 * CVE-2024-21892 * CVE-2024-21896 * CVE-2024-22017 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21890 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21891 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-21896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22017 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * Web and Scripting Module 15-SP5 An update that solves 10 vulnerabilities and has one security fix can now be installed. ## Description: This update for nodejs20 fixes the following issues: Update to 20.11.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2024-21896: Path traversal by monkey-patching Buffer internals (bsc#1219994).j * CVE-2024-22017: setuid() does not drop all privileges due to io_uring (bsc#1219995). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-21891: Multiple permission model bypasses due to improper path traversal sequence sanitization (bsc#1219998). * CVE-2024-21890: Improper handling of wildcards in --allow-fs-read and --allow-fs-write (bsc#1219999). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to 20.11.0: * esm: add import.meta.dirname and import.meta.filename * fs: add c++ fast path for writeFileSync utf8 * module: remove useCustomLoadersIfPresent flag * module: bootstrap module loaders in shadow realm * src: add --disable-warning option * src: create per isolate proxy env template * src: make process binding data weak * stream: use Array for Readable buffer * stream: optimize creation * test_runner: adds built in lcov reporter * test_runner: add Date to the supported mock APIs * test_runner, cli: add --test-timeout flag Update to 20.10.0: * \--experimental-default-type flag to flip module defaults * The new flag --experimental-detect-module can be used to automatically run ES modules when their syntax can be detected. * Added flush option in file system functions for fs.writeFile functions * Added experimental WebSocket client * vm: fix V8 compilation cache support for vm.Script. This fixes performance regression since v16.x when support for importModuleDynamically was added to vm.Script ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-643=1 openSUSE-SLE-15.5-2024-643=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-643=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * nodejs20-debugsource-20.11.1-150500.11.6.1 * corepack20-20.11.1-150500.11.6.1 * npm20-20.11.1-150500.11.6.1 * nodejs20-devel-20.11.1-150500.11.6.1 * nodejs20-debuginfo-20.11.1-150500.11.6.1 * nodejs20-20.11.1-150500.11.6.1 * openSUSE Leap 15.5 (noarch) * nodejs20-docs-20.11.1-150500.11.6.1 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm20-20.11.1-150500.11.6.1 * nodejs20-debugsource-20.11.1-150500.11.6.1 * nodejs20-devel-20.11.1-150500.11.6.1 * nodejs20-debuginfo-20.11.1-150500.11.6.1 * nodejs20-20.11.1-150500.11.6.1 * Web and Scripting Module 15-SP5 (noarch) * nodejs20-docs-20.11.1-150500.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21890.html * https://www.suse.com/security/cve/CVE-2024-21891.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-21896.html * https://www.suse.com/security/cve/CVE-2024-22017.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219152 * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219994 * https://bugzilla.suse.com/show_bug.cgi?id=1219995 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1219998 * https://bugzilla.suse.com/show_bug.cgi?id=1219999 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:16 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:16 -0000 Subject: SUSE-RU-2024:0642-1: moderate: Recommended update for selinux-policy Message-ID: <170912341691.10979.5254155576165862834@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2024:0642-1 Rating: moderate References: * bsc#1211045 * bsc#1213594 Affected Products: * openSUSE Leap Micro 5.3 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro for Rancher 5.3 An update that has two fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Allow `haveged` to manage tmpfs directories (bsc#1213594) * Fixed entropy daemon (bsc#1211045) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-642=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-642=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-642=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * selinux-policy-20210716+git68.8c5209d3-150400.5.15.1 * selinux-policy-devel-20210716+git68.8c5209d3-150400.5.15.1 * selinux-policy-targeted-20210716+git68.8c5209d3-150400.5.15.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * selinux-policy-20210716+git68.8c5209d3-150400.5.15.1 * selinux-policy-devel-20210716+git68.8c5209d3-150400.5.15.1 * selinux-policy-targeted-20210716+git68.8c5209d3-150400.5.15.1 * openSUSE Leap Micro 5.3 (noarch) * selinux-policy-20210716+git68.8c5209d3-150400.5.15.1 * selinux-policy-devel-20210716+git68.8c5209d3-150400.5.15.1 * selinux-policy-targeted-20210716+git68.8c5209d3-150400.5.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211045 * https://bugzilla.suse.com/show_bug.cgi?id=1213594 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 12:30:19 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 12:30:19 -0000 Subject: SUSE-RU-2024:0641-1: moderate: Recommended update for gcc7 Message-ID: <170912341981.10979.5681432464232149018@smelt2.prg2.suse.org> # Recommended update for gcc7 Announcement ID: SUSE-RU-2024:0641-1 Rating: moderate References: * bsc#1214934 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for gcc7 fixes the following issues: * Add support for -fmin-function-alignment. [bsc#1214934] * Use %{_target_cpu} to determine host and build. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-641=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-641=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-641=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-641=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-641=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-641=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-641=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-641=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-641=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-641=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-641=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-641=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-641=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-641=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-641=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-641=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-641=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-641=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Manager Proxy 4.3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * SUSE Manager Server 4.3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Enterprise Storage 7.1 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Enterprise Storage 7.1 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libstdc++6-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libatomic1-gcc7-7.5.0+r278197-150000.4.41.1 * libatomic1-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libgo11-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-arm-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-ppc64-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-arm-none-gcc7-bootstrap-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * cross-sparcv9-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-m68k-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-obj-c++-7.5.0+r278197-150000.4.41.1 * cross-i386-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-hppa-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-obj-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-m68k-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-sparc64-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-m68k-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-ppc64-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libgomp1-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-rx-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.41.1 * cross-hppa-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libstdc++6-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-avr-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.41.1 * cross-mips-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * cross-epiphany-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.41.1 * libstdc++6-gcc7-locale-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-sparc-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * gcc7-go-7.5.0+r278197-150000.4.41.1 * libgcc_s1-gcc7-7.5.0+r278197-150000.4.41.1 * cross-ppc64-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-arm-gcc7-7.5.0+r278197-150000.4.41.1 * cross-i386-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-hppa-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * cross-arm-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-rx-gcc7-bootstrap-7.5.0+r278197-150000.4.41.1 * cross-mips-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-sparc64-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libitm1-gcc7-7.5.0+r278197-150000.4.41.1 * cross-epiphany-gcc7-bootstrap-7.5.0+r278197-150000.4.41.1 * cross-sparc64-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-go-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-arm-none-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.41.1 * cross-arm-none-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.41.1 * libgo11-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-sparc-gcc7-7.5.0+r278197-150000.4.41.1 * cross-mips-gcc7-7.5.0+r278197-150000.4.41.1 * cross-avr-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-avr-gcc7-bootstrap-7.5.0+r278197-150000.4.41.1 * cross-i386-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-i386-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-sparc64-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * cross-ppc64-gcc7-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-m68k-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-epiphany-gcc7-bootstrap-debugsource-7.5.0+r278197-150000.4.41.1 * cross-sparc-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libgomp1-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-rx-gcc7-bootstrap-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-hppa-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-mips-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libitm1-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * libobjc4-gcc7-7.5.0+r278197-150000.4.41.1 * libgcc_s1-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libobjc4-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * cross-aarch64-gcc7-7.5.0+r278197-150000.4.41.1 * cross-aarch64-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-aarch64-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-aarch64-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libquadmath0-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libmpxwrappers2-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libmpxwrappers2-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libmpx2-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * libmpxwrappers2-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libmpx2-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libmpx2-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libquadmath0-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libquadmath0-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libmpx2-gcc7-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * libquadmath0-gcc7-7.5.0+r278197-150000.4.41.1 * libmpxwrappers2-gcc7-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64) * cross-ppc64le-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-ppc64le-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-ppc64le-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * cross-ppc64le-gcc7-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * cross-s390x-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * libtsan0-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-s390x-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libtsan0-gcc7-7.5.0+r278197-150000.4.41.1 * cross-s390x-gcc7-7.5.0+r278197-150000.4.41.1 * liblsan0-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * liblsan0-gcc7-7.5.0+r278197-150000.4.41.1 * cross-s390x-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (s390x x86_64) * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgomp1-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgcc_s1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgcc_s1-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libobjc4-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libada7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libitm1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgo11-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgomp1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-go-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-objc-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-ada-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-obj-c++-32bit-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * libobjc4-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgo11-32bit-7.5.0+r278197-150000.4.41.1 * libada7-32bit-7.5.0+r278197-150000.4.41.1 * libatomic1-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libitm1-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * libatomic1-gcc7-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x) * cross-x86_64-gcc7-7.5.0+r278197-150000.4.41.1 * cross-x86_64-gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * cross-x86_64-gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-x86_64-gcc7-icecream-backend-7.5.0+r278197-150000.4.41.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * Basesystem Module 15-SP5 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * Development Tools Module 15-SP5 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * Development Tools Module 15-SP5 (x86_64) * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libasan4-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-7.5.0+r278197-150000.4.41.1 * gcc7-locale-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-objc-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-7.5.0+r278197-150000.4.41.1 * libubsan0-7.5.0+r278197-150000.4.41.1 * cpp7-7.5.0+r278197-150000.4.41.1 * gcc7-objc-7.5.0+r278197-150000.4.41.1 * gcc7-debugsource-7.5.0+r278197-150000.4.41.1 * libada7-debuginfo-7.5.0+r278197-150000.4.41.1 * libada7-7.5.0+r278197-150000.4.41.1 * gcc7-c++-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-ada-debuginfo-7.5.0+r278197-150000.4.41.1 * cpp7-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-7.5.0+r278197-150000.4.41.1 * gcc7-c++-debuginfo-7.5.0+r278197-150000.4.41.1 * libubsan0-debuginfo-7.5.0+r278197-150000.4.41.1 * gcc7-ada-7.5.0+r278197-150000.4.41.1 * gcc7-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * gcc7-info-7.5.0+r278197-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libcilkrts5-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-7.5.0+r278197-150000.4.41.1 * libubsan0-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-7.5.0+r278197-150000.4.41.1 * cross-nvptx-gcc7-7.5.0+r278197-150000.4.41.1 * gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-7.5.0+r278197-150000.4.41.1 * libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.41.1 * libcilkrts5-debuginfo-7.5.0+r278197-150000.4.41.1 * libgfortran4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * libasan4-32bit-debuginfo-7.5.0+r278197-150000.4.41.1 * cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.41.1 * libcilkrts5-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-fortran-32bit-7.5.0+r278197-150000.4.41.1 * gcc7-c++-32bit-7.5.0+r278197-150000.4.41.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1214934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 16:30:02 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 16:30:02 -0000 Subject: SUSE-SU-2024:0655-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) Message-ID: <170913780244.10325.6014234914097868178@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0655-1 Rating: important References: * bsc#1215300 * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_11 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-655=1 SUSE-SLE-Live- Patching-12-SP5-2024-652=1 SUSE-SLE-Live-Patching-12-SP5-2024-653=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-654=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-654=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_153-default-10-2.1 * kgraft-patch-4_12_14-122_159-default-9-2.1 * kgraft-patch-4_12_14-122_156-default-10-2.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_11-rt-8-150500.3.1 * kernel-livepatch-5_14_21-150500_11-rt-debuginfo-8-150500.3.1 * kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-8-150500.3.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_11-rt-8-150500.3.1 * kernel-livepatch-5_14_21-150500_11-rt-debuginfo-8-150500.3.1 * kernel-livepatch-SLE15-SP5-RT_Update_0-debugsource-8-150500.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 16:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 16:30:05 -0000 Subject: SUSE-SU-2024:0656-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Message-ID: <170913780547.10325.9729576936402111360@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0656-1 Rating: important References: * bsc#1218733 Cross-References: * CVE-2023-51780 CVSS scores: * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_44 fixes one issue. The following security issue was fixed: * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-650=1 SUSE-2024-656=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-650=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-656=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_9-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-2-150500.2.1 * openSUSE Leap 15.5 (x86_64) * kernel-livepatch-5_14_21-150500_13_30-rt-2-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_9-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_44-default-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * kernel-livepatch-5_14_21-150500_13_30-rt-2-150500.2.1 * kernel-livepatch-SLE15-SP5-RT_Update_9-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_13_30-rt-debuginfo-2-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 16:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 16:30:07 -0000 Subject: SUSE-SU-2024:0657-1: important: Security update for rear27a Message-ID: <170913780767.10325.15215229215680382674@smelt2.prg2.suse.org> # Security update for rear27a Announcement ID: SUSE-SU-2024:0657-1 Rating: important References: * bsc#1202352 * bsc#1218728 Cross-References: * CVE-2024-23301 CVSS scores: * CVE-2024-23301 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for rear27a fixes the following issues: * CVE-2024-23301: Fixed world-readable initrd with GRUB_RESCUE=Y (bsc#1218728). Bug fixes: * Fix mkinitrd dependency issue by installing dracut-mkinitrd-deprecated (see bsc#1202352). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-657=1 openSUSE-SLE-15.5-2024-657=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2024-657=1 ## Package List: * openSUSE Leap 15.5 (ppc64le x86_64 i586) * rear27a-2.7-150500.3.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (ppc64le x86_64) * rear27a-2.7-150500.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-23301.html * https://bugzilla.suse.com/show_bug.cgi?id=1202352 * https://bugzilla.suse.com/show_bug.cgi?id=1218728 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 16:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 16:30:09 -0000 Subject: SUSE-RU-2024:0651-1: moderate: Recommended update for nftables Message-ID: <170913780988.10325.1006291050185785331@smelt2.prg2.suse.org> # Recommended update for nftables Announcement ID: SUSE-RU-2024:0651-1 Rating: moderate References: * bsc#1219253 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for nftables fixes the following issues: * Enable python311 module (bsc#1219253). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-651=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-651=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-651=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-651=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-651=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-651=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-651=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-651=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-651=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-651=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-651=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-651=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-651=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-651=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-651=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-651=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-651=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-651=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-651=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-devel-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * openSUSE Leap 15.4 (noarch) * python311-nftables-0.9.8-150400.6.3.1 * python3-nftables-0.9.8-150400.6.3.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * openSUSE Leap Micro 5.3 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * openSUSE Leap Micro 5.4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-devel-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * openSUSE Leap 15.5 (noarch) * python311-nftables-0.9.8-150400.6.3.1 * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-devel-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * Basesystem Module 15-SP5 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * Python 3 Module 15-SP5 (noarch) * python311-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Manager Proxy 4.3 (x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Manager Proxy 4.3 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-nftables-0.9.8-150400.6.3.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * nftables-debugsource-0.9.8-150400.6.3.1 * libnftables1-debuginfo-0.9.8-150400.6.3.1 * libnftables1-0.9.8-150400.6.3.1 * nftables-debuginfo-0.9.8-150400.6.3.1 * nftables-0.9.8-150400.6.3.1 * SUSE Manager Server 4.3 (noarch) * python3-nftables-0.9.8-150400.6.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 20:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 20:30:01 -0000 Subject: SUSE-SU-2024:0665-1: important: Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) Message-ID: <170915220190.2264.12410345645430545024@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) Announcement ID: SUSE-SU-2024:0665-1 Rating: important References: * bsc#1210619 Cross-References: * CVE-2023-1829 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_194 fixes one issue. The following security issue was fixed: * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-665=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_194-default-2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 20:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 20:30:03 -0000 Subject: SUSE-SU-2024:0663-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Message-ID: <170915220365.2264.14929813398336703164@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0663-1 Rating: important References: * bsc#1218733 Cross-References: * CVE-2023-51780 CVSS scores: * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_36 fixes one issue. The following security issue was fixed: * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-663=1 SUSE-SLE-Live- Patching-12-SP5-2024-669=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-680=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-668=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-668=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_189-default-3-2.1 * kgraft-patch-4_12_14-122_186-default-3-2.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_172-default-3-150200.2.1 * kernel-livepatch-5_3_18-150200_24_172-default-debuginfo-3-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_43-debugsource-3-150200.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-3-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_36-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_36-default-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_7-debugsource-3-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 20:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 20:30:05 -0000 Subject: SUSE-SU-2024:0662-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2) Message-ID: <170915220587.2264.9137217396021176049@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:0662-1 Rating: important References: * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_169 fixes several issues. The following security issues were fixed: * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-678=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-679=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-662=1 SUSE-SLE-Live- Patching-12-SP5-2024-664=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_166-default-debuginfo-5-150200.2.1 * kernel-livepatch-5_3_18-150200_24_166-default-5-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-debuginfo-4-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_41-debugsource-5-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_42-debugsource-4-150200.2.1 * kernel-livepatch-5_3_18-150200_24_169-default-4-150200.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_179-default-4-2.1 * kgraft-patch-4_12_14-122_183-default-4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Feb 28 20:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Wed, 28 Feb 2024 20:30:07 -0000 Subject: SUSE-SU-2024:0666-1: important: Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) Message-ID: <170915220792.2264.12998084717567650851@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) Announcement ID: SUSE-SU-2024:0666-1 Rating: important References: * bsc#1215300 * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150200_24_142 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-666=1 SUSE-SLE-Live- Patching-12-SP5-2024-659=1 SUSE-SLE-Live-Patching-12-SP5-2024-660=1 SUSE-SLE- Live-Patching-12-SP5-2024-661=1 SUSE-SLE-Live-Patching-12-SP5-2024-658=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-671=1 SUSE-SLE- Module-Live-Patching-15-SP2-2024-672=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-673=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-674=1 SUSE- SLE-Module-Live-Patching-15-SP2-2024-675=1 SUSE-SLE-Module-Live- Patching-15-SP2-2024-676=1 SUSE-SLE-Module-Live-Patching-15-SP2-2024-677=1 SUSE- SLE-Module-Live-Patching-15-SP2-2024-670=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-667=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-667=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_165-default-7-2.1 * kgraft-patch-4_12_14-122_173-default-6-2.1 * kgraft-patch-4_12_14-122_150-default-12-2.2 * kgraft-patch-4_12_14-122_176-default-5-2.1 * kgraft-patch-4_12_14-122_162-default-8-2.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_151-default-debuginfo-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_145-default-debuginfo-11-150200.2.1 * kernel-livepatch-5_3_18-150200_24_151-default-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_163-default-5-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_38-debugsource-7-150200.2.1 * kernel-livepatch-5_3_18-150200_24_154-default-8-150200.2.1 * kernel-livepatch-5_3_18-150200_24_142-default-12-150200.2.2 * kernel-livepatch-5_3_18-150200_24_163-default-debuginfo-5-150200.2.1 * kernel-livepatch-5_3_18-150200_24_145-default-11-150200.2.1 * kernel-livepatch-5_3_18-150200_24_160-default-debuginfo-6-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_33-debugsource-12-150200.2.2 * kernel-livepatch-SLE15-SP2_Update_34-debugsource-11-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_36-debugsource-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_157-default-debuginfo-7-150200.2.1 * kernel-livepatch-5_3_18-150200_24_160-default-6-150200.2.1 * kernel-livepatch-5_3_18-150200_24_148-default-debuginfo-10-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_35-debugsource-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_148-default-10-150200.2.1 * kernel-livepatch-5_3_18-150200_24_157-default-7-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_39-debugsource-6-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_37-debugsource-8-150200.2.1 * kernel-livepatch-5_3_18-150200_24_154-default-debuginfo-8-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_40-debugsource-5-150200.2.1 * kernel-livepatch-5_3_18-150200_24_142-default-debuginfo-12-150200.2.2 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_63-default-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_12-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_63-default-debuginfo-10-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_63-default-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_12-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_63-default-debuginfo-10-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 08:30:01 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 08:30:01 -0000 Subject: SUSE-SU-2024:0705-1: important: Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) Message-ID: <170919540195.13496.7253204254173511538@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0705-1 Rating: important References: * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_141 fixes several issues. The following security issues were fixed: * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-705=1 SUSE-2024-706=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-705=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-706=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_37-debugsource-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-default-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-debuginfo-4-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_38-debugsource-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-default-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-4-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_141-preempt-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-preempt-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-preempt-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_138-preempt-5-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_138-default-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_141-default-4-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 08:30:05 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 08:30:05 -0000 Subject: SUSE-SU-2024:0695-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Message-ID: <170919540522.13496.2018076794173643235@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) Announcement ID: SUSE-SU-2024:0695-1 Rating: important References: * bsc#1210619 Cross-References: * CVE-2023-1829 CVSS scores: * CVE-2023-1829 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1829 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_150 fixes one issue. The following security issue was fixed: * CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (bsc#1210619). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-709=1 * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-695=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-709=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_150-default-2-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_178-default-2-150200.2.1 * kernel-livepatch-5_3_18-150200_24_178-default-debuginfo-2-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_45-debugsource-2-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_150-default-debuginfo-2-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_41-debugsource-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-default-2-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_150-preempt-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_150-preempt-debuginfo-2-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1829.html * https://bugzilla.suse.com/show_bug.cgi?id=1210619 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 08:30:07 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 08:30:07 -0000 Subject: SUSE-SU-2024:0685-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) Message-ID: <170919540726.13496.12073125521404449884@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0685-1 Rating: important References: * bsc#1215300 * bsc#1218733 Cross-References: * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_28 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-685=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-685=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-714=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-714=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_88-default-5-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_18-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-5-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_88-default-5-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_18-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_88-default-debuginfo-5-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_5-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-5-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_5-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-debuginfo-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_28-default-5-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 08:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 08:30:09 -0000 Subject: SUSE-SU-2024:0698-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) Message-ID: <170919540982.13496.1010924216830534981@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP4) Announcement ID: SUSE-SU-2024:0698-1 Rating: important References: * bsc#1215300 * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_46 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-698=1 SUSE-2024-696=1 SUSE-2024-699=1 SUSE-2024-697=1 SUSE-2024-700=1 SUSE-2024-701=1 SUSE-2024-702=1 SUSE-2024-703=1 SUSE-2024-704=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-698=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-696=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-699=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-697=1 SUSE- SLE-Module-Live-Patching-15-SP3-2024-700=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-701=1 SUSE-SLE-Module-Live-Patching-15-SP3-2024-702=1 SUSE- SLE-Module-Live-Patching-15-SP3-2024-703=1 SUSE-SLE-Module-Live- Patching-15-SP3-2024-704=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-683=1 SUSE-2024-684=1 SUSE-2024-710=1 SUSE-2024-691=1 SUSE-2024-692=1 SUSE-2024-689=1 SUSE-2024-690=1 SUSE-2024-682=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-682=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-683=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-684=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-710=1 SUSE- SLE-Module-Live-Patching-15-SP4-2024-691=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-692=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-689=1 SUSE- SLE-Module-Live-Patching-15-SP4-2024-690=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-711=1 SUSE-2024-712=1 SUSE-2024-713=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-713=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-711=1 SUSE-SLE-Module-Live- Patching-15-SP5-2024-712=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2024-693=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_112-default-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_109-default-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-default-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-default-debuginfo-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_115-default-debuginfo-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-default-7-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_35-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-default-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_118-default-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-default-10-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_32-debugsource-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-default-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-default-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_130-default-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-default-12-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_36-debugsource-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-default-debuginfo-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-default-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-default-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_118-default-10-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_28-debugsource-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_130-default-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_31-debugsource-10-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_30-debugsource-11-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_29-debugsource-12-150300.2.2 * kernel-livepatch-SLE15-SP3_Update_34-debugsource-7-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_33-debugsource-8-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_118-preempt-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-preempt-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_133-preempt-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-preempt-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-preempt-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-preempt-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_130-preempt-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-preempt-debuginfo-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-preempt-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-preempt-debuginfo-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_124-preempt-debuginfo-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-preempt-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_130-preempt-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-preempt-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_118-preempt-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-preempt-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_115-preempt-debuginfo-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-preempt-10-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_115-default-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_109-default-13-150300.2.2 * kernel-livepatch-5_3_18-150300_59_133-default-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_124-default-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_112-default-12-150300.2.2 * kernel-livepatch-5_3_18-150300_59_118-default-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_127-default-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_130-default-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_121-default-10-150300.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_60-default-debuginfo-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_16-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_14-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_8-debugsource-12-150400.2.2 * kernel-livepatch-5_14_21-150400_24_46-default-12-150400.2.2 * kernel-livepatch-5_14_21-150400_24_46-default-debuginfo-12-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_10-debugsource-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_41-default-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_41-default-debuginfo-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_55-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_13-debugsource-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_15-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_7-debugsource-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_55-default-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_11-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_60-default-10-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_60-default-debuginfo-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-debuginfo-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_16-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_66-default-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_14-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_8-debugsource-12-150400.2.2 * kernel-livepatch-5_14_21-150400_24_46-default-12-150400.2.2 * kernel-livepatch-5_14_21-150400_24_46-default-debuginfo-12-150400.2.2 * kernel-livepatch-SLE15-SP4_Update_10-debugsource-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_81-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_69-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-debuginfo-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_41-default-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_41-default-debuginfo-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_55-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_13-debugsource-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_15-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_7-debugsource-13-150400.2.2 * kernel-livepatch-5_14_21-150400_24_55-default-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_11-debugsource-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_74-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_60-default-10-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_2-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-8-150500.3.1 * kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_0-debugsource-8-150500.3.1 * kernel-livepatch-SLE15-SP5_Update_3-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-debuginfo-8-150500.3.1 * kernel-livepatch-5_14_21-150500_55_12-default-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_2-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_19-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-8-150500.3.1 * kernel-livepatch-5_14_21-150500_55_12-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_0-debugsource-8-150500.3.1 * kernel-livepatch-SLE15-SP5_Update_3-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_53-default-debuginfo-8-150500.3.1 * kernel-livepatch-5_14_21-150500_55_12-default-7-150500.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_147-default-12-2.2 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 08:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 08:30:12 -0000 Subject: SUSE-SU-2024:0694-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) Message-ID: <170919541234.13496.7306363847230920585@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0694-1 Rating: important References: * bsc#1218733 Cross-References: * CVE-2023-51780 CVSS scores: * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP2 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_39 fixes one issue. The following security issue was fixed: * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP2 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2024-694=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-707=1 SUSE-2024-708=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2024-707=1 SUSE-SLE- Module-Live-Patching-15-SP3-2024-708=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-688=1 SUSE-2024-681=1 SUSE-2024-686=1 SUSE-2024-687=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-687=1 SUSE-SLE- Module-Live-Patching-15-SP4-2024-688=1 SUSE-SLE-Module-Live- Patching-15-SP4-2024-681=1 SUSE-SLE-Module-Live-Patching-15-SP4-2024-686=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-715=1 SUSE-2024-716=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-716=1 SUSE-SLE- Module-Live-Patching-15-SP5-2024-715=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP2 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150200_24_175-default-3-150200.2.1 * kernel-livepatch-SLE15-SP2_Update_44-debugsource-3-150200.2.1 * kernel-livepatch-5_3_18-150200_24_175-default-debuginfo-3-150200.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_40-debugsource-3-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_39-debugsource-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-default-debuginfo-3-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_144-preempt-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-preempt-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_147-preempt-3-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_147-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_144-default-3-150300.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_20-debugsource-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_19-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-2-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_20-debugsource-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_92-default-debuginfo-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-debuginfo-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_21-debugsource-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_22-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_97-default-debuginfo-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_19-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_100-default-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_103-default-debuginfo-2-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_39-default-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_6-debugsource-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-4-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_39-default-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-debuginfo-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_6-debugsource-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_8-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_39-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_31-default-4-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:03 -0000 Subject: SUSE-SU-2024:0727-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) Message-ID: <170920980344.24296.5481373803708188073@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) Announcement ID: SUSE-SU-2024:0727-1 Rating: important References: * bsc#1215300 * bsc#1217116 * bsc#1218733 Cross-References: * CVE-2023-39198 * CVE-2023-4921 * CVE-2023-51780 CVSS scores: * CVE-2023-39198 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2023-39198 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51780 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_7 fixes several issues. The following security issues were fixed: * CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215300). * CVE-2023-39198: Fixed a race condition leading to a use-after-free in qxl_mode_dumb_create() (bsc#1217116). * CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218733). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-727=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2024-727=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_7-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_1-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_7-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_7-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_1-debugsource-7-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39198.html * https://www.suse.com/security/cve/CVE-2023-4921.html * https://www.suse.com/security/cve/CVE-2023-51780.html * https://bugzilla.suse.com/show_bug.cgi?id=1215300 * https://bugzilla.suse.com/show_bug.cgi?id=1217116 * https://bugzilla.suse.com/show_bug.cgi?id=1218733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:06 -0000 Subject: SUSE-SU-2024:0726-1: important: Security update for Java Message-ID: <170920980626.24296.5792602589438821279@smelt2.prg2.suse.org> # Security update for Java Announcement ID: SUSE-SU-2024:0726-1 Rating: important References: * bsc#1220068 * bsc#1220070 Cross-References: * CVE-2024-25710 * CVE-2024-26308 CVSS scores: * CVE-2024-25710 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-26308 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26308 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 * SUSE Package Hub 15 15-SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for Java fixes the following issues: apache-commons-codec was updated to version 1.16.1: * Changes in version 1.16.1: * New features: * Added Maven property project.build.outputTimestamp for build reproducibility * Bugs fixed: * Correct error in Base64 Javadoc * Added minimum Java version in changes.xml * Documentation update for the org.apache.commons.codec.digest.* package * Precompile regular expression in UnixCrypt.crypt(byte[], String) * Fixed possible IndexOutOfBoundException in PhoneticEngine.encode method * Fixed possible ArrayIndexOutOfBoundsException in QuotedPrintableCodec.encodeQuotedPrintable() method * Fixed possible StringIndexOutOfBoundException in MatchRatingApproachEncoder.encode() method * Fixed possible ArrayIndexOutOfBoundException in RefinedSoundex.getMappingCode() * Fixed possible IndexOutOfBoundsException in PercentCodec.insertAlwaysEncodeChars() method * Deprecated UnixCrypt 0-argument constructor * Deprecated Md5Crypt 0-argument constructor * Deprecated Crypt 0-argument constructor * Deprecated StringUtils 0-argument constructor * Deprecated Resources 0-argument constructor * Deprecated Charsets 0-argument constructor * Deprecated CharEncoding 0-argument constructor * Changes in version 1.16.0: * Remove duplicated words from Javadocs * Use Standard Charset object * Use String.contains() functions * Avoid use toString() or substring() in favor of a simplified expression * Fixed byte-skipping in Base16 decoding * Fixed several typos, improve writing in some javadocs * BaseNCodecOutputStream.eof() should not throw IOException. * Javadoc improvements and cleanups. * Deprecated BaseNCodec.isWhiteSpace(byte) and use Character.isWhitespace(int). * Added support for Blake3 family of hashes * Added github/codeql-action * Bump actions/cache from v2 to v3.0.10 * Bump actions/setup-java from v1.4.1 to 3.5.1 * Bump actions/checkout from 2.3.2 to 3.1.0 * Bump commons-parent from 52 to 58 * Bump junit from 4.13.1 to 5.9.1 * Bump Java 7 to 8. * Bump japicmp-maven-plugin from 0.14.3 to 0.17.1. * Bump jacoco-maven-plugin from 0.8.5 to 0.8.8 (Fixes Java 15 builds). * Bump maven-surefire-plugin from 2.22.2 to 3.0.0-M7 * Bump maven-javadoc-plugin from 3.2.0 to 3.4.1. * Bump animal-sniffer-maven-plugin from 1.19 to 1.22. * Bump maven-pmd-plugin from 3.13.0 to 3.19.0 * Bump pmd from 6.47.0 to 6.52.0. * Bump maven-checkstyle-plugin from 2.17 to 3.2.0 * Bump checkstyle from 8.45.1 to 9.3 * Bump taglist-maven-plugin from 2.4 to 3.0.0 * Bump jacoco-maven-plugin from 0.8.7 to 0.8.8. apache-commons-compress was updated to version 1.26: * Changes in version 1.26: * Security issues fixed: * CVE-2024-26308: Fixed allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress (bsc#1220068) * CVE-2024-25710: Fixed loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress (bsc#1220070) * New Features: * Added and use ZipFile.builder(), ZipFile.Builder, and deprecate constructors * Added and use SevenZFile.builder(), SevenZFile.Builder, and deprecate constructors * Added and use ArchiveInputStream.getCharset() * Added and use ArchiveEntry.resolveIn(Path) * Added Maven property project.build.outputTimestamp for build reproducibility * Bugs fixed: * Check for invalid PAX values in TarArchiveEntry * Fixed zero size headers in ArjInputStream * Fixes and tests for ArInputStream * Fixes for dump file parsing * Improved CPIO exception detection and handling * Deprecated SkipShieldingInputStream without replacement (nolonger used) * Reuse commons-codec, don't duplicate class PureJavaCrc32C (removed package-private class) * Reuse commons-codec, don't duplicate class XXHash32 (deprecated class) * Reuse commons-io, don't duplicate class Charsets (deprecated class) * Reuse commons-io, don't duplicate class IOUtils (deprecated methods) * Reuse commons-io, don't duplicate class BoundedInputStream (deprecated class) * Reuse commons-io, don't duplicate class FileTimes (deprecated TimeUtils methods) * Reuse Arrays.equals(byte[], byte[]) and deprecate ArchiveUtils.isEqual(byte[], byte[]) * Added a null-check for the class loader of OsgiUtils * Added a null-check in Pack200.newInstance(String, String) * Deprecated ChecksumCalculatingInputStream in favor of java.util.zip.CheckedInputStream * Deprecated CRC32VerifyingInputStream.CRC32VerifyingInputStream(InputStream, long, int) * FramedSnappyCompressorOutputStream produces incorrect output when writing a large buffer * Fixed TAR directory entries being misinterpreted as files * Deprecated unused method FileNameUtils.getBaseName(String) * Deprecated unused method FileNameUtils.getExtension(String) * ArchiveInputStream.BoundedInputStream.read() incorrectly adds 1 for EOF to the bytes read count * Deprecated IOUtils.read(File, byte[]) * Deprecated IOUtils.copyRange(InputStream, long, OutputStream, int) * ZipArchiveOutputStream multi archive updates metadata in incorrect file * Deprecated ByteUtils.InputStreamByteSupplier * Deprecated ByteUtils.fromLittleEndian(InputStream, int) * Deprecated ByteUtils.toLittleEndian(DataOutput, long, int) * Reduce duplication by having ArchiveInputStream extend FilterInputStream * Support preamble garbage in ZipArchiveInputStream * Fixed formatting the lowest expressable DOS time * Dropped reflection from ExtraFieldUtils static initialization * Preserve exception causation in ExtraFieldUtils.register(Class) * Changes in version 1.25: * For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes- report.html#a1.25.0 * Changes in version 1.24: * For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes- report.html#a1.24.0 * Changes in version 1.23: * For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes- report.html#a1.23.0 * Changes in version 1.22: * For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes-report.html#a1.22 apache-commons-io was updated to version 2.15.1: * Changes in version 2.15.1: * For the full list of changes please consult: https://commons.apache.org/proper/commons-io/changes-report.html#a2.15.1 * Changes in version 2.15.0: * For the full list of changes please consult: https://commons.apache.org/proper/commons-io/changes-report.html#a2.15.0 * Changes in version 2.14.0: * For the full list of changes please consult: https://commons.apache.org/proper/commons-io/changes-report.html#a2.14.0 javapackages-meta: * Syncing the version with javapackages-tools 6.2.0 * Remove unnecessary dependencies maven was updated to version 3.9.6: * Changes in version 3.9.6: * Bugs fixed: * Error message when modelVersion is 4.0 is confusing * Improvements: * Colorize transfer messages * Support ${project.basedir} in file profile activation * Allow to exclude plugins from validation * Tasks: * Maven Resolver Provider classes ctor change * Undeprecate wrongly deprecated repository metadata * Deprecated `org.apache.maven.repository.internal.MavenResolverModule` * maven-resolver-provider: introduce NAME constants. * Dependency upgrade: * Updated to Resolver 1.9.16 * Upgraded Sisu version to 0.9.0.M2 * Upgraded Resolver version to 1.9.18 * Upgraded to parent POM 41 * Upgraded default plugin bindings maven-assembly-plugin: * Explicitely require commons-io:commons-io and commons-codec:common-codes artifacts that are optional in apache-commons-compress maven-doxia was updated to version 1.12.0: * Changes in version 1.12.0: * Upgraded to FOP 2.2 * Fixed rendering links and paragraphs inside tables * Rewrite .md and .markdown links to .html * Upgraded HttpComponents: httpclient to 4.5.8 and httpcore to 4.4.11 * Escape links to xml based figureGraphics image elements * SECURITY: Use HTTPS to resolve dependencies in Maven Build * Removed old Maven 1 and 2 info * Updated commons-lang to 3.8.1 * Dropped dependency to outdated Log4j * Fixed Java 7 compatibility that was broken * Import tests from maven-site-plugin * Fixed crosslinks starting with a dot in markdown files * Replace deprecated class from commons-lang * Fill in some generic types maven-doxia-sitetools was updated to version 1.11.1: * Changes in version 1.11.1: * Bugs fixed: * CLIRR can't find previous version * Improvements: * Removed all   in default-site-macros.vm and replace by a space * Improved documentation on site.xml inheritance vs interpolation * Tasks: * Deprecated Doxia Sitetools Doc Renderer * Dependency upgrade: * Fixed javadoc issues with JDK 8 when generating documentation * Wrong coordinates for jai_core: hyphen should be underscore * Use latest JUnit version 4.13.2 * Upgraded Plexus Utils to 3.3.0 * Upgraded Plexus Interpolation to 1.26 * Upgraded Maven Doxia to 1.10 * Upgraded Maven Doxia to 1.11.1 maven-jar-plugin was updated to version 3.3.0: * Changes in version 3.3.0: * Bugs fixed: * outputTimestamp not applied to module-info; breaks reproducible builds * Task: * Updated plugin (requires Maven 3.2.5+) * Java 8 as minimum * Dependency upgrade: * Upgraded Plexus Utils to 3.3.1 * Removed override for Plexus Archiver to fix order of META-INF/ and META-INF/MANIFEST.MF entries * Upgraded Parent to 36 * Updated Plexus Utils to 3.4.2 * Upgraded Parent to 37 maven-jar-plugin was updated to version 3.6.0: * Changes from version 3.6.0: * Bugs fixed: * Setting maven.javadoc.isoffline seems to have no effect * javadoc site is broken for projects that contain modules * Alternative doclet page points to an SEO spammy page * [REGRESSION] Transitive dependencies of docletArtifact missing * Unresolvable link in javadoc tag with value ResourcesBundleMojo#getAttachmentClassifier() found in ResourcesBundleMojo * IOException --> NullPointerException in JavadocUtil.copyResource * JavadocReportTest.testExceptions is broken * javadoc creates invalid --patch-module statements * javadoc plugin can not deal with transitive filename based modules * Improvements: * Clean up deprecated and unpreferred methods in JavadocUtil * Cleanup dependency declarations as best possible * Allow building javadoc "the old fashioned way" after Java 8 * Tasks: * Dropped use of deprecated localRepository mojo parameter * Make build pass with Java 20 * Refresh download page * Dependency upgrade: * Updated to commons-io 2.13.0 * Updated plexus-archiver from 4.7.1 to 4.8.0 * Upgraded Parent to 40 * Changes from version 3.5.0: * Bugs fixed: * Invalid anchors in Javadoc and plugin mojo * Plugin duplicates classes in Java 8 all-classes lists * javadoc site creation ignores configuration parameters * Improvements: * Deprecated parameter "stylesheet" * Parse stderr output and suppress informational lines * Link to Javadoc references from JDK 17 * Migrate components to JSR 330, get rid of maven-artifact-transfer, update to parent 37 * Tasks: * Removed remains of org.codehaus.doxia.sink.Sink * Dependency upgrades: * Upgraded plugins in ITs * Upgraded to Maven 3.2.5 * Updated Maven Archiver to 3.6.0 * Upgraded Maven Reporting API to 3.1.1/Complete with Maven Reporting Impl 3.2.0 * Upgraded commons-text to 1.10.0 * Upgraded Parent to 39 * Upgraded plugins and components maven-reporting-api was updated to version 3.1.1: * Restore binary compat for MavenReport maven-reporting-impl was updated to version 3.2.0: * Changes in version 3.2.0: * Improvement: * Render with a skin when report is run in standalone mode * Dependency upgrades: * Upgraded Maven Reporting API to 3.1.1 * Upgraded plugins and components in project and ITs maven-resolver was updated to version 1.9.18: * Changes in version 1.9.18: * Bugs fixed: * Sporadic AccessDeniedEx on Windows * Undo FileUtils changes that altered non-Windows execution path * Improvements: * Native transport should retry on HTTP 429 (Retry-After) * Task: * Deprecated Guice modules * Get rid of component name string literals, make them constants and reusable * Expose configuration for inhibiting Expect-Continue handshake in 1.x * Refresh download page * Resolver should not override given HTTP transport default use of expect-continue handshake maven-resources-plugin was updated to version 3.3.1: * Changes in version 3.3.1: * Bugs fixed: * Resource plugin's handling of symbolic links changed in 3.0.x, broke existing behavior * Resource copying not using specified encoding * java.nio.charset.MalformedInputException: Input length = 1 * Filtering of Maven properties with long names is not working after transition from 2.6 to 3.2.0 * Valid location for directory parameter is always required * Symlinks cause copying resources to fail * FileUtils.copyFile() fails with source file having `lastModified = 0` * New Features: * Added ability to flatten folder structure into target directory when copying resources * Improvements: * Make tests jar reproducible * Describe from and to in "Copying xresources" info message * Task: * Dropped plexus legacy * Updated to parent POM 39, reformat sources * Updated plugin (requires Maven 3.2.5+) * Require Java 8 * Dependency upgrade: * Upgraded maven-plugin parent to 36 * Upgraded Maven Filtering to 3.3.0 * Upgraded plexus-utils to 3.5.1 * Upgraded to maven-filtering 3.3.1 sbt: * Fixed RPM package build with maven 3.9.6 and maven-resolver 1.9.18 xmvn: * Modify the xmvn-install script to work with new apache-commons-compress * Recompiling RPM package to resolve package building issues with maven-lib ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-726=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-726=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-726=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-726=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-726=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-726=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-726=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-726=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-726=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-726=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-726=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-726=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-726=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-726=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-726=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-726=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-726=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-726=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-726=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-726=1 ## Package List: * SUSE Manager Server 4.3 Module 4.3 (noarch) * apache-commons-compress-1.26.0-150200.3.16.1 * apache-commons-codec-1.16.1-150200.3.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Manager Proxy 4.3 (noarch) * apache-commons-codec-1.16.1-150200.3.9.1 * apache-commons-io-2.15.1-150200.3.12.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * apache-commons-codec-1.16.1-150200.3.9.1 * apache-commons-io-2.15.1-150200.3.12.1 * SUSE Manager Server 4.3 (noarch) * apache-commons-codec-1.16.1-150200.3.9.1 * apache-commons-io-2.15.1-150200.3.12.1 * SUSE Enterprise Storage 7.1 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * apache-commons-codec-1.16.1-150200.3.9.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * openSUSE Leap 15.5 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * apache-commons-io-2.15.1-150200.3.12.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * maven-javadoc-plugin-bootstrap-3.6.0-150200.4.10.1 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-javadoc-3.9.6-150200.4.21.2 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-javadoc-1.12.0-150200.4.7.2 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * xmvn-mojo-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * xmvn-mojo-javadoc-4.2.0-150200.3.18.1 * xmvn-tools-javadoc-4.2.0-150200.3.18.1 * maven-jar-plugin-bootstrap-3.3.0-150200.3.10.1 * maven-resolver-javadoc-1.9.18-150200.3.17.2 * xmvn-connector-javadoc-4.2.0-150200.3.18.1 * maven-resolver-transport-classpath-1.9.18-150200.3.17.2 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-assembly-plugin-3.6.0-150200.3.10.1 * apache-commons-configuration2-javadoc-2.9.0-150200.5.5.1 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-resolver-1.9.18-150200.3.17.2 * apache-commons-io-javadoc-2.15.1-150200.3.12.1 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-test-docs-1.12.0-150200.4.7.2 * maven-doxia-module-docbook-simple-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-doxia-module-rtf-1.12.0-150200.4.7.2 * maven-doxia-module-twiki-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * maven-doxia-module-latex-1.12.0-150200.4.7.2 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-javadoc-plugin-javadoc-3.6.0-150200.4.10.1 * maven-reporting-impl-javadoc-3.2.0-150200.4.6.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * maven-resolver-test-util-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * maven-assembly-plugin-javadoc-3.6.0-150200.3.10.1 * maven-jar-plugin-javadoc-3.3.0-150200.3.10.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-doxia-module-confluence-1.12.0-150200.4.7.2 * apache-commons-compress-javadoc-1.26.0-150200.3.16.1 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resources-plugin-bootstrap-3.3.1-150200.3.12.1 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * maven-reporting-api-javadoc-3.1.1-150200.3.7.1 * maven-resources-plugin-javadoc-3.3.1-150200.3.12.1 * sbt-bootstrap-0.13.18-150200.4.19.7 * xmvn-parent-4.2.0-150200.3.18.1 * apache-commons-codec-javadoc-1.16.1-150200.3.9.1 * maven-reporting-impl-3.2.0-150200.4.6.2 * maven-doxia-sitetools-javadoc-1.11.1-150200.3.7.1 * apache-commons-codec-1.16.1-150200.3.9.1 * xmvn-install-4.2.0-150200.3.18.1 * sbt-0.13.18-150200.4.19.7 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * Basesystem Module 15-SP5 (noarch) * apache-commons-codec-1.16.1-150200.3.9.1 * apache-commons-io-2.15.1-150200.3.12.1 * Development Tools Module 15-SP5 (noarch) * maven-doxia-sitetools-1.11.1-150200.3.7.1 * maven-doxia-module-xdoc-1.12.0-150200.4.7.2 * xmvn-connector-4.2.0-150200.3.18.1 * maven-resolver-util-1.9.18-150200.3.17.2 * xmvn-resolve-4.2.0-150200.3.18.1 * maven-resolver-spi-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml-1.12.0-150200.4.7.2 * maven-resources-plugin-3.3.1-150200.3.12.1 * maven-doxia-module-fo-1.12.0-150200.4.7.2 * xmvn-mojo-4.2.0-150200.3.18.1 * maven-doxia-logging-api-1.12.0-150200.4.7.2 * xmvn-api-4.2.0-150200.3.18.1 * apache-commons-compress-1.26.0-150200.3.16.1 * maven-resolver-named-locks-1.9.18-150200.3.17.2 * maven-resolver-api-1.9.18-150200.3.17.2 * maven-doxia-module-apt-1.12.0-150200.4.7.2 * maven-doxia-core-1.12.0-150200.4.7.2 * maven-reporting-api-3.1.1-150200.3.7.1 * maven-resolver-transport-http-1.9.18-150200.3.17.2 * maven-javadoc-plugin-3.6.0-150200.4.10.1 * apache-commons-configuration2-2.9.0-150200.5.5.1 * maven-doxia-sink-api-1.12.0-150200.4.7.2 * maven-resolver-connector-basic-1.9.18-150200.3.17.2 * ivy-local-6.2.0-150200.3.7.1 * gradle-local-6.2.0-150200.3.7.1 * maven-resolver-transport-wagon-1.9.18-150200.3.17.2 * maven-jar-plugin-3.3.0-150200.3.10.1 * xmvn-core-4.2.0-150200.3.18.1 * maven-resolver-transport-file-1.9.18-150200.3.17.2 * maven-resolver-impl-1.9.18-150200.3.17.2 * maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 * maven-local-6.2.0-150200.3.7.1 * xmvn-install-4.2.0-150200.3.18.1 * maven-doxia-module-fml-1.12.0-150200.4.7.2 * xmvn-subst-4.2.0-150200.3.18.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.6-150200.4.21.2 * maven-3.9.6-150200.4.21.2 * xmvn-minimal-4.2.0-150200.3.18.1 * xmvn-4.2.0-150200.3.18.1 * SUSE Package Hub 15 15-SP5 (noarch) * sbt-bootstrap-0.13.18-150200.4.19.7 * sbt-0.13.18-150200.4.19.7 ## References: * https://www.suse.com/security/cve/CVE-2024-25710.html * https://www.suse.com/security/cve/CVE-2024-26308.html * https://bugzilla.suse.com/show_bug.cgi?id=1220068 * https://bugzilla.suse.com/show_bug.cgi?id=1220070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:09 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:09 -0000 Subject: SUSE-RU-2024:0725-1: moderate: Recommended update for suse-build-key Message-ID: <170920980955.24296.12088523021000891617@smelt2.prg2.suse.org> # Recommended update for suse-build-key Announcement ID: SUSE-RU-2024:0725-1 Rating: moderate References: * bsc#1219123 * bsc#1219189 * jsc#PED-2777 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has two fixes can now be installed. ## Description: This update for suse-build-key fixes the following issues: * Switch container key to be default RSA 4096bit. (jsc#PED-2777) * run import script also in %posttrans section, but only when libzypp is not active. bsc#1219189 bsc#1219123 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-725=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-725=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-725=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-725=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-725=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-725=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-725=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-725=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-725=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-725=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-725=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-725=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-725=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-725=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-725=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-725=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-725=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-725=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-725=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-725=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-725=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-725=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-725=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-725=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-725=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-725=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-725=1 ## Package List: * openSUSE Leap Micro 5.3 (noarch) * suse-build-key-12.0-150000.8.43.1 * openSUSE Leap Micro 5.4 (noarch) * suse-build-key-12.0-150000.8.43.1 * openSUSE Leap 15.5 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * suse-build-key-12.0-150000.8.43.1 * Basesystem Module 15-SP5 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Manager Proxy 4.3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Manager Server 4.3 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Enterprise Storage 7.1 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * suse-build-key-12.0-150000.8.43.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * suse-build-key-12.0-150000.8.43.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219123 * https://bugzilla.suse.com/show_bug.cgi?id=1219189 * https://jira.suse.com/browse/PED-2777 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:11 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:11 -0000 Subject: SUSE-RU-2024:0724-1: moderate: Recommended update for orarun Message-ID: <170920981148.24296.25568759859757706@smelt2.prg2.suse.org> # Recommended update for orarun Announcement ID: SUSE-RU-2024:0724-1 Rating: moderate References: * bsc#1217288 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for orarun fixes the following issue: * bsc#1217288 - Fixed common.sh checks if $ORACLE_HOME is NOT a directory instead of if it is Oracle Agent won't start ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-724=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-724=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-724=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-724=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-724=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-724=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-724=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-724=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-724=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-724=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * orarun-2.1-150400.22.6.1 * SUSE Manager Proxy 4.3 (x86_64) * orarun-2.1-150400.22.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * orarun-2.1-150400.22.6.1 * SUSE Manager Server 4.3 (s390x x86_64) * orarun-2.1-150400.22.6.1 * openSUSE Leap 15.4 (s390x x86_64 i586) * orarun-2.1-150400.22.6.1 * openSUSE Leap 15.5 (s390x x86_64) * orarun-2.1-150400.22.6.1 * Server Applications Module 15-SP5 (s390x x86_64) * orarun-2.1-150400.22.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * orarun-2.1-150400.22.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * orarun-2.1-150400.22.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x x86_64) * orarun-2.1-150400.22.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1217288 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:13 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:13 -0000 Subject: SUSE-RU-2024:0723-1: moderate: Recommended update for SAPHanaSR-angi Message-ID: <170920981353.24296.11916164196267057864@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR-angi Announcement ID: SUSE-RU-2024:0723-1 Rating: moderate References: * bsc#1210728 * bsc#1214613 * bsc#1215693 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has three fixes can now be installed. ## Description: This update for SAPHanaSR-angi fixes the following issues: SAPHanaSR-angi was updated from version 1.001.5 to 1.2.3: * Version 1.2.3: * `SAPHanaSR-angi` is currently still in status of 'technical preview' * SAPHanaFilesystem RA is still in POC status * Added parameter 'ON_FAIL_ACTION' to SAPHanaFilesystem RA (POC) * Improved the usage of SAP virtual hostnames * If the `susHanaSR.py` hook has successfully reported a SR event to the cluster a still existing fall-back state file will be removed to prevent an override of an already reported SR state. (bsc#1215693) * Improved supportability by providing the current process ID of the RA, which is logged in the RA outputs, to HANA tracefiles too. This allows a mapping of the SAP related command invocations from the RA and the HANA executions which might have a delay in between. (bsc#1214613) * Avoid explicid and implicid usage of `/tmp` filesystem to keep the SAPHanaSR resource agents working even in situations with `/tmp` filesystem full. (bsc#1210728) * SAPHanaController: change default stop timeout from 3600 to 600 * SAPHanaController: change default promote timeout from 3600 to 900 * Fixed typo in example `srHook/global.ini_susHanaSR` * Fixed missing trace section in example `srHook/global.ini_susChkSrv` * Updated man pages: SAPHanaSR-angi.7 SAPHanaSR.7 SAPHanaSR-ScaleOut.7 SAPHanaSR_basic_cluster.7 SAPHanaSR-ScaleOut_basic_cluster.7 SAPHanaSR_maintenance_examples.7 ocf_suse_SAPHana.7 ocf_suse_SAPHanaController.7 ocf_suse_SAPHanaTopology.7 ocf_suse_SAPHanaFilesystem.7 susChkSrv.py.7 susHanaSR.py.7 susTkOver.py.7 SAPHanaSR-showAttr.8 * Version 1.2.0: * Added SAPHanaFilesystem RA as a POC ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-723=1 SUSE-2024-723=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-723=1 ## Package List: * openSUSE Leap 15.5 (noarch) * SAPHanaSR-angi-1.2.3-150500.3.6.1 * SAP Applications Module 15-SP5 (noarch) * SAPHanaSR-angi-1.2.3-150500.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1210728 * https://bugzilla.suse.com/show_bug.cgi?id=1214613 * https://bugzilla.suse.com/show_bug.cgi?id=1215693 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:14 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:14 -0000 Subject: SUSE-RU-2024:0722-1: moderate: Recommended update for sap-installation-wizard Message-ID: <170920981486.24296.3073986697184535881@smelt2.prg2.suse.org> # Recommended update for sap-installation-wizard Announcement ID: SUSE-RU-2024:0722-1 Rating: moderate References: * bsc#1218918 Affected Products: * openSUSE Leap 15.4 * SAP Applications Module 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that has one fix can now be installed. ## Description: This update for sap-installation-wizard fixes the following issues: sap-installation-wizard was updated to version 4.4.13: * Fixed SAP Business One storage configuration failing (bsc#1218918) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-722=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-722=1 ## Package List: * openSUSE Leap 15.4 (ppc64le x86_64) * sap-installation-wizard-4.4.13-150400.3.17.1 * SAP Applications Module 15-SP4 (ppc64le x86_64) * sap-installation-wizard-4.4.13-150400.3.17.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218918 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:18 -0000 Subject: SUSE-RU-2024:0721-1: important: Recommended update for SAPHanaSR Message-ID: <170920981880.24296.18040220386114670202@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR Announcement ID: SUSE-RU-2024:0721-1 Rating: important References: * bsc#1218333 * bsc#1219194 * bsc#1219785 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has three fixes can now be installed. ## Description: This update for SAPHanaSR fixes the following issues: * SAPHanaSR was updated to version 0.162.3: * Fixed the hexdump log for empty node states * Catch monitor calls for non-cloned resources and report them as unsupported instead of 'command not found' (bsc#1218333) * Fixed the scope of variable 'site' to be global (bsc#1219194) * susChkSrv.py - relocate function logTimestamp() * Updated man pages: * SAPHanaSR.7 * ocf_suse_SAPHana.7 * SAPHanaSR_maintenance_examples.7 * SAPHanaSR.py.7 * SAPHanaSR-showAttr.8 * Fixed a regression in topology found during QE testing (bsc#1219785) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SAP-12-SP5-2024-721=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * SAPHanaSR-doc-0.162.3-3.39.1 * SAPHanaSR-0.162.3-3.39.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218333 * https://bugzilla.suse.com/show_bug.cgi?id=1219194 * https://bugzilla.suse.com/show_bug.cgi?id=1219785 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:30:20 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:30:20 -0000 Subject: SUSE-RU-2024:0720-1: important: Recommended update for SAPHanaSR Message-ID: <170920982049.24296.11976930972791270216@smelt2.prg2.suse.org> # Recommended update for SAPHanaSR Announcement ID: SUSE-RU-2024:0720-1 Rating: important References: * bsc#1218333 * bsc#1219194 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for SAPHanaSR fixes the following issues: * SAPHanaSR was updated to version 0.162.3: * Fixed the hexdump log for empty node states * Catch monitor calls for non-cloned resources and report them as unsupported instead of 'command not found' (bsc#1218333) * Fixed the scope of variable 'site' to be global (bsc#1219194) * susChkSrv.py - relocate function logTimestamp() * Updated man pages: * SAPHanaSR.7 * ocf_suse_SAPHana.7 * SAPHanaSR_maintenance_examples.7 * SAPHanaSR.py.7 * SAPHanaSR-showAttr.8 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-720=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-720=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-720=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-720=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-720=1 ## Package List: * openSUSE Leap 15.5 (noarch) * SAPHanaSR-0.162.3-150000.4.41.1 * SAPHanaSR-doc-0.162.3-150000.4.41.1 * SAP Applications Module 15-SP2 (noarch) * SAPHanaSR-0.162.3-150000.4.41.1 * SAPHanaSR-doc-0.162.3-150000.4.41.1 * SAP Applications Module 15-SP3 (noarch) * SAPHanaSR-0.162.3-150000.4.41.1 * SAPHanaSR-doc-0.162.3-150000.4.41.1 * SAP Applications Module 15-SP4 (noarch) * SAPHanaSR-0.162.3-150000.4.41.1 * SAPHanaSR-doc-0.162.3-150000.4.41.1 * SAP Applications Module 15-SP5 (noarch) * SAPHanaSR-0.162.3-150000.4.41.1 * SAPHanaSR-doc-0.162.3-150000.4.41.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1218333 * https://bugzilla.suse.com/show_bug.cgi?id=1219194 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:36:25 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:36:25 -0000 Subject: SUSE-RU-2024:0719-1: important: Recommended update for patterns-sap Message-ID: <170921018578.28289.4364049368921504841@smelt2.prg2.suse.org> # Recommended update for patterns-sap Announcement ID: SUSE-RU-2024:0719-1 Rating: important References: * bsc#1220161 Affected Products: * openSUSE Leap 15.4 * SAP Applications Module 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that has one fix can now be installed. ## Description: This update for patterns-sap fixes the following issues: * Fixed patterns-sap-nw blocking the installation of SAPHanaSR-angi package (bsc#1220161) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-719=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-719=1 ## Package List: * openSUSE Leap 15.4 (ppc64le x86_64) * patterns-sap-bone-15.4-150400.4.8.1 * patterns-sap-nw-15.4-150400.4.8.1 * patterns-sap-hana-15.4-150400.4.8.1 * patterns-sap-15.4-150400.4.8.1 * SAP Applications Module 15-SP4 (ppc64le x86_64) * patterns-sap-nw-15.4-150400.4.8.1 * patterns-sap-hana-15.4-150400.4.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220161 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:36:27 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:36:27 -0000 Subject: SUSE-RU-2024:0718-1: important: Recommended update for aardvark-dns, netavark Message-ID: <170921018724.28289.2128913643280808400@smelt2.prg2.suse.org> # Recommended update for aardvark-dns, netavark Announcement ID: SUSE-RU-2024:0718-1 Rating: important References: * jsc#PED-7577 Affected Products: * Containers Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature can now be installed. ## Description: This update for aardvark-dns and netavark fixes the following issues: aardvark-dns was updated to version 1.10.0 (jsc#PED-7577): * Changes in version 1.10.0: * chore(deps): update rust crate chrono to 0.4.32 * chore(deps): update dependency containers/automation_images to v20240102 * fix(deps): update rust crate futures-util to 0.3.30 * fix(deps): update rust crate anyhow to 1.0.79 * fix(deps): update rust crate tokio to 1.35.1 * chore(deps): update dependency containers/automation_images to v20231208 * fix(deps): update rust crate tokio to 1.35.0 * fix duplicated IP CI flake * server: remove unused kill switch * fix(deps): update rust crate clap to ~4.4.10 * Changes in version 1.9.0: * run cargo update * chore(deps): update dependency containers/automation_images to v20231116 * fix(deps): update rust crate tokio to 1.34.0 * fix(deps): update rust crate async-broadcast to 0.6.0 * update trust-dns to hickory * fix(deps): update rust crate futures-util to 0.3.29 * fix(deps): update rust crate trust-dns-server to 0.23.2 * fix(deps): update rust crate trust-dns-proto to 0.23.2 * tmt: initial enablement * aardvark main: change error reporting * chore(deps): update dependency containers/automation_images to v20231004 * fix(deps): update rust crate trust-dns-proto to 0.23.1 * fix(deps): update rust crate trust-dns-client to 0.23.1 * clippy: some format fixes * fix(deps): update rust crate tokio to 1.33.0 * Changes in version 1.8.0: * run cargo update * Packit: switch to @containers/packit-build team for copr failure notification comments * [CI:BUILD] Packit: tag @lsm5 on copr build failures * chore(deps): update rust crate chrono to 0.4.31 * cargo: bump chrono to 0.4.30 * test: IPv6 format is changed in v1.72.0 * bump nix to 0.27.1 * vendor: bump trust_dns_proto and trust_dns_client to 0.23.0 * fix(deps): update rust crate trust-dns-server to 0.23.0 * [CI:BUILD] rpm: spdx compatible license field * fix(deps): update rust crate anyhow to 1.0.75 * fix(deps): update rust crate tokio to 1.32.0 * chore(deps): update dependency containers/automation_images to v20230816 * fix(deps): update rust crate tokio to 1.31.0 * fix(deps): update rust crate anyhow to 1.0.74 * fix(deps): update rust crate anyhow to 1.0.73 * fix(deps): update rust crate log to 0.4.20 * chore(deps): update dependency containers/automation_images to v20230809 * fix(deps): update rust crate tokio to 1.30.0 * fix(deps): update rust crate clap to 4.3.21 * packit: Build PRs into default packit COPRs * chore(deps): update dependency containers/automation_images to v20230807 * fix(deps): update rust crate anyhow to 1.0.72 * fix(deps): update rust crate signal-hook to 0.3.17 * fix(deps): update rust crate clap to 4.3.19 * fix(deps): update rust crate clap to 4.3.15 * fix(deps): update rust crate signal-hook to 0.3.16 * [CI:BUILD] Packit: remove pre-sync action * fix(deps): update rust crate clap to 4.3.11 * fix(deps): update rust crate tokio to 1.29.1 * fix(deps): update rust crate clap to 4.3.10 * [CI:BUILD] RPM: cleanup spec and fix eln builds * Disable restricting builds only for tier1 platforms i.e. only for x86_64 and aarch64 and enable for all. * Changes in version 1.7.0: * fix(deps): update rust crate tokio to 1.29.0 * fix(deps): update rust crate clap to 4.3.8 * fix(deps): update rust crate clap to 4.3.5 * run cargo update * [CI:BUILD] Packit: add Fedora downstream tasks * fix(deps): update rust crate clap to 4.3.4 * chore(deps): update dependency containers/automation_images to v20230614 * fix(deps): update rust crate clap to 4.3.3 * fix(deps): update rust crate log to 0.4.19 * fix(deps): update rust crate clap to 4.3.2 * fix(deps): update rust crate clap to 4.3.1 * cirrus: remove verify_vendor task * chore(deps): update dependency containers/automation_images to v20230601 * fix(deps): update rust crate trust-dns-server to 0.22.1 * chore(deps): update rust crate chrono to 0.4.26 * fix(deps): update rust crate tokio to 1.28.2 * fix(deps): update rust crate log to 0.4.18 * chore(deps): update rust crate chrono to 0.4.25 * fix(deps): update rust crate clap to 4.3.0 * chore(deps): update dependency containers/automation_images to v20230517 * fix(deps): update rust crate tokio to 1.28.1 * chore(deps): update dependency containers/automation_images to v20230426 * fix(deps): update rust crate clap to 4.2.7 * fix(deps): update rust crate anyhow to 1.0.71 * fix typo in makefile * fix(deps): update rust crate tokio to 1.28.0 * fix(deps): update rust crate clap to 4.2.5 * fix(deps): update rust crate syslog to ^6.1.0 * fix(deps): update rust crate clap to 4.2.4 * fix(deps): update rust crate clap to 4.2.3 * fix(deps): update rust crate clap to v4 * chore(deps): update dependency containers/automation_images to v20230405 * Changes in version 1.6.0: * fix(deps): update rust crate tokio to 1.27.0 * use lower TTL for contianer entries * fix(deps): update rust crate syslog to ^6.0.1 * fix(deps): update rust crate futures-util to 0.3.28 * chore(deps): update dependency containers/automation_images to v20230330 * Disable Dependabot in favor of Renovate * chore(deps): update dependency containers/automation_images to v20230320 * build(deps): bump futures-util from 0.3.26 to 0.3.27 * [CI:BUILD] Packit: trigger builds on commit to main branch * build(deps): bump anyhow from 1.0.68 to 1.0.70 * fix lint issue with new rust version 1.68 * Cirrus: Update to newer CI VM images * build(deps): bump chrono from 0.4.23 to 0.4.24 * build(deps): bump libc from 0.2.139 to 0.2.140 * build(deps): bump async-broadcast from 0.5.0 to 0.5.1 * build(deps): bump signal-hook from 0.3.14 to 0.3.15 * build(deps): bump futures-util from 0.3.25 to 0.3.26 * build(deps): bump tokio from 1.25.0 to 1.26.0 * [CI:DOCS] Clarify packit related comments * [CI:BUILD] Packit: initial enablement * Allow custom cargo binary path * Switch to explicit platform list for `cargo vendor-filterer` * Add renovate.json5 * Cirrus: Groom rust cache before updating netavark was update to version 1.10.2 (jsc#PED-7577): * Changes in version 1.10.2: * Fixed aardvark-dns handling * Do not perform network namespace detection on AV update * Changes in version 1.10.1: * Updated to nftables release 0.3 from crates.io * DISTRO_PACKAGE: fix incorrect vendored tar archive URL * Bump to 1.11.0-dev * Changes in version 1.10.0: * RPM: update .cargo/config before building * Added support for isolation to the nftables driver * build(deps): bump h2 from 0.3.22 to 0.3.24 * chore(deps): update rust crate chrono to 0.4.32 * fix(deps): update rust crate env_logger to 0.11.0 * chore(deps): update dependency containers/automation_images to v20240102 * Bump nftables-rs to latest commit * Netavark: nftables support * fix(deps): update rust crate serde_json to 1.0.111 * feat: added the --firewall-driver option * Document how to generate a code coverage report for netavark * fix(deps): update rust crate clap to ~4.4.12 * fix(deps): update rust crate serde_json to 1.0.110 * fix(deps): update rust-futures monorepo to 0.3.30 * fix(deps): update rust crate nispor to 1.2.16 * chore(deps): update rust crate tempfile to 3.9.0 * Use tonic::transport::Uri instead of HTTP * chore(deps): update dependency containers/automation_images to v20231208 * fix(deps): update rust crate tokio to 1.35 * dhcp-proxy: return actual error instead of generic one * dhcp-proxy: skip set gateway if missing * bump netlink-packet-route to 0.18.1 * chore(deps): update rust crate once_cell to 1.19.0 * fix(deps): update rust crate nispor to 1.2.15 * fix(deps): update rust crate serde to 1.0.193 * fix(deps): update rust crate clap to ~4.4.10 * aardvark: show error if process is in wrong netns * aardvark: remove unessesary unlock lockfile calls * fix(deps): update rust crate url to 2.5.0 * Bump working version to v1.10.0-dev * Changes in version 1.9.0: * test: fix syntax problem in helpers.bash * run cargo update * use OsString/Path over String for file paths * chore(deps): update dependency containers/automation_images to v20231116 * firewalld-reload: fix CI tests * firewalld-reload: prevent race which could leak fw rules * fix(deps): update rust crate clap to ~4.4.8 * CI: skip broken firewalld test * fix(deps): update rust crate http to 0.2.11 * rpm: add netavark-firewalld-reload.service to spec * firewalld-reload: add integration tests * firewall/state: make sure to ignore enoent on read * firewall-reload: integrate actual logic to reload rules * firewall/state: improve error messages * firewall: add state functions to serialize configs * firewalld: fix lint errors with rust v1.73 * firewall: do not use full Network in NetworkStruct * firewall: add dns_port to SetupNetwork * add firewalld-reload subcommand * fix(deps): update rust crate http to 0.2.10 * fix(deps): update rust crate env_logger to 0.10.1 * fix(deps): update rust crate tokio to 1.34 * Update rust container build files * bridge: force static mac on bridge interface * fix(deps): update rust crate futures-core to 0.3.29 * fix(deps): update rust crate serde to 1.0.190 * fix(deps): update rust crate serde_json to 1.0.108 * fix(deps): update rust crate sysctl to 0.5.5 * fix(deps): update rust-futures monorepo to 0.3.29 * CI: Drop CI VM distro name * chore(deps): update dependency containers/automation_images to v20231004 * fix(deps): update rust crate tokio to 1.33 * build-sys: Filter to tier 2 Linux declaratively * fix(deps): update rust crate sha2 to 0.10.8 * fix podman.io community link * Bump to v1.9.0-dev * Changes in version 1.8.0: * run cargo update * Add vrf support for bridges * Packit: switch to @containers/packit-build team for copr failure notification comments * fix(deps): update rust crate nispor to 1.2.14 * [CI:BUILD] Packit: tag @lsm5 on copr build failures * chore(deps): update rust crate chrono to 0.4.31 * fix(deps): update rust crate serde_json to 1.0.107 * rust io safety: convert RawFd to BorrowedFd<> * bump nix to 0.27.1 * chore(deps): update rust crate chrono to 0.4.30 * fix(deps): update rust crate serde_json to 1.0.106 * chore(deps): update rust crate chrono to 0.4.29 * fix(deps): update rust crate netlink-packet-route to 0.17.1 * Bump tonic and prost * Update container image to F38 * Add ACCEPT rules in firewall for bridge network with internal dns. * chore(deps): update rust crate tonic-build to 0.10 * fix(deps): update rust crate nispor to 1.2.13 * fix(deps): update rust crate serde to 1.0.188 * Fix clippy warnings about formatting * update chrono crate * fix(deps): update rust crate url to 2.4.1 * Add protoc dependency to README * [CI:BUILD] rpm: spdx compatible license field * fix(deps): update rust crate tokio to 1.32 * chore(deps): update dependency containers/automation_images to v20230816 * fix(deps): update rust crate serde_json to 1.0.105 * fix(deps): update rust crate tokio to 1.31 * fix(deps): update rust crate log to 0.4.20 * run cargo update * update tonic-build to 0.9.2 * bump rust edition to 2021 * iptables: drop invalid packages * fix(deps): update rust crate tokio to 1.30 * docs: Convert markdown with go-md2man instead of mandown * fix(deps): update rust crate clap to 4.3.21 * packit: Build PRs into default packit COPRs * chore(deps): update dependency containers/automation_images to v20230807 * fix(deps): update rust crate serde to 1.0.183 * fix(deps): update rust crate serde to 1.0.181 * fix(deps): update rust crate serde to 1.0.180 * fix(deps): update rust crate serde_json to 1.0.104 * fix(deps): update rust crate serde to 1.0.179 * fix(deps): update rust crate serde to 1.0.176 * fix(deps): update rust crate clap to 4.3.19 * fix(deps): update rust crate serde to 1.0.175 * fix(deps): update rust crate clap to 4.3.17 * fix(deps): update rust crate clap to 4.3.15 * fix(deps): update rust crate clap to 4.3.12 * fix(deps): update rust crate serde_json to 1.0.103 * [CI:BUILD] Packit: remove pre-sync action * fix(deps): update rust crate serde_json to 1.0.102 * fix(deps): update rust crate nispor to 1.2.12 * macvlan: use netlink type for bclim * bump netlink deps * fix(deps): update rust crate serde to 1.0.171 * fix(deps): update rust crate serde to 1.0.167 * fix(deps): update rust crate clap to 4.3.11 * fix(deps): update rust crate serde to 1.0.166 * fix(deps): update rust crate serde_json to 1.0.100 * iptables: improve error when ip6?tables commands are missing * fix(deps): update rust crate clap to 4.3.10 * fix(deps): update rust crate zbus to 3.14.1 * [CI:BUILD] RPM: Fix ELN build and cleanup spec * bump to v1.8.0-dev * Changes in version 1.7.0: * fix(deps): update rust crate tokio to 1.29 * netavark: make --config required for dns * fix(deps): update rust crate serde_json to 1.0.99 * fix(deps): update rust crate clap to 4.3.8 * [CI:BUILD] Packit: add Fedora downstream tasks * run cargo update * fix(deps): update rust crate serde_json to 1.0.97 * fix(deps): update rust crate sha2 to 0.10.7 * fix(deps): update rust crate clap to 4.3.4 * chore(deps): update dependency containers/automation_images to v20230614 * fix(deps): update rust crate clap to 4.3.3 * fix(deps): update rust crate log to 0.4.19 * aardvark: fix missleading dns disabled log * firewall: add NETAVARK_ISOLATION_3 chain for strict isolation * docs: fix link to getting started * fix(deps): update rust crate serde to 1.0.164 * netlink: fix incorrect info log for del_route * dhcp-proxy: apply new ip address/gateway * test-dhcp: fix broekn has_ip() check * dhcp-proxy: actually implement renewing leases * dhcp-proxy: simplify code * dhcp-proxy: drop macaddr dependency * dhcp-proxy: remove some unused traits * fix(deps): update rust crate zbus to 3.13.1 * fix(deps): update rust crate clap to 4.3.2 * chore(deps): update rust crate once_cell to 1.18.0 * fix(deps): update rust crate url to 2.4.0 * fix(deps): update rust crate clap to 4.3.1 * chore(deps): update dependency containers/automation_images to v20230601 * chore(deps): update rust crate chrono to 0.4.26 * chore(deps): update rust crate chrono to 0.4.25 * fix(deps): update rust crate log to 0.4.18 * chore(deps): update rust crate once_cell to 1.17.2 * macvlan: add bclim option * parse_option(): return option instead of default * add no_default_gateway option * fix(deps): update rust crate clap to 4.3.0 * chore(deps): update dependency containers/automation_images to v20230517 * fix(deps): update rust crate serde to 1.0.163 * Add ability to add static route * fix(deps): update rust crate serde to 1.0.162 * Cirrus: Update fedora name to match image * fix(deps): update rust crate clap to 4.2.7 * chore(deps): update dependency containers/automation_images to v20230426 * correct typo in Makefile * simplify path printing * fix(deps): update rust crate tokio to 1.28 * aardvark-dns pid: return better errors * fix comment in Subnet definition * aardvark: no error when aardvark config is not there * fix(deps): update rust crate zbus to 3.12.0 * fix(deps): update rust crate clap to 4.2.4 * fix(deps): update rust crate clap to 4.2.2 * fix(deps): update rust crate serde_json to 1.0.96 * update clap to v4 * fix(deps): update rust crate serde to 1.0.160 * bump to v1.7.0-dev * Changes in version 1.6.0: * dhcp-proxy: fix typo for --activity-timeout * chore(deps): update dependency containers/automation_images to v20230405 * dhcp-proxy: use better error when connection fails * add documentation for netavark plugins * add stderr example plugin to test stderr passthrough * add netavark plugin driver * add example error plugin * add host-device example plugin * plugin: add simple plugin interface * netlink: add dump_addresses * netlink: add set_link_ns * dhcp-proxy: correctly exit > 0 on errors * fix(deps): update rust crate tonic to 0.9 * fix(deps): update rust crate mozim to 0.2.2 * fix(deps): update rust crate serde to 1.0.159 * fix(deps): update rust crate netlink-sys to 0.8.5 * dhcp-proxy: create socket directory only when used * dhcp-proxy: do not remove socket when running under systemd * Makefile: netavark-dhcp-proxy.service use correct path * fix(deps): update rust crate http to 0.2.9 * chore(deps): update rust crate once_cell to 1.17.1 * fix(deps): update rust-futures monorepo to 0.3.28 * fix(deps): update rust crate serde_json to 1.0.95 * chore(deps): update dependency containers/automation_images to v20230330 * Disable Dependabot in favor of Renovate * chore(deps): update rust crate chrono to 0.4.24 * build(deps): bump ipnet from 2.7.1 to 2.7.2 * build(deps): bump serde from 1.0.158 to 1.0.159 * build(deps): bump serde_json from 1.0.94 to 1.0.95 * update,main: dont write empty space when no network_dns_servers is given * fix(deps): update rust crate tokio to 1.27 * Quit Leasing when Client disconnects * build(deps): bump mozim from 0.2.1 to 0.2.2 * iptables: fix incorrect debug statement * build(deps): bump serde from 1.0.156 to 1.0.158 * iptables: port fw handle wildcard address correctly * chore(deps): update dependency containers/automation_images to v20230320 * build(deps): bump zbus from 3.11.0 to 3.11.1 * build(deps): bump anyhow from 1.0.69 to 1.0.70 * [CI:BUILD] Packit: trigger builds on commit to main branch * Cirrus: Invalidate v2 bin cache * Include Systemd Files in RPM Package * Cirrus: Fix success failing on artifact extraction * fix lint issue with new rust version 1.68 * Cirrus: Update to newer CI VM images * build(deps): bump serde from 1.0.152 to 1.0.156 * combine dhcp-proxy and netavark into one binary * update: should allow empty network_dns_servers * build(deps): bump libc from 0.2.139 to 0.2.140 * fix aarch64 ncat flake * update to mozim 0.2.1 * build(deps): bump zbus from 3.10.0 to 3.11.0 * packit: Update build release tag correctly * test: move proto option into run_nc_test() * test: add netns pid param to port checks * test: import podman code to check for ports * cirrus.yaml: add new binaries in art_prep_script * fix netavark-dhcp-proxy binary in system unit * import netavark-proxy-dhcp tests * add build_proxy_client target * add netavark-dhcp-proxy to rpm * Fix dhcp-proxy build * Merge nv-dhcp-proxy into nv * fix default route metric test name * build(deps): bump tokio from 1.25.0 to 1.26.0 * Support none parameter on NETAVARK_FW * build(deps): bump anyhow from 1.0.68 to 1.0.69 * Fix typos * update netlink-packet-{route,core} to 0.15 and 0.5 * build(deps): bump serde_json from 1.0.92 to 1.0.93 * build(deps): bump zbus from 3.8.0 to 3.10.0 * [CI:BUILD] Packit: initial enablement * Allow custom cargo binary path * build(deps): bump serde_json from 1.0.91 to 1.0.92 * Cirrus: Reduce requested CPUs for compile-tasks * bump to version 1.0.6-dev * build(deps): bump netlink-sys from 0.8.3 to 0.8.4 * Add renovate.json5 * Added aardvark-dns as dependency requirement for netavark ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-718=1 openSUSE-SLE-15.5-2024-718=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-718=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-718=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * netavark-debuginfo-1.10.2-150500.3.3.3 * netavark-1.10.2-150500.3.3.3 * aardvark-dns-1.10.0-150500.3.3.1 * aardvark-dns-debuginfo-1.10.0-150500.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * netavark-debuginfo-1.10.2-150500.3.3.3 * netavark-1.10.2-150500.3.3.3 * aardvark-dns-1.10.0-150500.3.3.1 * aardvark-dns-debuginfo-1.10.0-150500.3.3.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * netavark-debuginfo-1.10.2-150500.3.3.3 * netavark-1.10.2-150500.3.3.3 * aardvark-dns-1.10.0-150500.3.3.1 * aardvark-dns-debuginfo-1.10.0-150500.3.3.1 ## References: * https://jira.suse.com/browse/PED-7577 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 12:36:28 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 12:36:28 -0000 Subject: SUSE-RU-2024:0717-1: important: Recommended update for patterns-sap Message-ID: <170921018882.28289.11471698669644028173@smelt2.prg2.suse.org> # Recommended update for patterns-sap Announcement ID: SUSE-RU-2024:0717-1 Rating: important References: * bsc#1220161 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SAP Business One Module 15-SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for patterns-sap fixes the following issues: * Fixed `patterns-sap-nw` blocking installation of SAPHanaSR-angi package (bsc#1220161) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Business One Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Business-One-15-SP5-2024-717=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2024-717=1 openSUSE-SLE-15.5-2024-717=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-717=1 ## Package List: * SAP Business One Module 15-SP5 (x86_64) * patterns-sap-hana-15.5.1-150500.5.8.1 * patterns-sap-bone-15.5.1-150500.5.8.1 * openSUSE Leap 15.5 (ppc64le x86_64) * patterns-sap-nw-15.5.1-150500.5.8.1 * patterns-sap-15.5.1-150500.5.8.1 * patterns-sap-hana-15.5.1-150500.5.8.1 * patterns-sap-bone-15.5.1-150500.5.8.1 * SAP Applications Module 15-SP5 (ppc64le x86_64) * patterns-sap-nw-15.5.1-150500.5.8.1 * patterns-sap-hana-15.5.1-150500.5.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1220161 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 16:30:03 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 16:30:03 -0000 Subject: SUSE-RU-2024:0735-1: low: Recommended update for libindicator7, libdbusmenu-gtk4 Message-ID: <170922420350.699.7552096411435955655@smelt2.prg2.suse.org> # Recommended update for libindicator7, libdbusmenu-gtk4 Announcement ID: SUSE-RU-2024:0735-1 Rating: low References: * bsc#1219244 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for libindicator7, libdbusmenu-gtk4 fixes the following issues: * Add missing packages to Package Hub 15 SP5 (bsc#1219244, jsc#MSC-751) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-735=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-735=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-735=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-735=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-735=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-735=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-735=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-735=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-735=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-735=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-735=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-735=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-735=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libdbusmenu-gtk2-devel-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * indicator-common-16.10.0+bzr20171205-150200.3.2.1 * libindicator-devel-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-jsonloader4-16.04.0-150200.3.2.1 * libdbusmenu-jsonloader4-debuginfo-16.04.0-150200.3.2.1 * typelib-1_0-DbusmenuGtk3-0_4-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * libindicator3-devel-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-glib-devel-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * typelib-1_0-Dbusmenu-0_4-16.04.0-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * typelib-1_0-DbusmenuGtk-0_4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-devel-16.04.0-150200.3.2.1 * libdbusmenu-tools-debuginfo-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator7-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-tools-16.04.0-150200.3.2.1 * libdbusmenu-jsonloader-devel-16.04.0-150200.3.2.1 * libdbusmenu-gtk4-16.04.0-150200.3.2.1 * libindicator3-devel-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk4-debuginfo-16.04.0-150200.3.2.1 * openSUSE Leap 15.5 (noarch) * libdbusmenu-glib-doc-16.04.0-150200.3.2.1 * libdbusmenu-gtk2-doc-16.04.0-150200.3.2.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libindicator3-7-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk3-4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-4-debuginfo-16.04.0-150200.3.2.1 * libindicator-debuginfo-16.10.0+bzr20171205-150200.3.2.1 * libindicator3-7-16.10.0+bzr20171205-150200.3.2.1 * libindicator-debugsource-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * libdbusmenu-glib4-debuginfo-16.04.0-150200.3.2.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libdbusmenu-gtk3-devel-16.04.0-150200.3.2.1 * libdbusmenu-gtk2-debuginfo-16.04.0-150200.3.2.1 * libdbusmenu-glib-devel-16.04.0-150200.3.2.1 * typelib-1_0-Dbusmenu-0_4-16.04.0-150200.3.2.1 * libdbusmenu-gtk2-debugsource-16.04.0-150200.3.2.1 * typelib-1_0-DbusmenuGtk3-0_4-16.04.0-150200.3.2.1 * libdbusmenu-gtk3-debugsource-16.04.0-150200.3.2.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * libindicator7-16.10.0+bzr20171205-150200.3.2.1 * libdbusmenu-gtk4-16.04.0-150200.3.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219244 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 16:30:10 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 16:30:10 -0000 Subject: SUSE-RU-2024:0734-1: moderate: Recommended update for go1.21 Message-ID: <170922421066.699.16594252192516248519@smelt2.prg2.suse.org> # Recommended update for go1.21 Announcement ID: SUSE-RU-2024:0734-1 Rating: moderate References: * bsc#1212475 Affected Products: * Containers Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has one fix can now be installed. ## Description: This update for go1.21 fixes the following issues: go1.21.7 (released 2024-02-06) includes fixes to the compiler, the go command, the runtime, and the crypto/x509 package. (bsc#1212475 go1.21 release tracking) * go#63209 runtime: "fatal: morestack on g0" on amd64 after upgrade to Go 1.21 * go#63768 runtime: pinner.Pin doesn't panic when it says it will * go#64497 cmd/go: flag modcacherw does not take effect in the target package * go#64761 staticlockranking builders failing on release branches on LUCI * go#64935 runtime: "traceback: unexpected SPWRITE function runtime.systemstack" * go#65023 x/tools/go/analysis/unitchecker,slices: TestVetStdlib failing due to vet errors in panic tests * go#65053 cmd/compile: //go:build file version ignored when calling generic fn which has related type params * go#65323 crypto: rollback BoringCrypto fips-20220613 update * go#65351 cmd/go: go generate fails silently when run on a package in a nested workspace module * go#65380 crypto/x509: TestIssue51759 consistently failing on gotip-darwin- amd64_10.15 LUCI builder * go#65449 runtime/trace: frame pointer unwinding crash on arm64 during async preemption ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-734=1 * Containers Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Containers-15-SP5-2024-734=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-734=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.7-150000.1.24.1 * go1.21-race-1.21.7-150000.1.24.1 * go1.21-doc-1.21.7-150000.1.24.1 * Containers Module 15-SP5 (aarch64 ppc64le s390x x86_64) * container-suseconnect-debuginfo-2.4.0-150000.4.50.2 * container-suseconnect-2.4.0-150000.4.50.2 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * go1.21-1.21.7-150000.1.24.1 * go1.21-race-1.21.7-150000.1.24.1 * go1.21-doc-1.21.7-150000.1.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1212475 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 16:30:12 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 16:30:12 -0000 Subject: SUSE-SU-2024:0733-1: important: Security update for nodejs12 Message-ID: <170922421246.699.10923975147447647999@smelt2.prg2.suse.org> # Security update for nodejs12 Announcement ID: SUSE-SU-2024:0733-1 Rating: important References: * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220053 Cross-References: * CVE-2023-46809 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for nodejs12 fixes the following issues: Security issues fixed: * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24806: fix improper domain lookup that potentially leads to SSRF attacks (bsc#1219724). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-733=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-733=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-733=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-733=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-733=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-733=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-733=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * nodejs12-devel-12.22.12-150200.4.56.1 * nodejs12-debugsource-12.22.12-150200.4.56.1 * nodejs12-12.22.12-150200.4.56.1 * npm12-12.22.12-150200.4.56.1 * nodejs12-debuginfo-12.22.12-150200.4.56.1 * SUSE Enterprise Storage 7.1 (noarch) * nodejs12-docs-12.22.12-150200.4.56.1 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 16:30:15 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 16:30:15 -0000 Subject: SUSE-SU-2024:0732-1: important: Security update for nodejs14 Message-ID: <170922421542.699.11293529529048378620@smelt2.prg2.suse.org> # Security update for nodejs14 Announcement ID: SUSE-SU-2024:0732-1 Rating: important References: * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220053 Cross-References: * CVE-2023-46809 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for nodejs14 fixes the following issues: Security issues fixed: * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24806: fix improper domain lookup that potentially leads to SSRF attacks (bsc#1219724). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-732=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-732=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-732=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-732=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-732=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-732=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-732=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * nodejs14-debuginfo-14.21.3-150200.15.55.1 * nodejs14-devel-14.21.3-150200.15.55.1 * nodejs14-14.21.3-150200.15.55.1 * nodejs14-debugsource-14.21.3-150200.15.55.1 * npm14-14.21.3-150200.15.55.1 * SUSE Enterprise Storage 7.1 (noarch) * nodejs14-docs-14.21.3-150200.15.55.1 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 16:30:18 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 16:30:18 -0000 Subject: SUSE-SU-2024:0731-1: important: Security update for nodejs16 Message-ID: <170922421894.699.17649064843419697360@smelt2.prg2.suse.org> # Security update for nodejs16 Announcement ID: SUSE-SU-2024:0731-1 Rating: important References: * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 * bsc#1220053 Cross-References: * CVE-2023-46809 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * Web and Scripting Module 12 An update that solves five vulnerabilities can now be installed. ## Description: This update for nodejs16 fixes the following issues: Security issues fixed: * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: ignore proxy-authorization header (bsc#1220017). * CVE-2024-24806: fix improper domain lookup that potentially leads to SSRF attacks (bsc#1219724). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 12 zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2024-731=1 ## Package List: * Web and Scripting Module 12 (aarch64 ppc64le s390x x86_64) * npm16-16.20.2-8.39.1 * nodejs16-debuginfo-16.20.2-8.39.1 * nodejs16-debugsource-16.20.2-8.39.1 * nodejs16-16.20.2-8.39.1 * nodejs16-devel-16.20.2-8.39.1 * Web and Scripting Module 12 (noarch) * nodejs16-docs-16.20.2-8.39.1 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 * https://bugzilla.suse.com/show_bug.cgi?id=1220053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 16:39:26 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 16:39:26 -0000 Subject: SUSE-SU-2024:0730-1: important: Security update for nodejs18 Message-ID: <170922476691.1385.3656348402614631266@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:0730-1 Rating: important References: * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21892 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for nodejs18 fixes the following issues: Update to 18.19.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to LTS version 18.19.0 * deps: npm updates to 10.x * esm: * Leverage loaders when resolving subsequent loaders * import.meta.resolve unflagged * \--experimental-default-type flag to flip module defaults ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-730=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-730=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-730=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-730=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-730=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-730=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * corepack18-18.19.1-150400.9.18.2 * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * corepack18-18.19.1-150400.9.18.2 * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 20:30:00 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 20:30:00 -0000 Subject: SUSE-SU-2024:0730-1: important: Security update for nodejs18 Message-ID: <170923860078.10422.12084844219527738379@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:0730-1 Rating: important References: * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21892 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for nodejs18 fixes the following issues: Update to 18.19.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to LTS version 18.19.0 * deps: npm updates to 10.x * esm: * Leverage loaders when resolving subsequent loaders * import.meta.resolve unflagged * \--experimental-default-type flag to flip module defaults ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-730=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-730=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-730=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-730=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-730=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-730=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * corepack18-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * corepack18-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 20:33:02 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 20:33:02 -0000 Subject: SUSE-SU-2024:0730-1: important: Security update for nodejs18 Message-ID: <170923878244.10422.13598439258345666935@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:0730-1 Rating: important References: * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21892 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for nodejs18 fixes the following issues: Update to 18.19.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to LTS version 18.19.0 * deps: npm updates to 10.x * esm: * Leverage loaders when resolving subsequent loaders * import.meta.resolve unflagged * \--experimental-default-type flag to flip module defaults ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-730=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-730=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-730=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-730=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-730=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-730=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * corepack18-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * corepack18-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 20:36:04 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 20:36:04 -0000 Subject: SUSE-SU-2024:0730-1: important: Security update for nodejs18 Message-ID: <170923896497.4764.15406758282069410894@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:0730-1 Rating: important References: * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21892 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for nodejs18 fixes the following issues: Update to 18.19.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to LTS version 18.19.0 * deps: npm updates to 10.x * esm: * Leverage loaders when resolving subsequent loaders * import.meta.resolve unflagged * \--experimental-default-type flag to flip module defaults ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-730=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-730=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-730=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-730=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-730=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-730=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * corepack18-18.19.1-150400.9.18.2 * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * corepack18-18.19.1-150400.9.18.2 * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Feb 29 20:39:06 2024 From: null at suse.de (SLE-UPDATES) Date: Thu, 29 Feb 2024 20:39:06 -0000 Subject: SUSE-SU-2024:0730-1: important: Security update for nodejs18 Message-ID: <170923914671.10422.14225299338255395303@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2024:0730-1 Rating: important References: * bsc#1219724 * bsc#1219992 * bsc#1219993 * bsc#1219997 * bsc#1220014 * bsc#1220017 Cross-References: * CVE-2023-46809 * CVE-2024-21892 * CVE-2024-22019 * CVE-2024-22025 * CVE-2024-24758 * CVE-2024-24806 CVSS scores: * CVE-2023-46809 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2024-21892 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22019 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-24758 ( SUSE ): 3.9 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for nodejs18 fixes the following issues: Update to 18.19.1: (security updates) * CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992). * CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993). * CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997). * CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014). * CVE-2024-24758: undici version 5.28.3 (bsc#1220017). * CVE-2024-24806: libuv version 1.48.0 (bsc#1219724). Update to LTS version 18.19.0 * deps: npm updates to 10.x * esm: * Leverage loaders when resolving subsequent loaders * import.meta.resolve unflagged * \--experimental-default-type flag to flip module defaults ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-730=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-730=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-730=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-730=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-730=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-730=1 * Web and Scripting Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-730=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * SUSE Manager Server 4.3 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * corepack18-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * openSUSE Leap 15.4 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * corepack18-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * openSUSE Leap 15.5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64) * npm18-18.19.1-150400.9.18.2 * nodejs18-debugsource-18.19.1-150400.9.18.2 * nodejs18-18.19.1-150400.9.18.2 * nodejs18-devel-18.19.1-150400.9.18.2 * nodejs18-debuginfo-18.19.1-150400.9.18.2 * Web and Scripting Module 15-SP5 (noarch) * nodejs18-docs-18.19.1-150400.9.18.2 ## References: * https://www.suse.com/security/cve/CVE-2023-46809.html * https://www.suse.com/security/cve/CVE-2024-21892.html * https://www.suse.com/security/cve/CVE-2024-22019.html * https://www.suse.com/security/cve/CVE-2024-22025.html * https://www.suse.com/security/cve/CVE-2024-24758.html * https://www.suse.com/security/cve/CVE-2024-24806.html * https://bugzilla.suse.com/show_bug.cgi?id=1219724 * https://bugzilla.suse.com/show_bug.cgi?id=1219992 * https://bugzilla.suse.com/show_bug.cgi?id=1219993 * https://bugzilla.suse.com/show_bug.cgi?id=1219997 * https://bugzilla.suse.com/show_bug.cgi?id=1220014 * https://bugzilla.suse.com/show_bug.cgi?id=1220017 -------------- next part -------------- An HTML attachment was scrubbed... URL: